[ 52.048103][ T39] audit: type=1400 audit(1664032858.212:74): avc: denied { write } for pid=3658 comm="sh" path="pipe:[2686]" dev="pipefs" ino=2686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '[localhost]:34199' (ECDSA) to the list of known hosts. [ 56.068254][ T39] audit: type=1400 audit(1664032862.252:75): avc: denied { execute } for pid=3672 comm="sh" name="syz-fuzzer" dev="sda1" ino=1134 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 56.089835][ T39] audit: type=1400 audit(1664032862.252:76): avc: denied { execute_no_trans } for pid=3672 comm="sh" path="/syz-fuzzer" dev="sda1" ino=1134 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2022/09/24 15:21:02 fuzzer started 2022/09/24 15:21:02 dialing manager at localhost:42761 [ 57.026162][ T39] audit: type=1400 audit(1664032863.202:77): avc: denied { mounton } for pid=3684 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 57.042704][ T3684] cgroup: Unknown subsys name 'net' [ 57.043759][ T39] audit: type=1400 audit(1664032863.222:78): avc: denied { mount } for pid=3684 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 57.067601][ T39] audit: type=1400 audit(1664032863.252:79): avc: denied { unmount } for pid=3684 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 57.311826][ T3684] cgroup: Unknown subsys name 'rlimit' [ 57.482214][ T39] audit: type=1400 audit(1664032863.662:80): avc: denied { mounton } for pid=3684 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 57.513756][ T39] audit: type=1400 audit(1664032863.672:81): avc: denied { mount } for pid=3684 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2022/09/24 15:21:03 syscalls: 3774 2022/09/24 15:21:03 code coverage: enabled 2022/09/24 15:21:03 comparison tracing: enabled 2022/09/24 15:21:03 extra coverage: enabled 2022/09/24 15:21:03 delay kcov mmap: enabled 2022/09/24 15:21:03 setuid sandbox: enabled 2022/09/24 15:21:03 namespace sandbox: enabled 2022/09/24 15:21:03 Android sandbox: enabled 2022/09/24 15:21:03 fault injection: enabled 2022/09/24 15:21:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2022/09/24 15:21:03 net packet injection: enabled 2022/09/24 15:21:03 net device setup: enabled 2022/09/24 15:21:03 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/24 15:21:03 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/24 15:21:03 NIC VF setup: PCI device 0000:00:11.0 is not available 2022/09/24 15:21:03 USB emulation: enabled 2022/09/24 15:21:03 hci packet injection: enabled 2022/09/24 15:21:03 wifi device emulation: failed to parse kernel version (6.0.0-rc6-syzkaller-00286-ga63f2e7cb110) 2022/09/24 15:21:03 802.15.4 emulation: enabled [ 57.533334][ T39] audit: type=1400 audit(1664032863.682:82): avc: denied { setattr } for pid=3684 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=760 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 2022/09/24 15:21:03 fetching corpus: 0, signal 0/2000 (executing program) [ 57.553555][ T39] audit: type=1400 audit(1664032863.682:83): avc: denied { create } for pid=3684 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 57.570703][ T39] audit: type=1400 audit(1664032863.682:84): avc: denied { write } for pid=3684 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 57.593843][ T39] audit: type=1400 audit(1664032863.682:85): avc: denied { read } for pid=3684 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2022/09/24 15:21:04 fetching corpus: 50, signal 49439/53159 (executing program) 2022/09/24 15:21:04 fetching corpus: 100, signal 63551/69011 (executing program) 2022/09/24 15:21:04 fetching corpus: 150, signal 80072/87114 (executing program) 2022/09/24 15:21:04 fetching corpus: 200, signal 95976/104538 (executing program) 2022/09/24 15:21:04 fetching corpus: 250, signal 104094/114220 (executing program) 2022/09/24 15:21:05 fetching corpus: 300, signal 114336/125928 (executing program) 2022/09/24 15:21:05 fetching corpus: 350, signal 123497/136531 (executing program) 2022/09/24 15:21:05 fetching corpus: 400, signal 127957/142512 (executing program) 2022/09/24 15:21:05 fetching corpus: 450, signal 135947/151868 (executing program) 2022/09/24 15:21:06 fetching corpus: 500, signal 140199/157545 (executing program) 2022/09/24 15:21:06 fetching corpus: 550, signal 145268/163992 (executing program) 2022/09/24 15:21:06 fetching corpus: 600, signal 151887/171921 (executing program) 2022/09/24 15:21:06 fetching corpus: 650, signal 157028/178385 (executing program) 2022/09/24 15:21:06 fetching corpus: 700, signal 159629/182393 (executing program) 2022/09/24 15:21:07 fetching corpus: 750, signal 163554/187640 (executing program) 2022/09/24 15:21:07 fetching corpus: 800, signal 167458/192871 (executing program) 2022/09/24 15:21:07 fetching corpus: 850, signal 170279/197006 (executing program) 2022/09/24 15:21:07 fetching corpus: 900, signal 173501/201504 (executing program) 2022/09/24 15:21:08 fetching corpus: 950, signal 177740/206954 (executing program) 2022/09/24 15:21:08 fetching corpus: 1000, signal 181417/211809 (executing program) 2022/09/24 15:21:08 fetching corpus: 1050, signal 184027/215725 (executing program) 2022/09/24 15:21:08 fetching corpus: 1100, signal 187268/220219 (executing program) 2022/09/24 15:21:08 fetching corpus: 1150, signal 190453/224652 (executing program) 2022/09/24 15:21:09 fetching corpus: 1200, signal 194104/229448 (executing program) 2022/09/24 15:21:09 fetching corpus: 1250, signal 197359/233873 (executing program) 2022/09/24 15:21:09 fetching corpus: 1300, signal 201104/238785 (executing program) 2022/09/24 15:21:09 fetching corpus: 1350, signal 203067/241974 (executing program) 2022/09/24 15:21:09 fetching corpus: 1400, signal 206049/246041 (executing program) 2022/09/24 15:21:10 fetching corpus: 1450, signal 208069/249250 (executing program) 2022/09/24 15:21:10 fetching corpus: 1500, signal 210696/252979 (executing program) 2022/09/24 15:21:10 fetching corpus: 1550, signal 213782/257148 (executing program) 2022/09/24 15:21:11 fetching corpus: 1600, signal 216878/261336 (executing program) 2022/09/24 15:21:11 fetching corpus: 1650, signal 219198/264794 (executing program) 2022/09/24 15:21:11 fetching corpus: 1700, signal 221935/268589 (executing program) 2022/09/24 15:21:11 fetching corpus: 1750, signal 223912/271704 (executing program) 2022/09/24 15:21:11 fetching corpus: 1800, signal 227125/275851 (executing program) 2022/09/24 15:21:12 fetching corpus: 1850, signal 229175/279002 (executing program) 2022/09/24 15:21:12 fetching corpus: 1900, signal 231095/281978 (executing program) 2022/09/24 15:21:12 fetching corpus: 1950, signal 233458/285388 (executing program) 2022/09/24 15:21:13 fetching corpus: 2000, signal 236359/289247 (executing program) 2022/09/24 15:21:13 fetching corpus: 2050, signal 238387/292276 (executing program) 2022/09/24 15:21:13 fetching corpus: 2100, signal 239953/294990 (executing program) 2022/09/24 15:21:13 fetching corpus: 2150, signal 242988/298902 (executing program) 2022/09/24 15:21:13 fetching corpus: 2200, signal 244894/301829 (executing program) 2022/09/24 15:21:14 fetching corpus: 2250, signal 246338/304356 (executing program) 2022/09/24 15:21:14 fetching corpus: 2300, signal 248082/307123 (executing program) 2022/09/24 15:21:14 fetching corpus: 2350, signal 250118/310093 (executing program) 2022/09/24 15:21:14 fetching corpus: 2400, signal 252190/313135 (executing program) 2022/09/24 15:21:14 fetching corpus: 2450, signal 253743/315723 (executing program) 2022/09/24 15:21:15 fetching corpus: 2500, signal 255695/318603 (executing program) 2022/09/24 15:21:15 fetching corpus: 2550, signal 257486/321343 (executing program) 2022/09/24 15:21:15 fetching corpus: 2600, signal 258459/323421 (executing program) 2022/09/24 15:21:15 fetching corpus: 2650, signal 259918/325846 (executing program) 2022/09/24 15:21:15 fetching corpus: 2700, signal 261630/328464 (executing program) 2022/09/24 15:21:15 fetching corpus: 2750, signal 263295/331064 (executing program) 2022/09/24 15:21:16 fetching corpus: 2800, signal 264684/333417 (executing program) 2022/09/24 15:21:16 fetching corpus: 2850, signal 266586/336196 (executing program) 2022/09/24 15:21:16 fetching corpus: 2900, signal 267959/338529 (executing program) 2022/09/24 15:21:16 fetching corpus: 2950, signal 269358/340877 (executing program) 2022/09/24 15:21:17 fetching corpus: 3000, signal 271154/343526 (executing program) 2022/09/24 15:21:17 fetching corpus: 3050, signal 272683/345972 (executing program) 2022/09/24 15:21:17 fetching corpus: 3100, signal 274251/348341 (executing program) 2022/09/24 15:21:17 fetching corpus: 3150, signal 275836/350744 (executing program) 2022/09/24 15:21:17 fetching corpus: 3200, signal 277898/353563 (executing program) 2022/09/24 15:21:18 fetching corpus: 3250, signal 279029/355647 (executing program) 2022/09/24 15:21:18 fetching corpus: 3300, signal 280450/357933 (executing program) 2022/09/24 15:21:18 fetching corpus: 3350, signal 282241/360513 (executing program) 2022/09/24 15:21:18 fetching corpus: 3400, signal 284018/363086 (executing program) 2022/09/24 15:21:19 fetching corpus: 3450, signal 286101/365849 (executing program) 2022/09/24 15:21:19 fetching corpus: 3500, signal 287912/368375 (executing program) 2022/09/24 15:21:19 fetching corpus: 3550, signal 289279/370560 (executing program) 2022/09/24 15:21:20 fetching corpus: 3600, signal 290326/372530 (executing program) 2022/09/24 15:21:20 fetching corpus: 3650, signal 291889/374868 (executing program) 2022/09/24 15:21:20 fetching corpus: 3700, signal 293306/377041 (executing program) 2022/09/24 15:21:20 fetching corpus: 3750, signal 294365/378962 (executing program) 2022/09/24 15:21:20 fetching corpus: 3800, signal 295692/381137 (executing program) 2022/09/24 15:21:21 fetching corpus: 3850, signal 297278/383418 (executing program) 2022/09/24 15:21:21 fetching corpus: 3900, signal 298688/385573 (executing program) 2022/09/24 15:21:21 fetching corpus: 3950, signal 299946/387621 (executing program) 2022/09/24 15:21:21 fetching corpus: 4000, signal 301282/389716 (executing program) 2022/09/24 15:21:21 fetching corpus: 4050, signal 302473/391742 (executing program) 2022/09/24 15:21:22 fetching corpus: 4100, signal 305211/394912 (executing program) 2022/09/24 15:21:22 fetching corpus: 4150, signal 307481/397706 (executing program) 2022/09/24 15:21:22 fetching corpus: 4200, signal 309137/400031 (executing program) 2022/09/24 15:21:22 fetching corpus: 4250, signal 310368/401978 (executing program) 2022/09/24 15:21:23 fetching corpus: 4300, signal 311706/404060 (executing program) [ 76.981444][ T1352] ieee802154 phy0 wpan0: encryption failed: -22 [ 76.991371][ T1352] ieee802154 phy1 wpan1: encryption failed: -22 2022/09/24 15:21:23 fetching corpus: 4350, signal 313178/406187 (executing program) 2022/09/24 15:21:23 fetching corpus: 4400, signal 314253/408049 (executing program) 2022/09/24 15:21:23 fetching corpus: 4450, signal 315868/410250 (executing program) 2022/09/24 15:21:24 fetching corpus: 4500, signal 317100/412201 (executing program) 2022/09/24 15:21:24 fetching corpus: 4550, signal 319046/414669 (executing program) 2022/09/24 15:21:24 fetching corpus: 4600, signal 320283/416623 (executing program) 2022/09/24 15:21:24 fetching corpus: 4650, signal 321379/418448 (executing program) 2022/09/24 15:21:24 fetching corpus: 4700, signal 322641/420389 (executing program) 2022/09/24 15:21:25 fetching corpus: 4750, signal 323794/422241 (executing program) 2022/09/24 15:21:25 fetching corpus: 4800, signal 324767/423891 (executing program) 2022/09/24 15:21:25 fetching corpus: 4850, signal 325770/425623 (executing program) 2022/09/24 15:21:25 fetching corpus: 4900, signal 327209/427641 (executing program) 2022/09/24 15:21:26 fetching corpus: 4950, signal 328357/429490 (executing program) 2022/09/24 15:21:26 fetching corpus: 5000, signal 329246/431114 (executing program) 2022/09/24 15:21:26 fetching corpus: 5050, signal 330416/432927 (executing program) 2022/09/24 15:21:26 fetching corpus: 5100, signal 331950/434972 (executing program) 2022/09/24 15:21:26 fetching corpus: 5150, signal 333223/436837 (executing program) 2022/09/24 15:21:26 fetching corpus: 5200, signal 334019/438356 (executing program) 2022/09/24 15:21:27 fetching corpus: 5250, signal 335126/440084 (executing program) 2022/09/24 15:21:27 fetching corpus: 5300, signal 336854/442216 (executing program) 2022/09/24 15:21:27 fetching corpus: 5350, signal 337801/443800 (executing program) 2022/09/24 15:21:27 fetching corpus: 5400, signal 338910/445512 (executing program) 2022/09/24 15:21:28 fetching corpus: 5450, signal 340436/447476 (executing program) 2022/09/24 15:21:28 fetching corpus: 5500, signal 341331/449047 (executing program) 2022/09/24 15:21:28 fetching corpus: 5550, signal 342199/450635 (executing program) 2022/09/24 15:21:28 fetching corpus: 5600, signal 343232/452252 (executing program) 2022/09/24 15:21:28 fetching corpus: 5650, signal 343822/453610 (executing program) 2022/09/24 15:21:29 fetching corpus: 5700, signal 344798/455224 (executing program) 2022/09/24 15:21:29 fetching corpus: 5750, signal 346102/457055 (executing program) 2022/09/24 15:21:29 fetching corpus: 5800, signal 347151/458643 (executing program) 2022/09/24 15:21:29 fetching corpus: 5850, signal 347919/460096 (executing program) 2022/09/24 15:21:30 fetching corpus: 5900, signal 348937/461654 (executing program) 2022/09/24 15:21:30 fetching corpus: 5950, signal 349973/463270 (executing program) 2022/09/24 15:21:30 fetching corpus: 6000, signal 350854/464785 (executing program) 2022/09/24 15:21:30 fetching corpus: 6050, signal 351853/466366 (executing program) 2022/09/24 15:21:30 fetching corpus: 6100, signal 352775/467859 (executing program) 2022/09/24 15:21:31 fetching corpus: 6150, signal 353871/469490 (executing program) 2022/09/24 15:21:31 fetching corpus: 6200, signal 354708/470944 (executing program) 2022/09/24 15:21:31 fetching corpus: 6250, signal 356195/472750 (executing program) 2022/09/24 15:21:31 fetching corpus: 6300, signal 356867/474048 (executing program) 2022/09/24 15:21:31 fetching corpus: 6350, signal 358068/475733 (executing program) 2022/09/24 15:21:32 fetching corpus: 6400, signal 359547/477550 (executing program) 2022/09/24 15:21:32 fetching corpus: 6450, signal 360397/478967 (executing program) 2022/09/24 15:21:32 fetching corpus: 6500, signal 361344/480475 (executing program) 2022/09/24 15:21:32 fetching corpus: 6550, signal 362150/481905 (executing program) 2022/09/24 15:21:33 fetching corpus: 6600, signal 363093/483378 (executing program) 2022/09/24 15:21:33 fetching corpus: 6650, signal 363877/484732 (executing program) [ 87.220004][ T171] cfg80211: failed to load regulatory.db 2022/09/24 15:21:33 fetching corpus: 6700, signal 364542/486012 (executing program) 2022/09/24 15:21:33 fetching corpus: 6750, signal 365644/487596 (executing program) 2022/09/24 15:21:33 fetching corpus: 6800, signal 366794/489142 (executing program) 2022/09/24 15:21:34 fetching corpus: 6850, signal 367264/490380 (executing program) 2022/09/24 15:21:34 fetching corpus: 6900, signal 368120/491719 (executing program) 2022/09/24 15:21:34 fetching corpus: 6950, signal 369127/493196 (executing program) 2022/09/24 15:21:34 fetching corpus: 7000, signal 369994/494593 (executing program) 2022/09/24 15:21:34 fetching corpus: 7050, signal 370867/496032 (executing program) 2022/09/24 15:21:35 fetching corpus: 7100, signal 371931/497509 (executing program) 2022/09/24 15:21:35 fetching corpus: 7150, signal 372777/498819 (executing program) 2022/09/24 15:21:35 fetching corpus: 7200, signal 373729/500201 (executing program) 2022/09/24 15:21:35 fetching corpus: 7250, signal 374657/501559 (executing program) 2022/09/24 15:21:36 fetching corpus: 7300, signal 375509/502857 (executing program) 2022/09/24 15:21:36 fetching corpus: 7350, signal 376445/504193 (executing program) 2022/09/24 15:21:36 fetching corpus: 7400, signal 377527/505612 (executing program) 2022/09/24 15:21:36 fetching corpus: 7450, signal 378737/507095 (executing program) 2022/09/24 15:21:36 fetching corpus: 7500, signal 379426/508337 (executing program) 2022/09/24 15:21:37 fetching corpus: 7550, signal 379962/509454 (executing program) 2022/09/24 15:21:37 fetching corpus: 7600, signal 380579/510639 (executing program) 2022/09/24 15:21:38 fetching corpus: 7650, signal 381603/512044 (executing program) 2022/09/24 15:21:38 fetching corpus: 7700, signal 382411/513280 (executing program) 2022/09/24 15:21:38 fetching corpus: 7750, signal 383741/514850 (executing program) 2022/09/24 15:21:38 fetching corpus: 7800, signal 384459/516008 (executing program) 2022/09/24 15:21:39 fetching corpus: 7850, signal 385236/517191 (executing program) 2022/09/24 15:21:39 fetching corpus: 7900, signal 385961/518382 (executing program) 2022/09/24 15:21:39 fetching corpus: 7950, signal 386707/519590 (executing program) 2022/09/24 15:21:39 fetching corpus: 8000, signal 387385/520797 (executing program) 2022/09/24 15:21:40 fetching corpus: 8050, signal 388231/522082 (executing program) 2022/09/24 15:21:40 fetching corpus: 8100, signal 388954/523281 (executing program) 2022/09/24 15:21:40 fetching corpus: 8150, signal 389818/524540 (executing program) 2022/09/24 15:21:41 fetching corpus: 8200, signal 390498/525706 (executing program) 2022/09/24 15:21:41 fetching corpus: 8250, signal 391273/526915 (executing program) 2022/09/24 15:21:41 fetching corpus: 8300, signal 391787/527961 (executing program) 2022/09/24 15:21:41 fetching corpus: 8350, signal 392633/529180 (executing program) 2022/09/24 15:21:41 fetching corpus: 8400, signal 393264/530298 (executing program) 2022/09/24 15:21:42 fetching corpus: 8450, signal 394112/531495 (executing program) 2022/09/24 15:21:42 fetching corpus: 8500, signal 394826/532673 (executing program) 2022/09/24 15:21:42 fetching corpus: 8550, signal 395982/534131 (executing program) 2022/09/24 15:21:42 fetching corpus: 8600, signal 396982/535403 (executing program) 2022/09/24 15:21:42 fetching corpus: 8650, signal 397543/536482 (executing program) 2022/09/24 15:21:43 fetching corpus: 8700, signal 398439/537697 (executing program) 2022/09/24 15:21:43 fetching corpus: 8750, signal 399149/538873 (executing program) 2022/09/24 15:21:43 fetching corpus: 8800, signal 399863/539943 (executing program) 2022/09/24 15:21:43 fetching corpus: 8850, signal 400516/541031 (executing program) 2022/09/24 15:21:43 fetching corpus: 8900, signal 401245/542131 (executing program) 2022/09/24 15:21:44 fetching corpus: 8950, signal 402053/543281 (executing program) 2022/09/24 15:21:44 fetching corpus: 9000, signal 403006/544486 (executing program) 2022/09/24 15:21:44 fetching corpus: 9050, signal 403651/545563 (executing program) 2022/09/24 15:21:44 fetching corpus: 9100, signal 404365/546630 (executing program) 2022/09/24 15:21:44 fetching corpus: 9150, signal 404978/547683 (executing program) 2022/09/24 15:21:45 fetching corpus: 9200, signal 405725/548757 (executing program) 2022/09/24 15:21:45 fetching corpus: 9250, signal 406445/549845 (executing program) 2022/09/24 15:21:45 fetching corpus: 9300, signal 407229/550992 (executing program) 2022/09/24 15:21:46 fetching corpus: 9350, signal 407694/551975 (executing program) 2022/09/24 15:21:46 fetching corpus: 9400, signal 408303/553051 (executing program) 2022/09/24 15:21:46 fetching corpus: 9450, signal 408836/554067 (executing program) 2022/09/24 15:21:46 fetching corpus: 9500, signal 409698/555227 (executing program) 2022/09/24 15:21:46 fetching corpus: 9550, signal 410449/556311 (executing program) 2022/09/24 15:21:47 fetching corpus: 9600, signal 410963/557303 (executing program) 2022/09/24 15:21:47 fetching corpus: 9650, signal 411759/558374 (executing program) 2022/09/24 15:21:47 fetching corpus: 9700, signal 412428/559427 (executing program) 2022/09/24 15:21:47 fetching corpus: 9750, signal 412886/560321 (executing program) 2022/09/24 15:21:47 fetching corpus: 9800, signal 413477/561293 (executing program) 2022/09/24 15:21:47 fetching corpus: 9850, signal 414200/562325 (executing program) 2022/09/24 15:21:48 fetching corpus: 9900, signal 415240/563477 (executing program) 2022/09/24 15:21:48 fetching corpus: 9950, signal 415713/564389 (executing program) 2022/09/24 15:21:48 fetching corpus: 10000, signal 416300/565367 (executing program) 2022/09/24 15:21:48 fetching corpus: 10050, signal 417055/566391 (executing program) 2022/09/24 15:21:48 fetching corpus: 10100, signal 417958/567441 (executing program) 2022/09/24 15:21:49 fetching corpus: 10150, signal 418653/568480 (executing program) 2022/09/24 15:21:49 fetching corpus: 10200, signal 419350/569467 (executing program) 2022/09/24 15:21:49 fetching corpus: 10250, signal 419940/570440 (executing program) 2022/09/24 15:21:49 fetching corpus: 10300, signal 420947/571519 (executing program) 2022/09/24 15:21:49 fetching corpus: 10350, signal 421433/572417 (executing program) 2022/09/24 15:21:50 fetching corpus: 10400, signal 422040/573345 (executing program) 2022/09/24 15:21:50 fetching corpus: 10450, signal 422858/574369 (executing program) 2022/09/24 15:21:50 fetching corpus: 10500, signal 423955/575470 (executing program) 2022/09/24 15:21:50 fetching corpus: 10550, signal 424773/576464 (executing program) 2022/09/24 15:21:51 fetching corpus: 10600, signal 425328/577369 (executing program) 2022/09/24 15:21:51 fetching corpus: 10650, signal 425984/578354 (executing program) 2022/09/24 15:21:51 fetching corpus: 10700, signal 426610/579309 (executing program) 2022/09/24 15:21:51 fetching corpus: 10750, signal 427140/580208 (executing program) 2022/09/24 15:21:51 fetching corpus: 10800, signal 427784/581150 (executing program) 2022/09/24 15:21:52 fetching corpus: 10850, signal 428391/582082 (executing program) 2022/09/24 15:21:52 fetching corpus: 10900, signal 428884/582989 (executing program) 2022/09/24 15:21:52 fetching corpus: 10950, signal 429708/583970 (executing program) 2022/09/24 15:21:53 fetching corpus: 11000, signal 430237/584859 (executing program) 2022/09/24 15:21:53 fetching corpus: 11050, signal 430855/585759 (executing program) 2022/09/24 15:21:53 fetching corpus: 11100, signal 431495/586659 (executing program) 2022/09/24 15:21:53 fetching corpus: 11150, signal 432059/587559 (executing program) 2022/09/24 15:21:54 fetching corpus: 11200, signal 432753/588448 (executing program) 2022/09/24 15:21:54 fetching corpus: 11250, signal 433218/589284 (executing program) 2022/09/24 15:21:54 fetching corpus: 11300, signal 433778/590169 (executing program) 2022/09/24 15:21:54 fetching corpus: 11350, signal 434551/591074 (executing program) 2022/09/24 15:21:54 fetching corpus: 11400, signal 435160/591915 (executing program) 2022/09/24 15:21:54 fetching corpus: 11450, signal 435645/592766 (executing program) 2022/09/24 15:21:55 fetching corpus: 11500, signal 436172/593600 (executing program) 2022/09/24 15:21:55 fetching corpus: 11550, signal 436852/594480 (executing program) 2022/09/24 15:21:55 fetching corpus: 11600, signal 437383/595288 (executing program) 2022/09/24 15:21:55 fetching corpus: 11650, signal 438125/596178 (executing program) 2022/09/24 15:21:56 fetching corpus: 11700, signal 438531/596978 (executing program) 2022/09/24 15:21:56 fetching corpus: 11750, signal 439156/597819 (executing program) 2022/09/24 15:21:56 fetching corpus: 11800, signal 439758/598649 (executing program) 2022/09/24 15:21:56 fetching corpus: 11850, signal 440326/599492 (executing program) 2022/09/24 15:21:57 fetching corpus: 11900, signal 441050/600350 (executing program) 2022/09/24 15:21:57 fetching corpus: 11950, signal 441491/601083 (executing program) 2022/09/24 15:21:57 fetching corpus: 12000, signal 442189/601908 (executing program) 2022/09/24 15:21:57 fetching corpus: 12050, signal 442857/602728 (executing program) 2022/09/24 15:21:57 fetching corpus: 12100, signal 443378/603536 (executing program) 2022/09/24 15:21:58 fetching corpus: 12150, signal 443983/604343 (executing program) 2022/09/24 15:21:58 fetching corpus: 12200, signal 444492/605122 (executing program) 2022/09/24 15:21:58 fetching corpus: 12250, signal 445195/605959 (executing program) 2022/09/24 15:21:58 fetching corpus: 12300, signal 445838/606731 (executing program) 2022/09/24 15:21:58 fetching corpus: 12350, signal 446278/607430 (executing program) 2022/09/24 15:21:59 fetching corpus: 12400, signal 446818/608208 (executing program) 2022/09/24 15:21:59 fetching corpus: 12450, signal 447285/608926 (executing program) 2022/09/24 15:21:59 fetching corpus: 12500, signal 447680/609687 (executing program) 2022/09/24 15:21:59 fetching corpus: 12550, signal 448254/610480 (executing program) 2022/09/24 15:21:59 fetching corpus: 12600, signal 448775/611261 (executing program) 2022/09/24 15:22:00 fetching corpus: 12650, signal 449213/612013 (executing program) 2022/09/24 15:22:00 fetching corpus: 12700, signal 449889/612800 (executing program) 2022/09/24 15:22:00 fetching corpus: 12750, signal 450430/613587 (executing program) 2022/09/24 15:22:00 fetching corpus: 12800, signal 450970/614341 (executing program) 2022/09/24 15:22:00 fetching corpus: 12850, signal 451337/615017 (executing program) 2022/09/24 15:22:01 fetching corpus: 12900, signal 451925/615810 (executing program) 2022/09/24 15:22:01 fetching corpus: 12950, signal 452386/616502 (executing program) 2022/09/24 15:22:01 fetching corpus: 13000, signal 452900/617259 (executing program) 2022/09/24 15:22:02 fetching corpus: 13050, signal 453411/617970 (executing program) 2022/09/24 15:22:02 fetching corpus: 13100, signal 453776/618708 (executing program) 2022/09/24 15:22:02 fetching corpus: 13150, signal 454270/619472 (executing program) 2022/09/24 15:22:02 fetching corpus: 13200, signal 454837/620193 (executing program) 2022/09/24 15:22:02 fetching corpus: 13250, signal 455835/621019 (executing program) 2022/09/24 15:22:03 fetching corpus: 13300, signal 456320/621711 (executing program) 2022/09/24 15:22:03 fetching corpus: 13350, signal 457089/622428 (executing program) 2022/09/24 15:22:03 fetching corpus: 13400, signal 457529/623145 (executing program) 2022/09/24 15:22:03 fetching corpus: 13450, signal 458207/623860 (executing program) 2022/09/24 15:22:04 fetching corpus: 13500, signal 458763/624586 (executing program) 2022/09/24 15:22:04 fetching corpus: 13550, signal 459268/625269 (executing program) 2022/09/24 15:22:04 fetching corpus: 13600, signal 460284/626049 (executing program) 2022/09/24 15:22:04 fetching corpus: 13650, signal 460762/626732 (executing program) 2022/09/24 15:22:04 fetching corpus: 13700, signal 461194/627379 (executing program) 2022/09/24 15:22:05 fetching corpus: 13750, signal 461785/628081 (executing program) 2022/09/24 15:22:05 fetching corpus: 13800, signal 462437/628820 (executing program) 2022/09/24 15:22:05 fetching corpus: 13850, signal 462759/629441 (executing program) 2022/09/24 15:22:05 fetching corpus: 13900, signal 463271/630094 (executing program) 2022/09/24 15:22:05 fetching corpus: 13950, signal 463822/630762 (executing program) 2022/09/24 15:22:05 fetching corpus: 14000, signal 464469/631458 (executing program) 2022/09/24 15:22:06 fetching corpus: 14050, signal 465127/632143 (executing program) 2022/09/24 15:22:06 fetching corpus: 14100, signal 465459/632813 (executing program) 2022/09/24 15:22:06 fetching corpus: 14150, signal 465965/633472 (executing program) 2022/09/24 15:22:06 fetching corpus: 14200, signal 466442/634108 (executing program) 2022/09/24 15:22:07 fetching corpus: 14250, signal 467055/634738 (executing program) 2022/09/24 15:22:07 fetching corpus: 14300, signal 467797/635478 (executing program) 2022/09/24 15:22:07 fetching corpus: 14350, signal 468385/636093 (executing program) 2022/09/24 15:22:07 fetching corpus: 14400, signal 468855/636732 (executing program) 2022/09/24 15:22:08 fetching corpus: 14450, signal 469402/637396 (executing program) 2022/09/24 15:22:08 fetching corpus: 14500, signal 469848/638040 (executing program) 2022/09/24 15:22:08 fetching corpus: 14550, signal 470524/638663 (executing program) 2022/09/24 15:22:08 fetching corpus: 14600, signal 471210/639330 (executing program) 2022/09/24 15:22:08 fetching corpus: 14650, signal 471667/639970 (executing program) 2022/09/24 15:22:09 fetching corpus: 14700, signal 471962/640558 (executing program) 2022/09/24 15:22:09 fetching corpus: 14750, signal 472532/641199 (executing program) 2022/09/24 15:22:09 fetching corpus: 14800, signal 473011/641814 (executing program) 2022/09/24 15:22:09 fetching corpus: 14850, signal 473334/642413 (executing program) 2022/09/24 15:22:09 fetching corpus: 14900, signal 473718/643022 (executing program) 2022/09/24 15:22:09 fetching corpus: 14950, signal 474215/643616 (executing program) 2022/09/24 15:22:10 fetching corpus: 15000, signal 474716/644200 (executing program) 2022/09/24 15:22:10 fetching corpus: 15050, signal 475322/644811 (executing program) 2022/09/24 15:22:10 fetching corpus: 15100, signal 475930/645437 (executing program) 2022/09/24 15:22:10 fetching corpus: 15150, signal 476294/645982 (executing program) 2022/09/24 15:22:11 fetching corpus: 15200, signal 476961/646633 (executing program) 2022/09/24 15:22:11 fetching corpus: 15250, signal 477613/647223 (executing program) 2022/09/24 15:22:11 fetching corpus: 15300, signal 478096/647800 (executing program) 2022/09/24 15:22:11 fetching corpus: 15350, signal 478545/648415 (executing program) 2022/09/24 15:22:11 fetching corpus: 15400, signal 478953/649007 (executing program) 2022/09/24 15:22:11 fetching corpus: 15450, signal 479444/649598 (executing program) 2022/09/24 15:22:12 fetching corpus: 15500, signal 479915/650180 (executing program) 2022/09/24 15:22:12 fetching corpus: 15550, signal 480355/650770 (executing program) 2022/09/24 15:22:12 fetching corpus: 15600, signal 480968/651328 (executing program) 2022/09/24 15:22:12 fetching corpus: 15650, signal 481464/651883 (executing program) 2022/09/24 15:22:12 fetching corpus: 15700, signal 481913/652443 (executing program) 2022/09/24 15:22:13 fetching corpus: 15750, signal 482323/653007 (executing program) 2022/09/24 15:22:13 fetching corpus: 15800, signal 482930/653581 (executing program) 2022/09/24 15:22:13 fetching corpus: 15850, signal 483505/654152 (executing program) 2022/09/24 15:22:14 fetching corpus: 15900, signal 484018/654689 (executing program) 2022/09/24 15:22:14 fetching corpus: 15950, signal 484322/655211 (executing program) 2022/09/24 15:22:14 fetching corpus: 16000, signal 485007/655759 (executing program) 2022/09/24 15:22:14 fetching corpus: 16050, signal 485584/656294 (executing program) 2022/09/24 15:22:14 fetching corpus: 16100, signal 486047/656807 (executing program) 2022/09/24 15:22:15 fetching corpus: 16150, signal 486579/657379 (executing program) 2022/09/24 15:22:15 fetching corpus: 16200, signal 486958/657900 (executing program) 2022/09/24 15:22:15 fetching corpus: 16250, signal 487536/658417 (executing program) 2022/09/24 15:22:15 fetching corpus: 16300, signal 487987/658947 (executing program) 2022/09/24 15:22:15 fetching corpus: 16350, signal 488453/659495 (executing program) 2022/09/24 15:22:16 fetching corpus: 16400, signal 488886/659980 (executing program) 2022/09/24 15:22:16 fetching corpus: 16450, signal 489342/660471 (executing program) 2022/09/24 15:22:16 fetching corpus: 16500, signal 489704/660575 (executing program) 2022/09/24 15:22:16 fetching corpus: 16550, signal 490170/660575 (executing program) 2022/09/24 15:22:16 fetching corpus: 16600, signal 490628/660575 (executing program) 2022/09/24 15:22:17 fetching corpus: 16650, signal 491092/660575 (executing program) 2022/09/24 15:22:17 fetching corpus: 16700, signal 491409/660575 (executing program) 2022/09/24 15:22:17 fetching corpus: 16750, signal 492064/660575 (executing program) 2022/09/24 15:22:17 fetching corpus: 16800, signal 492576/660575 (executing program) 2022/09/24 15:22:17 fetching corpus: 16850, signal 493072/660575 (executing program) 2022/09/24 15:22:17 fetching corpus: 16900, signal 493617/660575 (executing program) 2022/09/24 15:22:18 fetching corpus: 16950, signal 494042/660575 (executing program) 2022/09/24 15:22:18 fetching corpus: 17000, signal 494319/660575 (executing program) 2022/09/24 15:22:18 fetching corpus: 17050, signal 494653/660575 (executing program) 2022/09/24 15:22:18 fetching corpus: 17100, signal 495056/660575 (executing program) 2022/09/24 15:22:18 fetching corpus: 17150, signal 495362/660575 (executing program) 2022/09/24 15:22:19 fetching corpus: 17200, signal 495929/660575 (executing program) 2022/09/24 15:22:19 fetching corpus: 17250, signal 496339/660575 (executing program) 2022/09/24 15:22:19 fetching corpus: 17300, signal 496683/660575 (executing program) 2022/09/24 15:22:19 fetching corpus: 17350, signal 497273/660575 (executing program) 2022/09/24 15:22:19 fetching corpus: 17400, signal 497756/660575 (executing program) 2022/09/24 15:22:20 fetching corpus: 17450, signal 498128/660575 (executing program) 2022/09/24 15:22:20 fetching corpus: 17500, signal 498655/660575 (executing program) 2022/09/24 15:22:20 fetching corpus: 17550, signal 499028/660575 (executing program) 2022/09/24 15:22:20 fetching corpus: 17600, signal 499481/660575 (executing program) 2022/09/24 15:22:20 fetching corpus: 17650, signal 500033/660575 (executing program) 2022/09/24 15:22:20 fetching corpus: 17700, signal 500285/660575 (executing program) 2022/09/24 15:22:21 fetching corpus: 17750, signal 500663/660575 (executing program) 2022/09/24 15:22:21 fetching corpus: 17800, signal 501073/660575 (executing program) 2022/09/24 15:22:21 fetching corpus: 17850, signal 501688/660575 (executing program) 2022/09/24 15:22:21 fetching corpus: 17900, signal 502197/660575 (executing program) 2022/09/24 15:22:21 fetching corpus: 17950, signal 502549/660575 (executing program) 2022/09/24 15:22:22 fetching corpus: 18000, signal 502928/660575 (executing program) 2022/09/24 15:22:22 fetching corpus: 18050, signal 503569/660575 (executing program) 2022/09/24 15:22:22 fetching corpus: 18100, signal 503925/660575 (executing program) 2022/09/24 15:22:22 fetching corpus: 18150, signal 504321/660575 (executing program) 2022/09/24 15:22:22 fetching corpus: 18200, signal 504650/660575 (executing program) 2022/09/24 15:22:23 fetching corpus: 18250, signal 505139/660575 (executing program) 2022/09/24 15:22:23 fetching corpus: 18300, signal 505471/660575 (executing program) 2022/09/24 15:22:23 fetching corpus: 18350, signal 505881/660575 (executing program) 2022/09/24 15:22:23 fetching corpus: 18400, signal 506228/660575 (executing program) 2022/09/24 15:22:24 fetching corpus: 18450, signal 506531/660575 (executing program) 2022/09/24 15:22:24 fetching corpus: 18500, signal 506875/660575 (executing program) 2022/09/24 15:22:24 fetching corpus: 18550, signal 507164/660575 (executing program) 2022/09/24 15:22:24 fetching corpus: 18600, signal 507788/660575 (executing program) [ 138.419707][ T1352] ieee802154 phy0 wpan0: encryption failed: -22 [ 138.425894][ T1352] ieee802154 phy1 wpan1: encryption failed: -22 2022/09/24 15:22:24 fetching corpus: 18650, signal 508319/660575 (executing program) 2022/09/24 15:22:24 fetching corpus: 18700, signal 508603/660575 (executing program) 2022/09/24 15:22:25 fetching corpus: 18750, signal 508971/660575 (executing program) 2022/09/24 15:22:25 fetching corpus: 18800, signal 509375/660576 (executing program) 2022/09/24 15:22:25 fetching corpus: 18850, signal 509702/660576 (executing program) 2022/09/24 15:22:25 fetching corpus: 18900, signal 510035/660576 (executing program) 2022/09/24 15:22:25 fetching corpus: 18950, signal 510373/660576 (executing program) 2022/09/24 15:22:26 fetching corpus: 19000, signal 510737/660576 (executing program) 2022/09/24 15:22:26 fetching corpus: 19050, signal 511029/660576 (executing program) 2022/09/24 15:22:26 fetching corpus: 19100, signal 511437/660576 (executing program) 2022/09/24 15:22:27 fetching corpus: 19150, signal 511797/660576 (executing program) 2022/09/24 15:22:27 fetching corpus: 19200, signal 512202/660576 (executing program) 2022/09/24 15:22:27 fetching corpus: 19250, signal 512557/660576 (executing program) 2022/09/24 15:22:27 fetching corpus: 19300, signal 512953/660576 (executing program) 2022/09/24 15:22:27 fetching corpus: 19350, signal 513476/660576 (executing program) 2022/09/24 15:22:28 fetching corpus: 19400, signal 513886/660576 (executing program) 2022/09/24 15:22:28 fetching corpus: 19450, signal 514534/660576 (executing program) 2022/09/24 15:22:28 fetching corpus: 19500, signal 515004/660576 (executing program) 2022/09/24 15:22:28 fetching corpus: 19550, signal 515338/660576 (executing program) 2022/09/24 15:22:29 fetching corpus: 19600, signal 515885/660576 (executing program) 2022/09/24 15:22:29 fetching corpus: 19650, signal 516409/660576 (executing program) 2022/09/24 15:22:29 fetching corpus: 19700, signal 516920/660576 (executing program) 2022/09/24 15:22:29 fetching corpus: 19750, signal 517503/660576 (executing program) 2022/09/24 15:22:29 fetching corpus: 19800, signal 518041/660576 (executing program) 2022/09/24 15:22:29 fetching corpus: 19850, signal 518460/660576 (executing program) 2022/09/24 15:22:30 fetching corpus: 19900, signal 518778/660576 (executing program) 2022/09/24 15:22:30 fetching corpus: 19950, signal 519125/660579 (executing program) 2022/09/24 15:22:30 fetching corpus: 20000, signal 519508/660579 (executing program) 2022/09/24 15:22:30 fetching corpus: 20050, signal 519898/660579 (executing program) 2022/09/24 15:22:30 fetching corpus: 20100, signal 520291/660579 (executing program) 2022/09/24 15:22:31 fetching corpus: 20150, signal 520673/660579 (executing program) 2022/09/24 15:22:31 fetching corpus: 20200, signal 521121/660579 (executing program) 2022/09/24 15:22:31 fetching corpus: 20250, signal 521528/660579 (executing program) 2022/09/24 15:22:31 fetching corpus: 20300, signal 521927/660579 (executing program) 2022/09/24 15:22:32 fetching corpus: 20350, signal 522395/660579 (executing program) 2022/09/24 15:22:32 fetching corpus: 20400, signal 522903/660579 (executing program) 2022/09/24 15:22:32 fetching corpus: 20450, signal 523208/660579 (executing program) 2022/09/24 15:22:32 fetching corpus: 20500, signal 523493/660579 (executing program) 2022/09/24 15:22:32 fetching corpus: 20550, signal 523882/660579 (executing program) 2022/09/24 15:22:33 fetching corpus: 20600, signal 524346/660579 (executing program) 2022/09/24 15:22:33 fetching corpus: 20650, signal 524899/660579 (executing program) 2022/09/24 15:22:33 fetching corpus: 20700, signal 525244/660579 (executing program) 2022/09/24 15:22:33 fetching corpus: 20750, signal 526127/660579 (executing program) 2022/09/24 15:22:34 fetching corpus: 20800, signal 526504/660579 (executing program) 2022/09/24 15:22:34 fetching corpus: 20850, signal 527156/660579 (executing program) 2022/09/24 15:22:34 fetching corpus: 20900, signal 527578/660579 (executing program) 2022/09/24 15:22:34 fetching corpus: 20950, signal 527830/660579 (executing program) 2022/09/24 15:22:34 fetching corpus: 21000, signal 528122/660579 (executing program) 2022/09/24 15:22:35 fetching corpus: 21050, signal 528476/660579 (executing program) 2022/09/24 15:22:35 fetching corpus: 21100, signal 528751/660579 (executing program) 2022/09/24 15:22:35 fetching corpus: 21150, signal 529099/660579 (executing program) 2022/09/24 15:22:35 fetching corpus: 21200, signal 529509/660579 (executing program) 2022/09/24 15:22:35 fetching corpus: 21250, signal 529943/660579 (executing program) 2022/09/24 15:22:36 fetching corpus: 21300, signal 530478/660579 (executing program) 2022/09/24 15:22:36 fetching corpus: 21350, signal 530819/660579 (executing program) 2022/09/24 15:22:36 fetching corpus: 21400, signal 531235/660579 (executing program) 2022/09/24 15:22:36 fetching corpus: 21450, signal 531684/660579 (executing program) 2022/09/24 15:22:36 fetching corpus: 21500, signal 532121/660584 (executing program) 2022/09/24 15:22:37 fetching corpus: 21550, signal 532579/660584 (executing program) 2022/09/24 15:22:37 fetching corpus: 21600, signal 533026/660584 (executing program) 2022/09/24 15:22:37 fetching corpus: 21650, signal 533394/660584 (executing program) 2022/09/24 15:22:37 fetching corpus: 21700, signal 533799/660584 (executing program) 2022/09/24 15:22:37 fetching corpus: 21750, signal 534235/660584 (executing program) 2022/09/24 15:22:38 fetching corpus: 21800, signal 534621/660584 (executing program) 2022/09/24 15:22:38 fetching corpus: 21850, signal 534996/660584 (executing program) 2022/09/24 15:22:38 fetching corpus: 21900, signal 535349/660584 (executing program) 2022/09/24 15:22:38 fetching corpus: 21950, signal 535672/660584 (executing program) 2022/09/24 15:22:38 fetching corpus: 22000, signal 536028/660584 (executing program) 2022/09/24 15:22:39 fetching corpus: 22050, signal 536430/660584 (executing program) 2022/09/24 15:22:39 fetching corpus: 22100, signal 536751/660586 (executing program) 2022/09/24 15:22:39 fetching corpus: 22150, signal 537138/660587 (executing program) 2022/09/24 15:22:39 fetching corpus: 22200, signal 537533/660587 (executing program) 2022/09/24 15:22:40 fetching corpus: 22250, signal 538030/660587 (executing program) 2022/09/24 15:22:40 fetching corpus: 22300, signal 538325/660587 (executing program) 2022/09/24 15:22:40 fetching corpus: 22350, signal 538790/660587 (executing program) 2022/09/24 15:22:41 fetching corpus: 22400, signal 539181/660587 (executing program) 2022/09/24 15:22:41 fetching corpus: 22450, signal 539656/660587 (executing program) 2022/09/24 15:22:41 fetching corpus: 22500, signal 540271/660587 (executing program) 2022/09/24 15:22:41 fetching corpus: 22550, signal 540728/660594 (executing program) 2022/09/24 15:22:42 fetching corpus: 22600, signal 541125/660594 (executing program) 2022/09/24 15:22:42 fetching corpus: 22650, signal 541458/660594 (executing program) 2022/09/24 15:22:42 fetching corpus: 22700, signal 541837/660594 (executing program) 2022/09/24 15:22:42 fetching corpus: 22750, signal 542357/660594 (executing program) 2022/09/24 15:22:42 fetching corpus: 22800, signal 542722/660594 (executing program) 2022/09/24 15:22:42 fetching corpus: 22850, signal 543112/660594 (executing program) 2022/09/24 15:22:43 fetching corpus: 22900, signal 543403/660594 (executing program) 2022/09/24 15:22:43 fetching corpus: 22950, signal 543868/660594 (executing program) 2022/09/24 15:22:43 fetching corpus: 23000, signal 544306/660594 (executing program) 2022/09/24 15:22:43 fetching corpus: 23050, signal 544542/660594 (executing program) 2022/09/24 15:22:43 fetching corpus: 23100, signal 545206/660594 (executing program) 2022/09/24 15:22:44 fetching corpus: 23150, signal 545527/660594 (executing program) 2022/09/24 15:22:44 fetching corpus: 23200, signal 546175/660594 (executing program) 2022/09/24 15:22:44 fetching corpus: 23250, signal 546512/660594 (executing program) 2022/09/24 15:22:44 fetching corpus: 23300, signal 546919/660594 (executing program) 2022/09/24 15:22:44 fetching corpus: 23350, signal 547281/660598 (executing program) 2022/09/24 15:22:45 fetching corpus: 23400, signal 547664/660598 (executing program) 2022/09/24 15:22:45 fetching corpus: 23450, signal 547945/660598 (executing program) 2022/09/24 15:22:45 fetching corpus: 23500, signal 548381/660599 (executing program) 2022/09/24 15:22:45 fetching corpus: 23550, signal 548831/660601 (executing program) 2022/09/24 15:22:45 fetching corpus: 23600, signal 551011/660601 (executing program) 2022/09/24 15:22:46 fetching corpus: 23650, signal 551443/660601 (executing program) 2022/09/24 15:22:46 fetching corpus: 23700, signal 551829/660601 (executing program) 2022/09/24 15:22:46 fetching corpus: 23750, signal 552164/660601 (executing program) 2022/09/24 15:22:46 fetching corpus: 23800, signal 552470/660601 (executing program) 2022/09/24 15:22:46 fetching corpus: 23850, signal 552787/660601 (executing program) 2022/09/24 15:22:46 fetching corpus: 23900, signal 553173/660601 (executing program) 2022/09/24 15:22:47 fetching corpus: 23950, signal 553482/660601 (executing program) 2022/09/24 15:22:47 fetching corpus: 24000, signal 553833/660601 (executing program) 2022/09/24 15:22:47 fetching corpus: 24050, signal 554220/660606 (executing program) 2022/09/24 15:22:47 fetching corpus: 24100, signal 554455/660606 (executing program) 2022/09/24 15:22:48 fetching corpus: 24150, signal 554995/660606 (executing program) 2022/09/24 15:22:48 fetching corpus: 24200, signal 555459/660606 (executing program) 2022/09/24 15:22:48 fetching corpus: 24250, signal 555702/660606 (executing program) 2022/09/24 15:22:48 fetching corpus: 24300, signal 555982/660606 (executing program) 2022/09/24 15:22:48 fetching corpus: 24350, signal 556381/660606 (executing program) 2022/09/24 15:22:48 fetching corpus: 24400, signal 556767/660606 (executing program) 2022/09/24 15:22:49 fetching corpus: 24450, signal 557190/660606 (executing program) 2022/09/24 15:22:49 fetching corpus: 24500, signal 557686/660606 (executing program) 2022/09/24 15:22:49 fetching corpus: 24550, signal 558302/660606 (executing program) 2022/09/24 15:22:49 fetching corpus: 24600, signal 558626/660606 (executing program) 2022/09/24 15:22:49 fetching corpus: 24650, signal 559076/660606 (executing program) 2022/09/24 15:22:49 fetching corpus: 24700, signal 559411/660606 (executing program) 2022/09/24 15:22:50 fetching corpus: 24750, signal 559753/660606 (executing program) 2022/09/24 15:22:50 fetching corpus: 24800, signal 560076/660610 (executing program) 2022/09/24 15:22:50 fetching corpus: 24850, signal 560381/660610 (executing program) 2022/09/24 15:22:51 fetching corpus: 24900, signal 560842/660610 (executing program) 2022/09/24 15:22:51 fetching corpus: 24950, signal 561071/660610 (executing program) 2022/09/24 15:22:51 fetching corpus: 25000, signal 561447/660610 (executing program) 2022/09/24 15:22:51 fetching corpus: 25050, signal 561642/660610 (executing program) 2022/09/24 15:22:51 fetching corpus: 25100, signal 562073/660610 (executing program) 2022/09/24 15:22:51 fetching corpus: 25150, signal 562418/660610 (executing program) 2022/09/24 15:22:52 fetching corpus: 25200, signal 562669/660617 (executing program) 2022/09/24 15:22:52 fetching corpus: 25250, signal 563018/660619 (executing program) 2022/09/24 15:22:52 fetching corpus: 25300, signal 563386/660621 (executing program) 2022/09/24 15:22:52 fetching corpus: 25350, signal 563792/660627 (executing program) 2022/09/24 15:22:53 fetching corpus: 25400, signal 564188/660627 (executing program) 2022/09/24 15:22:53 fetching corpus: 25450, signal 564456/660628 (executing program) 2022/09/24 15:22:53 fetching corpus: 25500, signal 564694/660628 (executing program) 2022/09/24 15:22:54 fetching corpus: 25550, signal 565270/660631 (executing program) 2022/09/24 15:22:54 fetching corpus: 25600, signal 565528/660631 (executing program) 2022/09/24 15:22:54 fetching corpus: 25650, signal 565933/660631 (executing program) 2022/09/24 15:22:54 fetching corpus: 25700, signal 566138/660631 (executing program) 2022/09/24 15:22:54 fetching corpus: 25750, signal 566530/660631 (executing program) 2022/09/24 15:22:55 fetching corpus: 25800, signal 566813/660631 (executing program) 2022/09/24 15:22:55 fetching corpus: 25850, signal 567242/660631 (executing program) 2022/09/24 15:22:55 fetching corpus: 25900, signal 567834/660631 (executing program) 2022/09/24 15:22:55 fetching corpus: 25950, signal 568138/660631 (executing program) 2022/09/24 15:22:56 fetching corpus: 26000, signal 568395/660631 (executing program) 2022/09/24 15:22:56 fetching corpus: 26050, signal 568842/660631 (executing program) 2022/09/24 15:22:56 fetching corpus: 26100, signal 569126/660631 (executing program) 2022/09/24 15:22:56 fetching corpus: 26150, signal 569398/660631 (executing program) 2022/09/24 15:22:57 fetching corpus: 26200, signal 569656/660631 (executing program) 2022/09/24 15:22:57 fetching corpus: 26250, signal 569959/660631 (executing program) 2022/09/24 15:22:57 fetching corpus: 26300, signal 570311/660631 (executing program) 2022/09/24 15:22:57 fetching corpus: 26350, signal 570628/660631 (executing program) 2022/09/24 15:22:57 fetching corpus: 26400, signal 571030/660631 (executing program) 2022/09/24 15:22:58 fetching corpus: 26450, signal 571369/660631 (executing program) 2022/09/24 15:22:58 fetching corpus: 26500, signal 571715/660631 (executing program) 2022/09/24 15:22:58 fetching corpus: 26550, signal 572019/660631 (executing program) 2022/09/24 15:22:58 fetching corpus: 26600, signal 572289/660631 (executing program) 2022/09/24 15:22:58 fetching corpus: 26650, signal 572673/660631 (executing program) 2022/09/24 15:22:59 fetching corpus: 26700, signal 573081/660631 (executing program) 2022/09/24 15:22:59 fetching corpus: 26750, signal 573349/660631 (executing program) 2022/09/24 15:22:59 fetching corpus: 26800, signal 573636/660631 (executing program) 2022/09/24 15:22:59 fetching corpus: 26850, signal 573949/660631 (executing program) 2022/09/24 15:22:59 fetching corpus: 26900, signal 574357/660632 (executing program) 2022/09/24 15:23:00 fetching corpus: 26950, signal 574690/660632 (executing program) 2022/09/24 15:23:00 fetching corpus: 27000, signal 575093/660632 (executing program) 2022/09/24 15:23:00 fetching corpus: 27050, signal 575439/660632 (executing program) 2022/09/24 15:23:00 fetching corpus: 27100, signal 576059/660632 (executing program) 2022/09/24 15:23:01 fetching corpus: 27150, signal 576405/660632 (executing program) 2022/09/24 15:23:01 fetching corpus: 27200, signal 576706/660632 (executing program) 2022/09/24 15:23:01 fetching corpus: 27250, signal 577307/660632 (executing program) 2022/09/24 15:23:01 fetching corpus: 27300, signal 577655/660632 (executing program) 2022/09/24 15:23:01 fetching corpus: 27350, signal 578027/660632 (executing program) 2022/09/24 15:23:02 fetching corpus: 27400, signal 578298/660632 (executing program) 2022/09/24 15:23:02 fetching corpus: 27450, signal 578594/660632 (executing program) 2022/09/24 15:23:02 fetching corpus: 27500, signal 578914/660632 (executing program) 2022/09/24 15:23:02 fetching corpus: 27550, signal 579196/660632 (executing program) 2022/09/24 15:23:02 fetching corpus: 27600, signal 579530/660632 (executing program) 2022/09/24 15:23:03 fetching corpus: 27650, signal 579981/660632 (executing program) 2022/09/24 15:23:03 fetching corpus: 27700, signal 580230/660632 (executing program) 2022/09/24 15:23:03 fetching corpus: 27750, signal 580515/660632 (executing program) 2022/09/24 15:23:03 fetching corpus: 27800, signal 580751/660632 (executing program) 2022/09/24 15:23:03 fetching corpus: 27850, signal 581060/660632 (executing program) 2022/09/24 15:23:04 fetching corpus: 27900, signal 581270/660632 (executing program) 2022/09/24 15:23:04 fetching corpus: 27950, signal 581571/660632 (executing program) 2022/09/24 15:23:04 fetching corpus: 28000, signal 581914/660632 (executing program) 2022/09/24 15:23:04 fetching corpus: 28050, signal 582191/660632 (executing program) 2022/09/24 15:23:04 fetching corpus: 28100, signal 582615/660632 (executing program) 2022/09/24 15:23:05 fetching corpus: 28150, signal 582906/660632 (executing program) 2022/09/24 15:23:05 fetching corpus: 28200, signal 583174/660632 (executing program) 2022/09/24 15:23:05 fetching corpus: 28250, signal 583697/660632 (executing program) 2022/09/24 15:23:05 fetching corpus: 28300, signal 583986/660632 (executing program) 2022/09/24 15:23:05 fetching corpus: 28350, signal 584310/660632 (executing program) 2022/09/24 15:23:06 fetching corpus: 28400, signal 584615/660634 (executing program) 2022/09/24 15:23:06 fetching corpus: 28450, signal 584845/660634 (executing program) 2022/09/24 15:23:06 fetching corpus: 28500, signal 585144/660634 (executing program) 2022/09/24 15:23:06 fetching corpus: 28550, signal 585489/660634 (executing program) 2022/09/24 15:23:06 fetching corpus: 28600, signal 585747/660634 (executing program) 2022/09/24 15:23:07 fetching corpus: 28650, signal 586059/660634 (executing program) 2022/09/24 15:23:07 fetching corpus: 28700, signal 586320/660634 (executing program) 2022/09/24 15:23:07 fetching corpus: 28750, signal 586504/660634 (executing program) 2022/09/24 15:23:07 fetching corpus: 28800, signal 586834/660634 (executing program) 2022/09/24 15:23:07 fetching corpus: 28850, signal 587069/660634 (executing program) 2022/09/24 15:23:08 fetching corpus: 28900, signal 587406/660634 (executing program) 2022/09/24 15:23:08 fetching corpus: 28950, signal 587696/660634 (executing program) 2022/09/24 15:23:08 fetching corpus: 29000, signal 588128/660634 (executing program) 2022/09/24 15:23:08 fetching corpus: 29050, signal 588494/660634 (executing program) 2022/09/24 15:23:08 fetching corpus: 29100, signal 588787/660634 (executing program) 2022/09/24 15:23:08 fetching corpus: 29150, signal 589055/660634 (executing program) 2022/09/24 15:23:09 fetching corpus: 29200, signal 589452/660634 (executing program) 2022/09/24 15:23:09 fetching corpus: 29250, signal 589705/660634 (executing program) 2022/09/24 15:23:09 fetching corpus: 29300, signal 589976/660634 (executing program) 2022/09/24 15:23:09 fetching corpus: 29350, signal 590166/660634 (executing program) 2022/09/24 15:23:10 fetching corpus: 29400, signal 590409/660636 (executing program) 2022/09/24 15:23:10 fetching corpus: 29450, signal 590764/660639 (executing program) 2022/09/24 15:23:10 fetching corpus: 29500, signal 590959/660639 (executing program) 2022/09/24 15:23:10 fetching corpus: 29550, signal 591315/660639 (executing program) 2022/09/24 15:23:10 fetching corpus: 29600, signal 591602/660641 (executing program) 2022/09/24 15:23:10 fetching corpus: 29650, signal 591877/660641 (executing program) 2022/09/24 15:23:11 fetching corpus: 29700, signal 592143/660641 (executing program) 2022/09/24 15:23:11 fetching corpus: 29750, signal 592467/660641 (executing program) 2022/09/24 15:23:11 fetching corpus: 29800, signal 592688/660641 (executing program) 2022/09/24 15:23:11 fetching corpus: 29850, signal 592993/660646 (executing program) 2022/09/24 15:23:12 fetching corpus: 29900, signal 593330/660646 (executing program) 2022/09/24 15:23:12 fetching corpus: 29950, signal 593679/660646 (executing program) 2022/09/24 15:23:12 fetching corpus: 30000, signal 594047/660646 (executing program) 2022/09/24 15:23:12 fetching corpus: 30050, signal 594372/660646 (executing program) 2022/09/24 15:23:13 fetching corpus: 30100, signal 594726/660646 (executing program) 2022/09/24 15:23:13 fetching corpus: 30150, signal 595036/660646 (executing program) 2022/09/24 15:23:13 fetching corpus: 30200, signal 595400/660648 (executing program) 2022/09/24 15:23:13 fetching corpus: 30250, signal 595656/660648 (executing program) 2022/09/24 15:23:13 fetching corpus: 30300, signal 596014/660648 (executing program) 2022/09/24 15:23:13 fetching corpus: 30350, signal 596428/660648 (executing program) 2022/09/24 15:23:14 fetching corpus: 30400, signal 596644/660648 (executing program) 2022/09/24 15:23:14 fetching corpus: 30450, signal 596965/660648 (executing program) 2022/09/24 15:23:14 fetching corpus: 30500, signal 597365/660648 (executing program) 2022/09/24 15:23:14 fetching corpus: 30550, signal 597658/660648 (executing program) 2022/09/24 15:23:14 fetching corpus: 30600, signal 597978/660648 (executing program) 2022/09/24 15:23:15 fetching corpus: 30650, signal 598420/660648 (executing program) 2022/09/24 15:23:15 fetching corpus: 30700, signal 598672/660648 (executing program) 2022/09/24 15:23:15 fetching corpus: 30750, signal 599021/660648 (executing program) 2022/09/24 15:23:15 fetching corpus: 30800, signal 599270/660648 (executing program) 2022/09/24 15:23:16 fetching corpus: 30850, signal 599462/660648 (executing program) 2022/09/24 15:23:16 fetching corpus: 30900, signal 599814/660648 (executing program) 2022/09/24 15:23:16 fetching corpus: 30950, signal 600056/660649 (executing program) 2022/09/24 15:23:16 fetching corpus: 31000, signal 600329/660649 (executing program) 2022/09/24 15:23:16 fetching corpus: 31050, signal 600558/660649 (executing program) 2022/09/24 15:23:17 fetching corpus: 31100, signal 600900/660661 (executing program) 2022/09/24 15:23:17 fetching corpus: 31150, signal 601187/660661 (executing program) 2022/09/24 15:23:17 fetching corpus: 31200, signal 601478/660662 (executing program) 2022/09/24 15:23:17 fetching corpus: 31250, signal 601764/660662 (executing program) 2022/09/24 15:23:17 fetching corpus: 31300, signal 601972/660662 (executing program) 2022/09/24 15:23:18 fetching corpus: 31350, signal 602243/660662 (executing program) 2022/09/24 15:23:18 fetching corpus: 31400, signal 602501/660662 (executing program) 2022/09/24 15:23:18 fetching corpus: 31450, signal 602706/660664 (executing program) 2022/09/24 15:23:18 fetching corpus: 31500, signal 602958/660664 (executing program) 2022/09/24 15:23:18 fetching corpus: 31550, signal 603278/660666 (executing program) 2022/09/24 15:23:19 fetching corpus: 31600, signal 603558/660666 (executing program) 2022/09/24 15:23:19 fetching corpus: 31650, signal 603816/660667 (executing program) 2022/09/24 15:23:19 fetching corpus: 31700, signal 604096/660667 (executing program) 2022/09/24 15:23:19 fetching corpus: 31750, signal 604393/660667 (executing program) 2022/09/24 15:23:19 fetching corpus: 31800, signal 604718/660667 (executing program) 2022/09/24 15:23:19 fetching corpus: 31850, signal 605011/660667 (executing program) 2022/09/24 15:23:19 fetching corpus: 31900, signal 605387/660668 (executing program) 2022/09/24 15:23:20 fetching corpus: 31950, signal 605615/660668 (executing program) 2022/09/24 15:23:20 fetching corpus: 32000, signal 605885/660668 (executing program) 2022/09/24 15:23:20 fetching corpus: 32050, signal 606071/660668 (executing program) 2022/09/24 15:23:20 fetching corpus: 32100, signal 606283/660668 (executing program) 2022/09/24 15:23:20 fetching corpus: 32150, signal 606542/660668 (executing program) 2022/09/24 15:23:21 fetching corpus: 32200, signal 606823/660668 (executing program) 2022/09/24 15:23:21 fetching corpus: 32250, signal 607061/660668 (executing program) 2022/09/24 15:23:21 fetching corpus: 32300, signal 607343/660668 (executing program) 2022/09/24 15:23:22 fetching corpus: 32350, signal 607608/660669 (executing program) 2022/09/24 15:23:22 fetching corpus: 32400, signal 607832/660669 (executing program) 2022/09/24 15:23:22 fetching corpus: 32450, signal 608028/660670 (executing program) 2022/09/24 15:23:22 fetching corpus: 32500, signal 608266/660670 (executing program) 2022/09/24 15:23:22 fetching corpus: 32550, signal 608558/660670 (executing program) 2022/09/24 15:23:22 fetching corpus: 32600, signal 608770/660670 (executing program) 2022/09/24 15:23:23 fetching corpus: 32650, signal 609181/660670 (executing program) 2022/09/24 15:23:23 fetching corpus: 32700, signal 609463/660670 (executing program) 2022/09/24 15:23:23 fetching corpus: 32750, signal 609643/660672 (executing program) 2022/09/24 15:23:23 fetching corpus: 32800, signal 609914/660672 (executing program) 2022/09/24 15:23:23 fetching corpus: 32850, signal 610201/660672 (executing program) 2022/09/24 15:23:23 fetching corpus: 32900, signal 610457/660672 (executing program) 2022/09/24 15:23:24 fetching corpus: 32950, signal 610827/660672 (executing program) 2022/09/24 15:23:24 fetching corpus: 33000, signal 611134/660672 (executing program) 2022/09/24 15:23:24 fetching corpus: 33050, signal 611342/660673 (executing program) 2022/09/24 15:23:24 fetching corpus: 33100, signal 611530/660674 (executing program) 2022/09/24 15:23:25 fetching corpus: 33150, signal 611802/660674 (executing program) 2022/09/24 15:23:25 fetching corpus: 33200, signal 612171/660674 (executing program) 2022/09/24 15:23:25 fetching corpus: 33250, signal 612535/660674 (executing program) 2022/09/24 15:23:25 fetching corpus: 33300, signal 612903/660674 (executing program) 2022/09/24 15:23:26 fetching corpus: 33350, signal 613178/660674 (executing program) [ 199.860300][ T1352] ieee802154 phy0 wpan0: encryption failed: -22 [ 199.866754][ T1352] ieee802154 phy1 wpan1: encryption failed: -22 2022/09/24 15:23:26 fetching corpus: 33400, signal 613380/660674 (executing program) 2022/09/24 15:23:26 fetching corpus: 33450, signal 613681/660674 (executing program) 2022/09/24 15:23:26 fetching corpus: 33500, signal 613986/660674 (executing program) 2022/09/24 15:23:26 fetching corpus: 33550, signal 614209/660674 (executing program) 2022/09/24 15:23:26 fetching corpus: 33600, signal 614496/660677 (executing program) 2022/09/24 15:23:26 fetching corpus: 33650, signal 614718/660677 (executing program) 2022/09/24 15:23:27 fetching corpus: 33700, signal 614959/660677 (executing program) 2022/09/24 15:23:27 fetching corpus: 33750, signal 615230/660677 (executing program) 2022/09/24 15:23:27 fetching corpus: 33800, signal 615503/660677 (executing program) 2022/09/24 15:23:27 fetching corpus: 33850, signal 615749/660677 (executing program) 2022/09/24 15:23:27 fetching corpus: 33900, signal 615993/660677 (executing program) 2022/09/24 15:23:28 fetching corpus: 33950, signal 616202/660678 (executing program) 2022/09/24 15:23:28 fetching corpus: 34000, signal 616670/660678 (executing program) 2022/09/24 15:23:28 fetching corpus: 34050, signal 616886/660678 (executing program) 2022/09/24 15:23:28 fetching corpus: 34100, signal 617115/660678 (executing program) 2022/09/24 15:23:29 fetching corpus: 34150, signal 617382/660678 (executing program) 2022/09/24 15:23:29 fetching corpus: 34200, signal 617771/660678 (executing program) 2022/09/24 15:23:29 fetching corpus: 34250, signal 617988/660678 (executing program) 2022/09/24 15:23:29 fetching corpus: 34300, signal 618179/660678 (executing program) 2022/09/24 15:23:29 fetching corpus: 34350, signal 618399/660679 (executing program) 2022/09/24 15:23:29 fetching corpus: 34400, signal 618557/660679 (executing program) 2022/09/24 15:23:30 fetching corpus: 34450, signal 618842/660683 (executing program) 2022/09/24 15:23:30 fetching corpus: 34500, signal 619096/660683 (executing program) 2022/09/24 15:23:30 fetching corpus: 34550, signal 619285/660690 (executing program) 2022/09/24 15:23:30 fetching corpus: 34600, signal 619582/660690 (executing program) 2022/09/24 15:23:30 fetching corpus: 34650, signal 619792/660690 (executing program) 2022/09/24 15:23:31 fetching corpus: 34700, signal 620095/660690 (executing program) 2022/09/24 15:23:31 fetching corpus: 34750, signal 620464/660690 (executing program) 2022/09/24 15:23:31 fetching corpus: 34800, signal 620695/660691 (executing program) 2022/09/24 15:23:31 fetching corpus: 34850, signal 621001/660691 (executing program) 2022/09/24 15:23:32 fetching corpus: 34900, signal 621401/660691 (executing program) 2022/09/24 15:23:32 fetching corpus: 34950, signal 621855/660691 (executing program) 2022/09/24 15:23:32 fetching corpus: 35000, signal 622051/660692 (executing program) 2022/09/24 15:23:32 fetching corpus: 35050, signal 622263/660693 (executing program) 2022/09/24 15:23:33 fetching corpus: 35100, signal 622565/660694 (executing program) 2022/09/24 15:23:33 fetching corpus: 35150, signal 622810/660694 (executing program) 2022/09/24 15:23:33 fetching corpus: 35200, signal 623006/660695 (executing program) 2022/09/24 15:23:33 fetching corpus: 35250, signal 623241/660699 (executing program) 2022/09/24 15:23:34 fetching corpus: 35300, signal 623476/660699 (executing program) 2022/09/24 15:23:34 fetching corpus: 35350, signal 623701/660699 (executing program) 2022/09/24 15:23:34 fetching corpus: 35400, signal 623927/660700 (executing program) 2022/09/24 15:23:34 fetching corpus: 35450, signal 624194/660701 (executing program) 2022/09/24 15:23:34 fetching corpus: 35500, signal 624414/660701 (executing program) 2022/09/24 15:23:34 fetching corpus: 35550, signal 624645/660703 (executing program) 2022/09/24 15:23:35 fetching corpus: 35600, signal 624867/660704 (executing program) 2022/09/24 15:23:35 fetching corpus: 35650, signal 625176/660704 (executing program) 2022/09/24 15:23:35 fetching corpus: 35700, signal 625378/660704 (executing program) 2022/09/24 15:23:35 fetching corpus: 35750, signal 625574/660704 (executing program) 2022/09/24 15:23:35 fetching corpus: 35800, signal 625830/660704 (executing program) 2022/09/24 15:23:36 fetching corpus: 35850, signal 626046/660704 (executing program) 2022/09/24 15:23:36 fetching corpus: 35900, signal 626365/660704 (executing program) 2022/09/24 15:23:36 fetching corpus: 35950, signal 626676/660716 (executing program) 2022/09/24 15:23:36 fetching corpus: 36000, signal 626915/660716 (executing program) 2022/09/24 15:23:37 fetching corpus: 36050, signal 627181/660722 (executing program) 2022/09/24 15:23:37 fetching corpus: 36100, signal 627466/660722 (executing program) 2022/09/24 15:23:37 fetching corpus: 36150, signal 627674/660723 (executing program) 2022/09/24 15:23:37 fetching corpus: 36200, signal 627860/660723 (executing program) 2022/09/24 15:23:37 fetching corpus: 36250, signal 628061/660723 (executing program) 2022/09/24 15:23:38 fetching corpus: 36300, signal 628230/660723 (executing program) 2022/09/24 15:23:38 fetching corpus: 36350, signal 628525/660723 (executing program) 2022/09/24 15:23:38 fetching corpus: 36400, signal 628810/660723 (executing program) 2022/09/24 15:23:38 fetching corpus: 36450, signal 629053/660723 (executing program) 2022/09/24 15:23:38 fetching corpus: 36500, signal 629300/660723 (executing program) 2022/09/24 15:23:39 fetching corpus: 36550, signal 629566/660726 (executing program) 2022/09/24 15:23:39 fetching corpus: 36600, signal 629796/660727 (executing program) 2022/09/24 15:23:39 fetching corpus: 36650, signal 630004/660727 (executing program) 2022/09/24 15:23:39 fetching corpus: 36700, signal 630286/660727 (executing program) 2022/09/24 15:23:39 fetching corpus: 36750, signal 630534/660739 (executing program) 2022/09/24 15:23:40 fetching corpus: 36800, signal 630721/660745 (executing program) 2022/09/24 15:23:40 fetching corpus: 36850, signal 630994/660745 (executing program) 2022/09/24 15:23:41 fetching corpus: 36900, signal 631207/660745 (executing program) 2022/09/24 15:23:41 fetching corpus: 36950, signal 631577/660745 (executing program) 2022/09/24 15:23:41 fetching corpus: 37000, signal 631869/660749 (executing program) 2022/09/24 15:23:41 fetching corpus: 37050, signal 632180/660749 (executing program) 2022/09/24 15:23:42 fetching corpus: 37100, signal 632378/660749 (executing program) 2022/09/24 15:23:42 fetching corpus: 37150, signal 632626/660749 (executing program) 2022/09/24 15:23:42 fetching corpus: 37200, signal 632818/660752 (executing program) 2022/09/24 15:23:42 fetching corpus: 37250, signal 633059/660752 (executing program) 2022/09/24 15:23:42 fetching corpus: 37300, signal 633442/660752 (executing program) 2022/09/24 15:23:42 fetching corpus: 37350, signal 633668/660752 (executing program) 2022/09/24 15:23:43 fetching corpus: 37400, signal 633822/660752 (executing program) 2022/09/24 15:23:43 fetching corpus: 37450, signal 634042/660752 (executing program) 2022/09/24 15:23:43 fetching corpus: 37500, signal 634310/660752 (executing program) 2022/09/24 15:23:43 fetching corpus: 37550, signal 634464/660752 (executing program) 2022/09/24 15:23:43 fetching corpus: 37600, signal 634716/660753 (executing program) 2022/09/24 15:23:44 fetching corpus: 37650, signal 634960/660753 (executing program) 2022/09/24 15:23:44 fetching corpus: 37700, signal 635167/660753 (executing program) 2022/09/24 15:23:44 fetching corpus: 37750, signal 635392/660753 (executing program) 2022/09/24 15:23:44 fetching corpus: 37800, signal 635621/660753 (executing program) 2022/09/24 15:23:44 fetching corpus: 37850, signal 635802/660753 (executing program) 2022/09/24 15:23:44 fetching corpus: 37900, signal 636047/660753 (executing program) 2022/09/24 15:23:45 fetching corpus: 37950, signal 636218/660753 (executing program) 2022/09/24 15:23:45 fetching corpus: 38000, signal 636494/660753 (executing program) 2022/09/24 15:23:45 fetching corpus: 38050, signal 636827/660759 (executing program) 2022/09/24 15:23:45 fetching corpus: 38100, signal 637086/660759 (executing program) 2022/09/24 15:23:45 fetching corpus: 38150, signal 637262/660759 (executing program) 2022/09/24 15:23:46 fetching corpus: 38199, signal 637442/660765 (executing program) 2022/09/24 15:23:46 fetching corpus: 38199, signal 637442/660765 (executing program) 2022/09/24 15:23:48 starting 4 fuzzer processes 15:23:48 executing program 0: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:23:48 executing program 1: mknod(&(0x7f0000000100)='./file0\x00', 0x1ffb, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x2, 0x0) write(r0, 0x0, 0x0) 15:23:48 executing program 2: r0 = epoll_create1(0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) 15:23:48 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0xb}, './file0\x00'}) [ 222.767676][ T39] audit: type=1400 audit(1664033028.952:86): avc: denied { execmem } for pid=3711 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 223.031616][ T39] audit: type=1400 audit(1664033029.212:87): avc: denied { mounton } for pid=3714 comm="syz-executor.3" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 223.052284][ T39] audit: type=1400 audit(1664033029.212:88): avc: denied { mount } for pid=3714 comm="syz-executor.3" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 223.072688][ T39] audit: type=1400 audit(1664033029.212:89): avc: denied { create } for pid=3714 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 223.090202][ T39] audit: type=1400 audit(1664033029.212:90): avc: denied { read write } for pid=3714 comm="syz-executor.3" name="vhci" dev="devtmpfs" ino=1104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 223.107923][ T39] audit: type=1400 audit(1664033029.222:91): avc: denied { open } for pid=3714 comm="syz-executor.3" path="/dev/vhci" dev="devtmpfs" ino=1104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 224.114307][ T39] audit: type=1400 audit(1664033030.292:92): avc: denied { ioctl } for pid=3716 comm="syz-executor.0" path="socket:[2749]" dev="sockfs" ino=2749 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 224.146445][ T3728] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 224.149264][ T3725] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 224.149410][ T3727] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 224.152131][ T3727] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 224.152771][ T3728] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 224.153454][ T3728] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 224.155719][ T3728] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 224.156208][ T3728] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 224.156445][ T3728] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 224.160568][ T3728] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 224.163862][ T39] audit: type=1400 audit(1664033030.342:93): avc: denied { read } for pid=3714 comm="syz-executor.3" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 224.164015][ T3725] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 224.170422][ T3728] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 224.173858][ T3727] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 224.175316][ T39] audit: type=1400 audit(1664033030.342:94): avc: denied { open } for pid=3714 comm="syz-executor.3" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 224.175365][ T39] audit: type=1400 audit(1664033030.342:95): avc: denied { mounton } for pid=3714 comm="syz-executor.3" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 224.186043][ T3725] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 224.190775][ T3718] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 224.190826][ T3727] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 224.191163][ T3727] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 224.191331][ T3727] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 224.195475][ T3725] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 224.209574][ T3718] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 224.304253][ T3718] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 224.312416][ T3718] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 224.321774][ T3718] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 224.331211][ T3718] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 224.492801][ T3714] chnl_net:caif_netlink_parms(): no params data found [ 224.693531][ T3715] chnl_net:caif_netlink_parms(): no params data found [ 224.739734][ T3714] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.745367][ T3714] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.751183][ T3714] device bridge_slave_0 entered promiscuous mode [ 224.761333][ T3716] chnl_net:caif_netlink_parms(): no params data found [ 224.805966][ T3714] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.811364][ T3714] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.816865][ T3714] device bridge_slave_1 entered promiscuous mode [ 224.974831][ T3714] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.022035][ T3714] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 225.076036][ T3715] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.081898][ T3715] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.088318][ T3715] device bridge_slave_0 entered promiscuous mode [ 225.138204][ T3715] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.144174][ T3715] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.156311][ T3715] device bridge_slave_1 entered promiscuous mode [ 225.180309][ T3714] team0: Port device team_slave_0 added [ 225.187272][ T3716] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.192945][ T3716] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.199891][ T3716] device bridge_slave_0 entered promiscuous mode [ 225.278951][ T3714] team0: Port device team_slave_1 added [ 225.305379][ T3716] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.310358][ T3716] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.315772][ T3716] device bridge_slave_1 entered promiscuous mode [ 225.349677][ T3715] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.409858][ T3715] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 225.442998][ T3714] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 225.449172][ T3714] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.469565][ T3714] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 225.483628][ T3716] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.537088][ T3717] chnl_net:caif_netlink_parms(): no params data found [ 225.545254][ T3714] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 225.551267][ T3714] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.572321][ T3714] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 225.591280][ T3716] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 225.601972][ T3715] team0: Port device team_slave_0 added [ 225.653552][ T3715] team0: Port device team_slave_1 added [ 225.791829][ T3716] team0: Port device team_slave_0 added [ 225.860450][ T3716] team0: Port device team_slave_1 added [ 225.864815][ T3715] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 225.870098][ T3715] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.888800][ T3715] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 225.922880][ T3714] device hsr_slave_0 entered promiscuous mode [ 225.931545][ T3714] device hsr_slave_1 entered promiscuous mode [ 225.975759][ T3715] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 225.980996][ T3715] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.000149][ T3715] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 226.009583][ T3717] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.014361][ T3717] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.021707][ T3717] device bridge_slave_0 entered promiscuous mode [ 226.030158][ T3717] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.036540][ T3717] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.043270][ T3717] device bridge_slave_1 entered promiscuous mode [ 226.048856][ T3716] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 226.054160][ T3716] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.075157][ T3716] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 226.151388][ T3716] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 226.158720][ T3716] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.176710][ T3716] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 226.183514][ T38] Bluetooth: hci2: command 0x0409 tx timeout [ 226.238837][ T3717] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 226.257374][ T38] Bluetooth: hci0: command 0x0409 tx timeout [ 226.263145][ T38] Bluetooth: hci1: command 0x0409 tx timeout [ 226.282359][ T3716] device hsr_slave_0 entered promiscuous mode [ 226.290285][ T3716] device hsr_slave_1 entered promiscuous mode [ 226.296644][ T3716] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 226.304741][ T3716] Cannot create hsr debugfs directory [ 226.339512][ T3717] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 226.403210][ T3715] device hsr_slave_0 entered promiscuous mode [ 226.410630][ T3715] device hsr_slave_1 entered promiscuous mode [ 226.416047][ T3715] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 226.417752][ T6] Bluetooth: hci3: command 0x0409 tx timeout [ 226.422121][ T3715] Cannot create hsr debugfs directory [ 226.474660][ T3717] team0: Port device team_slave_0 added [ 226.538786][ T3717] team0: Port device team_slave_1 added [ 226.615000][ T3717] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 226.619360][ T3717] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.637355][ T3717] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 226.694856][ T3717] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 226.701456][ T3717] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.724610][ T3717] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 226.901021][ T3717] device hsr_slave_0 entered promiscuous mode [ 226.908958][ T3717] device hsr_slave_1 entered promiscuous mode [ 226.914973][ T3717] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 226.921089][ T3717] Cannot create hsr debugfs directory [ 227.134291][ T3714] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 227.149026][ T3714] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 227.173455][ T3714] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 227.190577][ T3714] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 227.252154][ T3716] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 227.262705][ T3716] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 227.274752][ T3716] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 227.287422][ T3716] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 227.386894][ T3715] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 227.395205][ T3715] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 227.410830][ T3715] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 227.440650][ T3714] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.458852][ T3715] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 227.523950][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.533207][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.559869][ T3714] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.583771][ T3717] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 227.594153][ T3717] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 227.604224][ T3717] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 227.614451][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.622589][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.632363][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.642333][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.670012][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.679242][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.689198][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.702128][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.708387][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.716512][ T3717] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 227.757554][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.789964][ T3716] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.806037][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.831514][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.840246][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.847942][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 227.856774][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.864191][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 227.869280][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.904462][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 227.923914][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 227.936944][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.975313][ T3716] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.995060][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.003612][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.013342][ T3714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.052465][ T3761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.060896][ T3761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.073810][ T3761] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.080879][ T3761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.102655][ T3761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.148966][ T3715] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.170337][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.186328][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.198334][ T3760] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.208412][ T3760] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.266045][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.267413][ T3760] Bluetooth: hci2: command 0x041b tx timeout [ 228.297625][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.306793][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.318808][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.333195][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.342342][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.347273][ T3766] Bluetooth: hci1: command 0x041b tx timeout [ 228.352215][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.354309][ T3766] Bluetooth: hci0: command 0x041b tx timeout [ 228.386357][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.393795][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.438814][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.451319][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.473698][ T3715] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.484022][ T39] kauditd_printk_skb: 1 callbacks suppressed [ 228.484034][ T39] audit: type=1400 audit(1664033034.662:97): avc: denied { sys_module } for pid=3714 comm="syz-executor.3" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 228.494566][ T3717] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.507199][ T3757] Bluetooth: hci3: command 0x041b tx timeout [ 228.514665][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.522310][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.570707][ T3716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.582999][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.592669][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.602065][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.610759][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.640220][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.649718][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.666469][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.675565][ T29] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.682798][ T29] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.735645][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.742841][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.755657][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.786925][ T3717] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.837235][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.852862][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.865021][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.872726][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.877988][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.888542][ T3748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.894032][ T3748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.902574][ T3748] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.913791][ T3748] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.927294][ T3766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.943489][ T3766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.950638][ T3766] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.957123][ T3766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.983625][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.993929][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.010384][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.020083][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.031777][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.042415][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.050041][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.057331][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.072355][ T3715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.104494][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.113728][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.123124][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.142143][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.154502][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.168472][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.175963][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.214280][ T3717] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 229.236281][ T3717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.249722][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.257489][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.263982][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.287959][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.318186][ T3714] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.342301][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.358478][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.385093][ T3716] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.393807][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 229.401660][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.520490][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 229.528775][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.551468][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.561286][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.596089][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 229.609572][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.637211][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.646356][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.685642][ T3714] device veth0_vlan entered promiscuous mode [ 229.713614][ T3715] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.729776][ T971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 229.738493][ T971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.753450][ T971] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.761115][ T971] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.783643][ T3716] device veth0_vlan entered promiscuous mode [ 229.811031][ T3714] device veth1_vlan entered promiscuous mode [ 229.844460][ T3716] device veth1_vlan entered promiscuous mode [ 229.852053][ T971] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 229.858401][ T971] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.923835][ T971] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.943266][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 229.952000][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.969236][ T3717] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.006490][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 230.016022][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.026214][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.036547][ T3714] device veth0_macvtap entered promiscuous mode [ 230.045937][ T3715] device veth0_vlan entered promiscuous mode [ 230.058561][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 230.066691][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.075536][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.089207][ T3714] device veth1_macvtap entered promiscuous mode [ 230.098477][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.105597][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.112865][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.140237][ T3748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.146444][ T3748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.159485][ T3748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.166077][ T3748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.177084][ T3715] device veth1_vlan entered promiscuous mode [ 230.191571][ T3716] device veth0_macvtap entered promiscuous mode [ 230.215604][ T3714] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 230.226566][ T3716] device veth1_macvtap entered promiscuous mode [ 230.244341][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 230.250496][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 230.256177][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 230.262853][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.270393][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.277748][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.301178][ T3714] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 230.307260][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.315259][ T3760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.326936][ T3766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.333781][ T3766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.342254][ T3760] Bluetooth: hci2: command 0x040f tx timeout [ 230.353012][ T3715] device veth0_macvtap entered promiscuous mode [ 230.358654][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 230.364577][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.370987][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.378438][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.384877][ T3757] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.393567][ T3716] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 230.404687][ T3716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 230.413979][ T3716] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 230.421676][ T3760] Bluetooth: hci0: command 0x040f tx timeout [ 230.425740][ T3714] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.426785][ T3760] Bluetooth: hci1: command 0x040f tx timeout [ 230.434632][ T3714] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.444739][ T3714] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.451376][ T3714] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.462308][ T3717] device veth0_vlan entered promiscuous mode [ 230.469044][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.478547][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.490806][ T3715] device veth1_macvtap entered promiscuous mode [ 230.513501][ T3716] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 230.522444][ T3716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 230.532463][ T3716] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 230.541275][ T3716] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.548284][ T3716] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.554753][ T3716] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.564336][ T3716] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.586624][ T3717] device veth1_vlan entered promiscuous mode [ 230.587491][ T3760] Bluetooth: hci3: command 0x040f tx timeout [ 230.609781][ T971] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.617201][ T971] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 230.624263][ T971] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.631969][ T971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.650986][ T3715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 230.659687][ T3715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 230.669409][ T3715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 230.679779][ T3715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 230.692343][ T3715] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 230.702182][ T3715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 230.710697][ T3715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 230.718654][ T3715] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 230.725910][ T3715] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 230.737726][ T3715] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 230.752350][ T3748] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 230.758734][ T3748] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.765125][ T3748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.772056][ T3748] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.779182][ T3748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.813665][ T39] audit: type=1400 audit(1664033036.992:98): avc: denied { mounton } for pid=3716 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=2383 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 230.837195][ T39] audit: type=1400 audit(1664033037.002:99): avc: denied { mount } for pid=3716 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 230.862318][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.862484][ T39] audit: type=1400 audit(1664033037.042:100): avc: denied { read } for pid=3113 comm="syslogd" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 230.868589][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.894264][ T3717] device veth0_macvtap entered promiscuous mode [ 230.901119][ T3715] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.908087][ T3715] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.914739][ T3715] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.923292][ T3715] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.939884][ T3717] device veth1_macvtap entered promiscuous mode [ 230.979086][ T39] audit: type=1400 audit(1664033037.162:101): avc: denied { read write } for pid=3716 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 230.979299][ T3717] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 231.007074][ T3717] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.011756][ T39] audit: type=1400 audit(1664033037.162:102): avc: denied { open } for pid=3716 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 231.013371][ T3717] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 231.044254][ T39] audit: type=1400 audit(1664033037.162:103): avc: denied { ioctl } for pid=3716 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=656 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 15:23:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000000)=0x5, 0x4) [ 231.067552][ T3793] loop0: detected capacity change from 0 to 4 [ 231.089094][ T3717] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.095333][ T3794] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 231.096850][ T3717] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 231.114549][ T3793] erofs: (device loop0): mounted with root inode @ nid 36. [ 231.115002][ T3717] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.125975][ T39] audit: type=1400 audit(1664033037.192:104): avc: denied { read } for pid=3790 comm="syz-executor.3" name="autofs" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 231.148160][ T3717] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 231.160925][ T39] audit: type=1400 audit(1664033037.192:105): avc: denied { open } for pid=3790 comm="syz-executor.3" path="/dev/autofs" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 15:23:57 executing program 0: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:23:57 executing program 3: ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) listen(r0, 0x0) connect$bt_sco(r0, &(0x7f0000000000), 0x8) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x200, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x8001) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)={0x14, r2, 0x8cbdc66f99df3bb}, 0x14}}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x40, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}]}, 0x40}}, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) [ 231.183505][ T39] audit: type=1400 audit(1664033037.192:106): avc: denied { ioctl } for pid=3790 comm="syz-executor.3" path="/dev/autofs" dev="devtmpfs" ino=103 ioctlcmd=0x9371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 231.192113][ T3786] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 231.207637][ T3786] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.215096][ T3786] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.224388][ T3801] loop0: detected capacity change from 0 to 4 [ 231.226297][ T3786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 231.230382][ T3801] erofs: (device loop0): mounted with root inode @ nid 36. [ 231.238627][ T3717] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 231.249192][ T3717] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.256941][ T3717] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 231.270898][ T3717] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.279222][ T3717] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 231.287558][ T3717] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.301704][ T3717] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 231.333290][ T3786] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 231.343919][ T3786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 231.385530][ T3717] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 231.402563][ T3717] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 231.411698][ T3717] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 231.424452][ T3717] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 231.673181][ T3811] loop2: detected capacity change from 0 to 4 [ 231.674378][ T3812] loop0: detected capacity change from 0 to 4 [ 231.688698][ T3812] erofs: (device loop0): mounted with root inode @ nid 36. [ 231.693083][ T3811] erofs: (device loop2): mounted with root inode @ nid 36. 15:23:57 executing program 0: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:23:57 executing program 2: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:23:57 executing program 1: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) 15:23:57 executing program 0: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:23:57 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) read(r0, &(0x7f0000000100)=""/164, 0xa4) 15:23:57 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000280), 0x0, 0x2) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0xa, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [], 0xf0}}) [ 231.807981][ T3817] loop0: detected capacity change from 0 to 4 [ 231.815385][ T3817] erofs: (device loop0): mounted with root inode @ nid 36. 15:23:58 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) read(r0, &(0x7f0000000100)=""/164, 0xa4) 15:23:58 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:23:58 executing program 1: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000180)=@sg0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1041000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x140802, 0x0) write$FUSE_INIT(r0, &(0x7f00000000c0)={0x50}, 0x50) read$FUSE(r0, 0x0, 0x0) 15:23:58 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) read(r0, &(0x7f0000000100)=""/164, 0xa4) 15:23:58 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) [ 232.417847][ T3760] Bluetooth: hci2: command 0x0419 tx timeout [ 232.498153][ T3760] Bluetooth: hci1: command 0x0419 tx timeout [ 232.504298][ T3760] Bluetooth: hci0: command 0x0419 tx timeout 15:23:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4, 0x7}]}]}, 0x1c}}, 0x0) 15:23:58 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) read(r0, &(0x7f0000000100)=""/164, 0xa4) 15:23:58 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:23:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x1e}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x6, 0x10, 0x0}, 0x15) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f00000008c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=ANY=[@ANYBLOB="000000000000000026bd7000ffdbdf25000001006a13ed7ebb430a9d000000000000000000000001"], 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x2404008d) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000000)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_PORT={0x6}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x68, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRESHEX], 0x28}, 0x1, 0x0, 0x0, 0x24008089}, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = accept4(r2, &(0x7f00000007c0)=@generic, &(0x7f00000000c0)=0x80, 0x80000) sendmsg$TIPC_CMD_GET_NODES(r5, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, 0x0, 0x8, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x30}, 0x20040011) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="01b8", @ANYBLOB="1ccbba61d715393a5c310c66db2aaa3a5cb1e2ad418e0a7c7180ca01eb87769ee411d4409c390027e2294ac1e83cb213abbcdc74", @ANYRES32=r1], 0x34}, 0x1, 0x0, 0x0, 0x91}, 0x20004084) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="20000552da", @ANYRES16=0x0, @ANYBLOB="330a2dbd7000040004000000000000003c00038008000100ffffffff08000200070000000800010000040000080003003d00000008000200e50000000800020029040000080002000002000004000380240005800c000280080003000314000280080002009d01000008000200060000000000000000000000000000000000e41334976853e32c6accff7c373624582ff13e623e9f4b91e90e6fb157943e515d07af5254370e9241557453000000"], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x74, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x10044}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8004}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 15:23:58 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:23:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:23:58 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) [ 232.660157][ T3837] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=3837 comm=syz-executor.3 [ 232.674239][ T3760] Bluetooth: hci3: command 0x0419 tx timeout [ 232.674303][ T3842] loop0: detected capacity change from 0 to 4 [ 232.686673][ T3837] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 232.703879][ T3842] erofs: (device loop0): mounted with root inode @ nid 36. [ 232.794930][ T3837] 8021q: adding VLAN 0 to HW filter on device bond1 [ 232.858944][ T3840] bond1: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 232.880468][ T3840] bond1: (slave ip6tnl1): Error -95 calling set_mac_address [ 233.101668][ T3850] loop0: detected capacity change from 0 to 4 [ 233.109847][ T3850] erofs: (device loop0): mounted with root inode @ nid 36. 15:23:59 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:23:59 executing program 2: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x80044940, &(0x7f00000000c0)) 15:23:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:23:59 executing program 2: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x80044940, &(0x7f00000000c0)) 15:23:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x1e}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x6, 0x10, 0x0}, 0x15) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f00000008c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=ANY=[@ANYBLOB="000000000000000026bd7000ffdbdf25000001006a13ed7ebb430a9d000000000000000000000001"], 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x2404008d) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000000)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_PORT={0x6}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x68, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRESHEX], 0x28}, 0x1, 0x0, 0x0, 0x24008089}, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = accept4(r2, &(0x7f00000007c0)=@generic, &(0x7f00000000c0)=0x80, 0x80000) sendmsg$TIPC_CMD_GET_NODES(r5, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, 0x0, 0x8, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x30}, 0x20040011) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="01b8", @ANYBLOB="1ccbba61d715393a5c310c66db2aaa3a5cb1e2ad418e0a7c7180ca01eb87769ee411d4409c390027e2294ac1e83cb213abbcdc74", @ANYRES32=r1], 0x34}, 0x1, 0x0, 0x0, 0x91}, 0x20004084) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="20000552da", @ANYRES16=0x0, @ANYBLOB="330a2dbd7000040004000000000000003c00038008000100ffffffff08000200070000000800010000040000080003003d00000008000200e50000000800020029040000080002000002000004000380240005800c000280080003000314000280080002009d01000008000200060000000000000000000000000000000000e41334976853e32c6accff7c373624582ff13e623e9f4b91e90e6fb157943e515d07af5254370e9241557453000000"], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x74, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x10044}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8004}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x1e}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x6, 0x10, 0x0}, 0x15) (async) socket$netlink(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$nl_route(r1, &(0x7f00000008c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=ANY=[@ANYBLOB="000000000000000026bd7000ffdbdf25000001006a13ed7ebb430a9d000000000000000000000001"], 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x2404008d) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000001300), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000000)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_PORT={0x6}]}]}, 0x28}}, 0x0) (async) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x68, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) (async) socket(0x10, 0x803, 0x0) (async) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRESHEX], 0x28}, 0x1, 0x0, 0x0, 0x24008089}, 0x0) (async) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) (async) accept4(r2, &(0x7f00000007c0)=@generic, &(0x7f00000000c0)=0x80, 0x80000) (async) sendmsg$TIPC_CMD_GET_NODES(r5, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, 0x0, 0x8, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x30}, 0x20040011) (async) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="01b8", @ANYBLOB="1ccbba61d715393a5c310c66db2aaa3a5cb1e2ad418e0a7c7180ca01eb87769ee411d4409c390027e2294ac1e83cb213abbcdc74", @ANYRES32=r1], 0x34}, 0x1, 0x0, 0x0, 0x91}, 0x20004084) (async) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="20000552da", @ANYRES16=0x0, @ANYBLOB="330a2dbd7000040004000000000000003c00038008000100ffffffff08000200070000000800010000040000080003003d00000008000200e50000000800020029040000080002000002000004000380240005800c000280080003000314000280080002009d01000008000200060000000000000000000000000000000000e41334976853e32c6accff7c373624582ff13e623e9f4b91e90e6fb157943e515d07af5254370e9241557453000000"], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) (async) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) (async) sendmsg$nl_route(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) (async) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x74, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x10044}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8004}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) (async) 15:23:59 executing program 2: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x80044940, &(0x7f00000000c0)) [ 233.155534][ T3857] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=3857 comm=syz-executor.3 15:23:59 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) [ 233.184886][ T3857] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 233.204728][ T3862] loop0: detected capacity change from 0 to 4 [ 233.215945][ T3862] erofs: (device loop0): mounted with root inode @ nid 36. [ 233.238206][ T3857] 8021q: adding VLAN 0 to HW filter on device bond2 15:23:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:23:59 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) 15:23:59 executing program 0: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, 0x0) [ 233.284060][ T3863] bond2: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 233.295551][ T3863] bond2: (slave ip6tnl1): Error -95 calling set_mac_address 15:23:59 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) [ 233.324127][ T3868] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 233.342580][ T3885] loop0: detected capacity change from 0 to 4 [ 233.351030][ T3885] erofs: (device loop0): mounted with root inode @ nid 36. [ 233.352082][ T3868] bond3 (uninitialized): Released all slaves 15:23:59 executing program 0: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, 0x0) 15:23:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:23:59 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) [ 233.470157][ T3892] loop0: detected capacity change from 0 to 4 [ 233.492690][ T3892] erofs: (device loop0): mounted with root inode @ nid 36. [ 233.609481][ T3895] loop0: detected capacity change from 0 to 4 [ 233.667399][ T3895] erofs: (device loop0): mounted with root inode @ nid 36. [ 233.708852][ T3898] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=3898 comm=syz-executor.3 15:23:59 executing program 0: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, 0x0) 15:23:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x1e}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x6, 0x10, 0x0}, 0x15) (async) r0 = socket$netlink(0x10, 0x3, 0x0) (async) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$nl_route(r1, &(0x7f00000008c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=ANY=[@ANYBLOB="000000000000000026bd7000ffdbdf25000001006a13ed7ebb430a9d000000000000000000000001"], 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x2404008d) (async) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000000)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_PORT={0x6}]}]}, 0x28}}, 0x0) (async) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x68, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) (async) r4 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRESHEX], 0x28}, 0x1, 0x0, 0x0, 0x24008089}, 0x0) (async) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) (async) r5 = accept4(r2, &(0x7f00000007c0)=@generic, &(0x7f00000000c0)=0x80, 0x80000) sendmsg$TIPC_CMD_GET_NODES(r5, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, 0x0, 0x8, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x30}, 0x20040011) (async) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="01b8", @ANYBLOB="1ccbba61d715393a5c310c66db2aaa3a5cb1e2ad418e0a7c7180ca01eb87769ee411d4409c390027e2294ac1e83cb213abbcdc74", @ANYRES32=r1], 0x34}, 0x1, 0x0, 0x0, 0x91}, 0x20004084) (async) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="20000552da", @ANYRES16=0x0, @ANYBLOB="330a2dbd7000040004000000000000003c00038008000100ffffffff08000200070000000800010000040000080003003d00000008000200e50000000800020029040000080002000002000004000380240005800c000280080003000314000280080002009d01000008000200060000000000000000000000000000000000e41334976853e32c6accff7c373624582ff13e623e9f4b91e90e6fb157943e515d07af5254370e9241557453000000"], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) (async) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) (async) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x74, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x10044}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8004}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 15:23:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, 0x0, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:23:59 executing program 2: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x80044940, &(0x7f00000000c0)) 15:23:59 executing program 2: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x80044940, &(0x7f00000000c0)) 15:23:59 executing program 0: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)) [ 233.757227][ T3908] loop0: detected capacity change from 0 to 4 [ 233.768023][ T3794] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 233.776822][ T3794] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 233.814085][ T3794] Buffer I/O error on dev loop0, logical block 0, async page read [ 233.844524][ T3908] erofs: (device loop0): mounted with root inode @ nid 36. [ 234.091085][ T3915] loop0: detected capacity change from 0 to 4 15:24:00 executing program 0: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)) 15:24:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, 0x0, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:00 executing program 2: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x80044940, &(0x7f00000000c0)) 15:24:00 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 234.120828][ T3915] erofs: (device loop0): mounted with root inode @ nid 36. [ 234.225989][ T3921] loop0: detected capacity change from 0 to 4 15:24:00 executing program 3: syz_emit_ethernet(0x7e, &(0x7f00000002c0)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, 'tC~', 0x48, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', {[@srh={0x0, 0x8, 0x4, 0x4, 0x0, 0x0, 0x0, [@private1, @loopback, @private0, @ipv4={'\x00', '\xff\xff', @loopback}]}]}}}}}, 0x0) 15:24:00 executing program 0: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)) 15:24:00 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, 0x0) 15:24:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, 0x0, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 234.233769][ T3794] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 234.260586][ T3921] erofs: (device loop0): mounted with root inode @ nid 36. 15:24:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="443c02c1ad696c261d24beb5d20a395847bbed4de6d6889a4c6353caac3151503acd025808fde266475037d4ca030803804377718fbbdd5e10b7153bc548c2efa61474576d1e0fc289b4208f30e6e2c3d943b07b9d1f13119339ad831660d352b15fde960bf8dc23479920153a579ef96e0d41efc906fb2bf92c31bd6d96d2505582a5401addf0fb226c8cba59bc0429c39a8648986cd18a9f673b0d5dce6a02a4d289b0b248d70b74f87c432085057ba596caf6bbe7298d39bc947102c3dec6ad7e48fe7612f639bde4227b6b6d3e065f2fd35eaa22c6f822d4232326cd09563e1b0f3bed8bdefb398418e8a3f8e08e8e815f7a5720b789bb60b1b0e000d87a979b0a847daaacea08c51a2ddfa3f707c6008c4230ee1eef8066d712e331e48ff94b78a2fc8b0965764a8964b0b728f4e547621950fd320ad603d1008ebe5e97cb1ad86fd26182f06d744946d08739aa4f4fbe29d4e9c445abe05e9f8b30822a2a0d236a1f5ad5ab2f38288e16cd84eabd5cd790d30f1ee8d281b3c7c7aa506db201ce5bf5bf24026fd444ce3b615f95cda4c4af7804705291da67387a74d3e9cf6421f1c6502b08f5e99649c92ef8904593b34fa6ceb2a1a62122fa783f0d5dcbda0b772abf3fa8ff4fca3b741c8bfb673dced43fc40248cec2ce69c73b5793308282dfdc93c0a305738a204ca3a8aa36ac07e7bd5df48cb4c1ff770e375e3025d1946b548f7d531be05a0e3c1f9de6a0f1464f5479ef6d40e1410903c511e6cc1f61e97a39dc930f6117207ca9bcb227d0f55c2e33b16f8823bf196e192f759ebf4c6cc994717d3b87b95d1134a9af05303e709e74095d3b36b7725a4e967de752116c93410fe269699530a9c589cae6185b0a41a8f4220f8303d5bf671ebfb8c0b4e08eb576653909557ecacfaed1b129725e17d31d34ba85100a17fd5005a941fc32ce88c7f907b16a981e5d38ac2d80dfbe11da61bf42a36cada99d81a9ef232abe4782f1f93bc6375c5217397c6b0ccad47e26eb38d4300d37d1476de07d0c7de9b12fc024b45a7d2725cb641a2eb7ca1b4cae1e600a4180e8efb7a54d7cbf5dba3095696984310420fd14b204c7efc74f527e1cb60faf515dd21ae64a64e8efbd624bb3ad52625cad7742cb70159f7d0c0c4031ff6833853ded85fffbcd360ce2e80d2febf4a10c62114fa7bef7fe39a48d811d2cdeed37995eeaaf404b10b4bb1a4b5e12225563961551565c7d7394415bb1319048407c79628e5482155eba57954a0d6b6c98e7b38ce75c03071bd905ddc0c04c680a0ae33d29667aec899945bf9ac48ba904cce09151a89f55686ad11b93ce72d96551f5c8a18763ba51ebff19e68591f86a31837a2e873e05c7b4fdcd656bc37aee8dfe07a284eb7d3a68c093a2285b0c19ff489930dc3a8542bcf6ed218252ff1c93f79cf9b5347e50a9916b78b71349a08b4a16e747eae12f0e0388e2370f8ba62b7d5f0a727edfd267f20f92261c06daeac57a5d154e8833bc2f816493817020cb24e9ced6fcf2977f5a9fcde33772f354d2e1963035a8d51eca3fdd99e3acf4181b9a7080cc8f8b6a8d330ad5380c38fc74b9fbd04f32925f09350ab89ef4645f675b2637227bdf5d0f7a384440f26061f8221f417c530bbae88a47b9968f2cb256ccbc5cfbc25387a2994f3efbd422681b18e7d86baa2af937b9c9f7ffc26076262e27cf8ff266d5fe122b7537db6f96fabb526c6d", 0x4d0, 0x0, &(0x7f0000001040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}, 0x1c) 15:24:00 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, 0x0) [ 234.329024][ T39] kauditd_printk_skb: 21 callbacks suppressed [ 234.329042][ T39] audit: type=1400 audit(1664033040.512:128): avc: denied { create } for pid=3927 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 234.369840][ T39] audit: type=1400 audit(1664033040.512:129): avc: denied { bind } for pid=3927 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 15:24:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 234.392420][ T39] audit: type=1400 audit(1664033040.512:130): avc: denied { node_bind } for pid=3927 comm="syz-executor.3" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 15:24:00 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, 0x0) [ 234.431526][ T39] audit: type=1400 audit(1664033040.512:131): avc: denied { write } for pid=3927 comm="syz-executor.3" laddr=::1 lport=33921 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 15:24:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f00000015c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)='2', 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x1c) [ 234.458393][ T39] audit: type=1400 audit(1664033040.512:132): avc: denied { connect } for pid=3927 comm="syz-executor.3" laddr=::1 lport=33921 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 234.486826][ T39] audit: type=1400 audit(1664033040.512:133): avc: denied { name_connect } for pid=3927 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 15:24:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f00000008c0)={&(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c, 0x0}, 0x24000804) sendmsg$inet6(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 15:24:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_int(r0, 0x29, 0x12, 0x0, 0x0) [ 234.591768][ T39] audit: type=1400 audit(1664033040.772:134): avc: denied { setopt } for pid=3940 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 234.737231][ T41] Bluetooth: hci3: command 0x0405 tx timeout 15:24:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) [ 235.383518][ T39] audit: type=1400 audit(1664033041.562:135): avc: denied { create } for pid=3946 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 15:24:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="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", 0x4d0, 0x0, &(0x7f0000001040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}, 0x1c) 15:24:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:01 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}, 0xfff}, 0x1c) [ 235.431250][ T39] audit: type=1400 audit(1664033041.592:136): avc: denied { write } for pid=3946 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 15:24:01 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$inet6(r0, 0x0, 0x0, 0xfffffffe, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 15:24:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="c0", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x8) [ 235.532514][ T39] audit: type=1400 audit(1664033041.712:137): avc: denied { name_bind } for pid=3954 comm="syz-executor.2" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 235.577458][ T3955] sctp: [Deprecated]: syz-executor.2 (pid 3955) Use of struct sctp_assoc_value in delayed_ack socket option. [ 235.577458][ T3955] Use struct sctp_sack_info instead 15:24:01 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0x63}}, 0x10) 15:24:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000180), 0x4) 15:24:01 executing program 0: syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0), 0xffffffffffffffff) 15:24:01 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x2c, r1, 0x50d, 0x0, 0x0, {0x2, 0x0, 0x2}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x2c}, 0x1, 0x40030000000000}, 0x0) 15:24:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f00000015c0)={0x2, 0x0, 0x300, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 15:24:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x7}, 0x48) 15:24:02 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x2c, r1, 0x50d, 0x0, 0x0, {0x2, 0x0, 0x2}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x2c}, 0x1, 0x40030000000000}, 0x0) 15:24:02 executing program 2: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001480)={@ipv4={'\x00', '\xff\xff', @loopback}, @dev, @local, 0x0, 0x1f, 0x9, 0x400, 0x3, 0x248}) 15:24:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f00000015c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) bind$inet6(r0, 0x0, 0x0) 15:24:02 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, &(0x7f0000000080)='q', 0x1, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x43}}, 0x10) [ 236.878806][ T3983] loop2: detected capacity change from 0 to 4 15:24:03 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:03 executing program 2: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)) [ 236.913404][ T3983] erofs: (device loop2): mounted with root inode @ nid 36. 15:24:03 executing program 0: syz_emit_ethernet(0x42, &(0x7f0000000740)={@empty, @remote, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x6, 0x0, @local, @multicast2}, @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 15:24:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)='D', 0x1, 0x0, &(0x7f0000001040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}, 0x1c) 15:24:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x17) 15:24:03 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:03 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}, 0x1c) 15:24:03 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a40)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000940)=""/215, 0x28, 0xd7, 0x1}, 0x20) 15:24:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x1e}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x6, 0x10, 0x0}, 0x15) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f00000008c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=ANY=[@ANYBLOB="000000000000000026bd7000ffdbdf25000001006a13ed7ebb430a9d000000000000000000000001"], 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x2404008d) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000000)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_PORT={0x6}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x68, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRESHEX], 0x28}, 0x1, 0x0, 0x0, 0x24008089}, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = accept4(r2, &(0x7f00000007c0)=@generic, &(0x7f00000000c0)=0x80, 0x80000) sendmsg$TIPC_CMD_GET_NODES(r5, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, 0x0, 0x8, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x30}, 0x20040011) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="01b8", @ANYBLOB="1ccbba61d715393a5c310c66db2aaa3a5cb1e2ad418e0a7c7180ca01eb87769ee411d4409c390027e2294ac1e83cb213abbcdc74", @ANYRES32=r1], 0x34}, 0x1, 0x0, 0x0, 0x91}, 0x20004084) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="20000552da", @ANYRES16=0x0, @ANYBLOB="330a2dbd7000040004000000000000003c00038008000100ffffffff08000200070000000800010000040000080003003d00000008000200e50000000800020029040000080002000002000004000380240005800c000280080003000314000280080002009d01000008000200060000000000000000000000000000000000e41334976853e32c6accff7c373624582ff13e623e9f4b91e90e6fb157943e515d07af5254370e9241557453000000"], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x74, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x10044}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8004}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) [ 237.622644][ T4000] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=4000 comm=syz-executor.0 [ 237.644338][ T4000] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 237.730742][ T4000] 8021q: adding VLAN 0 to HW filter on device bond1 [ 237.755212][ T4003] bond1: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 237.790823][ T4003] bond1: (slave ip6tnl1): Error -95 calling set_mac_address 15:24:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}]}, 0x18}, 0x300}, 0x0) 15:24:04 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:04 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvmsg$qrtr(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x38, 0x0) 15:24:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) recvfrom$inet6(r0, 0x0, 0x0, 0x10040, 0x0, 0x0) 15:24:04 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvmsg$qrtr(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x38, 0x0) 15:24:04 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, 0x0, 0x2, 0x0, &(0x7f0000000100)={0x3, 0x0, @dev}, 0x10) 15:24:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:04 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, 0x0, 0x5000000, 0x0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) 15:24:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, 0x1c) 15:24:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f00000015c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x17}}}, 0x1c) 15:24:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r1, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}]}, 0x2c}}, 0x0) 15:24:05 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20020001, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000005840)=[{{&(0x7f0000000100)={0x2, 0x0, @private}, 0x10, &(0x7f0000004980)=[{&(0x7f0000004840)="50f500a343b86c47747f0db88cbafde9eaaccb4d05100b3bc830a0ff29dc971feda2a5321f67c1196402cf5268f368cf72ffd0d95741c8ee1a2561e0d6c860d3a4f917bad055890d740a0216ffc085ab20ce68f06b2ce1e722bd5b2431e6a00e27032314b35b82a7c89f2f13bd274b89ee7a3b83dfa60e09d71fc950cac572b2ea28f58510be", 0x86}, {&(0x7f0000004900)="15e6f27bbef600f3f12bd7e7e2d9c68f560877b712484143dc1e8578b6d0b35b8ea46b37747c769203b9eca6e34c89db4c7b1efb33c753412a72e0263f2de914db2fbc406d38610db102b269bf08f44ab51d740d9a8c66", 0x57}, {&(0x7f0000002200)="ec160a30f2e8a161262f46877d2c0f0a5bf4f6623d69579600bdf59e7fafe33b4fd8012097e3a5899864d2a7cd764f4b54f3453b300c646b49f7bc7eceb2", 0x3e}], 0x3, &(0x7f0000004a40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @empty}}}], 0x20}}, {{&(0x7f0000004a80)={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000004e80)=[{&(0x7f0000004ac0)="79361d794f595331bdab21caf7e1aee0f6fdfa91db4dad3b09233614f47bab9537cef0ce234c8223ee9c89d93ac81ba29b906264282801cca8095ad19c0bdbd1a82c0393379ea31c2557b0c34348aa5d683b", 0x52}, {&(0x7f0000004b40)="46092f38acb1335268b59e9cf33302edb1b48302e1e66cd72192a45c180409a99ddc7b6c8e226ecc3be374eece20321e23ca02bad5117be2a61dfe23853909e4c276b06431ea0175a75a97c50745185f8af4f43f847ccf1eced1f2953629e4e19a03bbec505656e8e99e78b9614b3348d4cbd463ea899bc923906ae88c77156c9d4e3bd8c9f65a282471be3296878646354db5550d4bbefd0f85739270db", 0x9e}, {&(0x7f0000004c00)="1eb365da73d9ca0403b6e3123fb06dd4017818bc322e0e939f6b85efa620bd13e2d55c44fc16ca9b24664d3d72799e94da6838f20ee3df4280bca07296206f22765eba0e892c7f6de88263b5f564347b90f434777b5aa276631d9a964729f417746c7cf9fba9dbfd1800e776b01074b546cab4e4cc809b42d3e17f8416f05d11e39b231109e98febd5ed2704e1a439bc5a03c6f67c9da94f1b8a83f7a63ffc6eed90756cbf397067b7dc8f9ddc4eefd73d35a66525dc2c4d8f3d718c979b21d641073d80c758eda34788c24991b889", 0xcf}, {&(0x7f0000004d00)="3863e3590fd59081c4423c97ae66d0fe9bb62cb40eaa4acf98d2a1534429debc7339d6a75cda8e31c727e03da3bb42e742bbe6affce92690a484597d5d25ff653be20682e425f8f918207c96466d92f717986c15695e6ba18c1cd24ca95577b47d29ba4b621e8f6aa27d4ad7e4e78b96e707a45d278d34", 0x77}, {&(0x7f0000004d80)="582dacad6bc455a079da154e1a80003f7c490b23c8e107ab373792ebc9dc54", 0x1f}, {&(0x7f0000004dc0)="82484932189ec3f38a89de0ffee2078b5e22f04feeebf8c1fb47d70baf6f52393ddf35d237adeb44b2aa8d707e89680acc3a88020c21c719a98521c3b7868bdedea08b13e8253002821bc52017950e7b95f90676e158997744e2eb2b31a48e844dd65944e823ed9e798048a3a1c7523a5565c83e055bd2af95f34a7e50e4755bbb79698ad4ad320f5b2ba86d55d2db8515bbd943ed5e", 0x96}], 0x6, &(0x7f0000004f00)=[@ip_retopts={{0x70, 0x0, 0x7, {[@rr={0x7, 0x1b, 0x0, [@private, @multicast2, @loopback, @rand_addr, @empty, @loopback]}, @cipso={0x86, 0x2c, 0x0, [{0x0, 0x6, "42f6e2a0"}, {0x0, 0x11, "03313fe9f790507d7484e270d4ddc1"}, {0x0, 0x7, "e1a332c5a2"}, {0x0, 0x8, "57fccb61d19f"}]}, @rr={0x7, 0x17, 0x0, [@dev, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @dev]}]}}}, @ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @multicast1}}}, @ip_tos_u8={{0x11}}, @ip_tos_int={{0x14}}], 0xd8}}, {{0x0, 0x0, &(0x7f0000005400)=[{&(0x7f0000005000)="0d3aa76875a0ee26770a182928e32b9d6e03652987d1af5cd4db4bd892bb432fac8a792738104bd3565ce8c6db6684618aeb1281230b4d9832dd8fcbb72c7d25ea6736aae3d71cc04615aae903da4e783777e9e6e5f42f72b22465b327148704af04fc388f05e278a327d4b12fcdf39282db2001e31581a0374b20b9a3671aea312254c6f57da235881928b43fdfbfaaf81e272136115a344ba304c74ee099c3de3e4e6c7cf16d5e8c412efca846fdaef8832dfa675f3b61d7a829f3b45591ed4360c9b0b7971214ca1a7b0960e9586b1d3f0124a53798ba87f923c166", 0xdd}, {&(0x7f0000005100)="171a9b5be36c5c5c94adb1d153f00ed789e3f54449afcbcc8eeaff179e9c7aef5a90cd243bb690b3a1ce90d581a0a2", 0x2f}, {&(0x7f0000005140)="857a9b5bbd4e223ad90eec0d9317637fee64ce21c84d9f244f2d20437df854b524473acbf6ab8843f54b8aa35ac5894b04c9cd25b39d6467466e61567fb8d4b7f19536c4fe989763dba68097de233e2a810bd14227670cdaeef8c4ba104424d4c29faf426be69013e4806eb7aa162221446466a21382f4789a7888f45e8d817c98dbdbfbb220eb9801b6c0e8b8368a30479da81eeac9ae46f38c97fa44b6314b4cc7b2a3a4098ce32982ff521f883f3ce87eb8d4ef5c44b1a264790d80a4cb03ab8dd435cbaa390c6a0848a124161b651bbf84a10627ffdc0a354e80a77afa9e5a1f03061151094cc239e210bac445d02881faa570b27a07b63ee8a41d55ce", 0xff}, {&(0x7f0000005240)="2446531c97b82b952b7b7ed219c4e2016704b735604eba04fb85c7e75a3d39d5f1e596afd887033cdd0931fad4c6a8198a2fa23f86f6c4646476d36bb8e04b1da2d1662d54a3259212eb348df37c1f673524ea75a2af8d038aab344d27a45409", 0x60}, {&(0x7f0000005980)="fc4358b380b408e9bdce9efcfaaffa15c24379dabfe6f218350134a3676fb33b4660834452a5061949f4b8267c9824f63e66014b39acb2f8bbf935958204900f60f0ad74162d92d7909ded14f91aa11efff3ba2d84dccd941c48316195584ff3e5a2636007000000000000006a46cc94f8b2c620c9a10a876a54c361c1a9e8084c1c35438752d1dfd551ca03a35916e84485b9480bd61070649d9237496bfeca9db6f6c218ae6abe60aaa18288f3856758b2e6f1740c7ebd8bac749b5ddeed53704f33b21ff455dd49dfb186aa6d5d77c295d48e11598be618897a241c6a", 0x9e}, {&(0x7f0000005380)="5aa3fa6b94799161b698eda6f7375b1d3613c18c7e84e69c121ae8873900bf3e2f841020d55ab4df01f5991d414d422a5c8a58562debe0baddca0bf1c955fb3129860e6300df652e", 0x48}], 0x6, &(0x7f0000005480)=[@ip_tos_int={{0x14}}], 0x18}}, {{0x0, 0x0, &(0x7f0000005580)=[{&(0x7f00000054c0)="8c78f6bbc2f2730daf7bbe7a101dc297cc1509222aa5ce3d209286d4c431003e72f2e536c5a6a59d0638c4646340b7a28106fe708c2251a0aea6f2a6a825beee00e64d5d40b190535d103c029c6f339f1a2f7fe86fba3f9c78dc0cbed5b26323c87ccd341e387bac5b15e10310fa0907c4a7c4a46ea8bc699f42ddf33a2b21792e5ffba59dbd9755edc51781", 0x8c}], 0x1, &(0x7f00000055c0)=[@ip_ttl={{0x14}}, @ip_pktinfo={{0xfffffffffffffef1, 0x0, 0x8, {0x0, @dev, @broadcast}}}, @ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @private}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @private}}}, @ip_ttl={{0x14}}], 0xa8}}, {{&(0x7f0000005680)={0x2, 0x0, @local}, 0x10, &(0x7f0000005800)=[{&(0x7f00000056c0)="9c5bcceb4fe3daa72335999c32af2684a977e654ea7f11b287f1cbab1bd4dbe583df44a27486f606167d89f1168ab241c93777becf737f5ca1fa0a96a8dcb1eaa7f8b193261626fe1b2f77dc768065d30da1cfeb8c16564c62eb66e64600eaef4a41acaace2eb6ba58aa22f912e3e136b34f91acce9f657cc087b7f5dc783c1114a81fe6a949179473f744fd0720e27097d66f1f3e7ac0553f8d99d8b5b2d2bcf23d6167db9ef9a5896a2bb74460a55aedbfafa708b4a1abc44bcf7fc6", 0xbd}, {&(0x7f0000005780)="03c3f9a5d44eba8211c3f07fff3f20d21ee8185de818cd0c1af695947b8c8b32fb574821ba78655cf65f8a7033e9a94f8a851c56af3ac7d0dfb71b6c6a14f26daede3047cd696fda095517ccd5d8c90e5a0e4dc2758203d6bde4006397910846a8dc59ef6d125d3c9833197a8fff830990", 0x71}], 0x2}}], 0x5, 0x0) [ 239.741228][ T39] kauditd_printk_skb: 6 callbacks suppressed [ 239.741239][ T39] audit: type=1400 audit(1664033045.922:144): avc: denied { name_bind } for pid=4030 comm="syz-executor.0" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 15:24:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) 15:24:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x1e}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x6, 0x10, 0x0}, 0x15) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f00000008c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=ANY=[@ANYBLOB="000000000000000026bd7000ffdbdf25000001006a13ed7ebb430a9d000000000000000000000001"], 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x2404008d) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000000)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_PORT={0x6}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x68, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRESHEX], 0x28}, 0x1, 0x0, 0x0, 0x24008089}, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = accept4(r2, &(0x7f00000007c0)=@generic, &(0x7f00000000c0)=0x80, 0x80000) sendmsg$TIPC_CMD_GET_NODES(r5, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, 0x0, 0x8, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x30}, 0x20040011) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="01b8", @ANYBLOB="1ccbba61d715393a5c310c66db2aaa3a5cb1e2ad418e0a7c7180ca01eb87769ee411d4409c390027e2294ac1e83cb213abbcdc74", @ANYRES32=r1], 0x34}, 0x1, 0x0, 0x0, 0x91}, 0x20004084) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="20000552da", @ANYRES16=0x0, @ANYBLOB="330a2dbd7000040004000000000000003c00038008000100ffffffff08000200070000000800010000040000080003003d00000008000200e50000000800020029040000080002000002000004000380240005800c000280080003000314000280080002009d01000008000200060000000000000000000000000000000000e41334976853e32c6accff7c373624582ff13e623e9f4b91e90e6fb157943e515d07af5254370e9241557453000000"], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x74, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x10044}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8004}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 15:24:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x1e}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit={0x95, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x0, 0xf8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x6, 0x10, 0x0}, 0x15) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f00000008c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=ANY=[@ANYBLOB="000000000000000026bd7000ffdbdf25000001006a13ed7ebb430a9d000000000000000000000001"], 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x2404008d) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000000)={0x28, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_PORT={0x6}]}]}, 0x28}}, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x68, r3, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) r4 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYRES32, @ANYRESHEX=r4, @ANYRESHEX], 0x28}, 0x1, 0x0, 0x0, 0x24008089}, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = accept4(r2, &(0x7f00000007c0)=@generic, &(0x7f00000000c0)=0x80, 0x80000) sendmsg$TIPC_CMD_GET_NODES(r5, &(0x7f00000009c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, 0x0, 0x8, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x30}, 0x20040011) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="01b8", @ANYBLOB="1ccbba61d715393a5c310c66db2aaa3a5cb1e2ad418e0a7c7180ca01eb87769ee411d4409c390027e2294ac1e83cb213abbcdc74", @ANYRES32=r1], 0x34}, 0x1, 0x0, 0x0, 0x91}, 0x20004084) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="20000552da", @ANYRES16=0x0, @ANYBLOB="330a2dbd7000040004000000000000003c00038008000100ffffffff08000200070000000800010000040000080003003d00000008000200e50000000800020029040000080002000002000004000380240005800c000280080003000314000280080002009d01000008000200060000000000000000000000000000000000e41334976853e32c6accff7c373624582ff13e623e9f4b91e90e6fb157943e515d07af5254370e9241557453000000"], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x74, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x10044}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8004}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x74}}, 0x0) 15:24:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 239.861176][ T4039] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=4039 comm=syz-executor.2 [ 239.876295][ T4039] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 239.908839][ T4038] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=4038 comm=syz-executor.0 [ 239.943786][ T4039] 8021q: adding VLAN 0 to HW filter on device bond1 [ 239.968356][ T4038] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 240.039236][ T4038] 8021q: adding VLAN 0 to HW filter on device bond2 [ 240.050969][ T4041] bond1: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 240.096963][ T4041] bond1: (slave ip6tnl1): Error -95 calling set_mac_address [ 240.161756][ T4042] bond2: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 240.195137][ T4042] bond2: (slave ip6tnl1): Error -95 calling set_mac_address [ 240.946290][ T4045] ERROR: Out of memory at tomoyo_realpath_from_path. 15:24:06 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) (fail_nth: 1) 15:24:07 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:07 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) (fail_nth: 1) 15:24:07 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) (fail_nth: 2) 15:24:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 241.023183][ T4053] ERROR: Out of memory at tomoyo_realpath_from_path. [ 241.029969][ T4050] loop3: detected capacity change from 0 to 4 15:24:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0110c6f9257c90291bf27e"], 0x1c}}, 0x0) [ 241.058990][ T4050] erofs: (device loop3): mounted with root inode @ nid 36. [ 241.061413][ T4057] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 241.086078][ T4050] ERROR: Out of memory at tomoyo_realpath_from_path. [ 241.111461][ T4057] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 241.120012][ T4057] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 15:24:07 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) (fail_nth: 2) 15:24:07 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) (fail_nth: 3) [ 241.137195][ T4059] ERROR: Out of memory at tomoyo_realpath_from_path. 15:24:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 241.183029][ T4063] loop3: detected capacity change from 0 to 4 [ 241.189870][ T4063] erofs: (device loop3): mounted with root inode @ nid 36. [ 241.211085][ T4063] ERROR: Out of memory at tomoyo_realpath_from_path. 15:24:07 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) (fail_nth: 3) 15:24:07 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) (fail_nth: 4) 15:24:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 241.266686][ T4068] loop3: detected capacity change from 0 to 4 [ 241.270756][ T4069] FAULT_INJECTION: forcing a failure. [ 241.270756][ T4069] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 241.289720][ T4069] CPU: 2 PID: 4069 Comm: syz-executor.0 Not tainted 6.0.0-rc6-syzkaller-00286-ga63f2e7cb110 #0 [ 241.289746][ T4068] erofs: (device loop3): mounted with root inode @ nid 36. [ 241.297895][ T4069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 241.297950][ T4069] Call Trace: [ 241.298008][ T4069] [ 241.298014][ T4069] dump_stack_lvl+0xcd/0x134 [ 241.330606][ T4069] should_fail.cold+0x5/0xa [ 241.337832][ T4069] _copy_from_user+0x2a/0x170 [ 241.342057][ T4069] kstrtouint_from_user+0xa8/0x190 [ 241.343989][ T4068] ERROR: Out of memory at tomoyo_realpath_from_path. [ 241.345824][ T4069] ? kstrtouint+0x120/0x120 [ 241.354873][ T4069] ? lock_release+0x780/0x780 [ 241.359035][ T4069] proc_fail_nth_write+0x79/0x220 [ 241.362909][ T4069] ? proc_task_getattr+0x1f0/0x1f0 [ 241.366901][ T4069] vfs_write+0x2d7/0xdd0 [ 241.369691][ T4069] ? proc_task_getattr+0x1f0/0x1f0 [ 241.373491][ T4069] ? vfs_read+0x930/0x930 [ 241.378661][ T4069] ? __fget_files+0x26a/0x440 [ 241.383259][ T4069] ksys_write+0x127/0x250 [ 241.389627][ T4069] ? __ia32_sys_read+0xb0/0xb0 [ 241.393754][ T4069] ? syscall_enter_from_user_mode+0x22/0xb0 [ 241.398956][ T4069] do_syscall_64+0x35/0xb0 [ 241.402613][ T4069] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 241.406957][ T4069] RIP: 0033:0x7f316243c30f [ 241.410176][ T4069] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 241.430053][ T4069] RSP: 002b:00007f316367a160 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 241.435678][ T4069] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f316243c30f [ 241.440952][ T4069] RDX: 0000000000000001 RSI: 00007f316367a1e0 RDI: 0000000000000004 [ 241.447479][ T4069] RBP: 00007f316367a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 241.453223][ T4069] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 241.457910][ T4069] R13: 00007fff626d368f R14: 00007f316367a300 R15: 0000000000022000 [ 241.463120][ T4069] 15:24:07 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) (fail_nth: 4) [ 241.601102][ T4071] loop3: detected capacity change from 0 to 4 [ 241.630897][ T4071] erofs: (device loop3): mounted with root inode @ nid 36. [ 241.901240][ T4057] syz-executor.2 (4057) used greatest stack depth: 21160 bytes left [ 241.985128][ T4073] loop3: detected capacity change from 0 to 4 [ 241.992367][ T4073] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:08 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) (fail_nth: 5) 15:24:08 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) 15:24:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0110c6f9257c90291bf27e"], 0x1c}}, 0x0) 15:24:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:08 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x2, &(0x7f00000000c0)) [ 242.039512][ T4079] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 15:24:08 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) (fail_nth: 6) [ 242.045700][ T4079] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 242.054084][ T4079] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 15:24:08 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x10, &(0x7f00000000c0)) [ 242.079749][ T4086] loop3: detected capacity change from 0 to 4 15:24:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 242.121672][ T4086] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:08 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x4b47, &(0x7f00000000c0)) 15:24:08 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) (fail_nth: 7) [ 242.822932][ T4097] loop3: detected capacity change from 0 to 4 [ 242.844906][ T4097] erofs: (device loop3): mounted with root inode @ nid 36. [ 242.867251][ T4097] FAULT_INJECTION: forcing a failure. [ 242.867251][ T4097] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 242.883565][ T4097] CPU: 2 PID: 4097 Comm: syz-executor.3 Not tainted 6.0.0-rc6-syzkaller-00286-ga63f2e7cb110 #0 [ 242.901859][ T4097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 242.911424][ T4097] Call Trace: [ 242.915034][ T4097] 15:24:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlinkprop={0x20, 0x21, 0x1}, 0x20}}, 0x0) 15:24:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 242.919055][ T4097] dump_stack_lvl+0xcd/0x134 [ 242.925755][ T4097] should_fail.cold+0x5/0xa [ 242.932699][ T4097] _copy_to_user+0x2a/0x140 [ 242.936437][ T4097] simple_read_from_buffer+0xcc/0x160 [ 242.940902][ T4097] proc_fail_nth_read+0x187/0x220 [ 242.944313][ T4097] ? proc_fault_inject_read+0x220/0x220 [ 242.947696][ T4097] ? security_file_permission+0xab/0xd0 [ 242.954164][ T4097] vfs_read+0x257/0x930 [ 242.958217][ T4097] ? proc_fault_inject_read+0x220/0x220 [ 242.962947][ T4097] ? kernel_read+0x1c0/0x1c0 [ 242.966810][ T4097] ? __fget_files+0x26a/0x440 [ 242.970974][ T4097] ksys_read+0x127/0x250 [ 242.975028][ T4097] ? vfs_write+0xdd0/0xdd0 [ 242.978618][ T4097] ? syscall_enter_from_user_mode+0x22/0xb0 [ 242.983933][ T4097] do_syscall_64+0x35/0xb0 [ 242.988185][ T4097] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 242.992918][ T4097] RIP: 0033:0x7f001123c3ac [ 242.995846][ T4097] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 243.017585][ T4097] RSP: 002b:00007f001235e160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 243.024278][ T4097] RAX: ffffffffffffffda RBX: 00007f00113abf80 RCX: 00007f001123c3ac [ 243.031806][ T4097] RDX: 000000000000000f RSI: 00007f001235e1e0 RDI: 0000000000000003 [ 243.038767][ T4097] RBP: 00007f001235e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 243.046297][ T4097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 243.057798][ T4097] R13: 00007fffb869587f R14: 00007f001235e300 R15: 0000000000022000 [ 243.064444][ T4097] [ 243.229049][ T39] audit: type=1400 audit(1664033049.412:145): avc: denied { write } for pid=4103 comm="syz-executor.2" name="raw-gadget" dev="devtmpfs" ino=760 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 15:24:09 executing program 2: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x7, 0x1, 0x3, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x8, 0x0, 0x7f, 0x2e}}}}}]}}]}}, &(0x7f00000002c0)={0x0, 0x0, 0x5, &(0x7f0000000080)={0x5, 0xf, 0x5}}) 15:24:09 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x4b49, &(0x7f00000000c0)) 15:24:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:09 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:09 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x541b, &(0x7f00000000c0)) 15:24:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 243.412417][ T4114] loop3: detected capacity change from 0 to 4 [ 243.430294][ T4114] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:09 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x5421, &(0x7f00000000c0)) [ 243.497294][ T6] usb 7-1: new high-speed USB device number 2 using dummy_hcd [ 243.737122][ T6] usb 7-1: Using ep0 maxpacket: 16 [ 243.861678][ T6] usb 7-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 8 [ 243.879957][ T6] usb 7-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 244.047425][ T6] usb 7-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 15:24:10 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x5450, &(0x7f00000000c0)) [ 244.067302][ T6] usb 7-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 244.083310][ T6] usb 7-1: Product: syz [ 244.087891][ T6] usb 7-1: Manufacturer: syz [ 244.091876][ T6] usb 7-1: SerialNumber: syz [ 244.128777][ T4105] raw-gadget.0 gadget.2: fail, usb_ep_enable returned -22 [ 244.355687][ T6] usb 7-1: USB disconnect, device number 2 15:24:11 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x5451, &(0x7f00000000c0)) 15:24:11 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x5) writev(r0, &(0x7f0000000740)=[{&(0x7f0000000280)="2b1bc3e6", 0x4}], 0x1) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 15:24:11 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x2, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 244.948857][ T39] audit: type=1400 audit(1664033051.132:146): avc: denied { read write } for pid=4124 comm="syz-executor.2" name="uhid" dev="devtmpfs" ino=1110 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 244.965012][ T3760] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 244.978310][ T4130] loop3: detected capacity change from 0 to 4 15:24:11 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x5452, &(0x7f00000000c0)) 15:24:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 244.981664][ T3760] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 244.992903][ T4130] erofs: (device loop3): mounted with root inode @ nid 36. [ 245.000088][ T3760] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 245.005541][ T3760] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 245.010536][ T3760] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 15:24:11 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x10, &(0x7f0000000180)={0x0, 0x2d9b63c7}) [ 245.027142][ T3760] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 245.029985][ T39] audit: type=1400 audit(1664033051.132:147): avc: denied { open } for pid=4124 comm="syz-executor.2" path="/dev/uhid" dev="devtmpfs" ino=1110 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 245.047937][ T3760] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 245.087149][ T3760] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 245.092573][ T3760] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 245.113820][ T4139] loop3: detected capacity change from 0 to 4 [ 245.121995][ T4139] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:11 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x4b47, &(0x7f0000000180)={0x0, 0x2d9b63c7}) [ 245.140712][ T3760] hid-generic 0000:0000:0000.0002: hidraw1: HID v0.00 Device [syz1] on syz1 15:24:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:11 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x5460, &(0x7f00000000c0)) [ 245.220077][ T4145] loop3: detected capacity change from 0 to 4 [ 245.239100][ T3794] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 245.267959][ T4145] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:11 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x8933, &(0x7f00000000c0)) 15:24:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800"/13], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:11 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x4b49, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:11 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x400448c9, &(0x7f00000000c0)) 15:24:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800"/13], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 245.390392][ T4153] loop3: detected capacity change from 0 to 4 [ 245.404210][ T4153] erofs: (device loop3): mounted with root inode @ nid 36. [ 246.075379][ T4162] loop3: detected capacity change from 0 to 4 15:24:12 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x541b, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:12 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x400448dd, &(0x7f00000000c0)) 15:24:12 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x5) writev(r0, &(0x7f0000000740)=[{&(0x7f0000000280)="2b1bc3e6", 0x4}], 0x1) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 15:24:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800"/13], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 246.089938][ T3152] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 246.100769][ T3152] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 246.109750][ T3152] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 246.113923][ T4162] erofs: (device loop3): mounted with root inode @ nid 36. [ 246.117177][ T3152] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 246.133772][ T3152] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 246.146066][ T3152] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 246.157666][ T3152] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 246.164653][ T3152] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 246.192976][ T3152] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 246.214760][ T3152] hid-generic 0000:0000:0000.0003: hidraw1: HID v0.00 Device [syz1] on syz1 [ 246.281896][ T3152] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 246.289949][ T4174] loop3: detected capacity change from 0 to 4 15:24:12 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x5421, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:12 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x5) writev(r0, &(0x7f0000000740)=[{&(0x7f0000000280)="2b1bc3e6", 0x4}], 0x1) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 15:24:12 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x400454ca, &(0x7f00000000c0)) 15:24:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed00"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 246.294269][ T3838] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 246.307375][ T3152] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 246.307398][ T3152] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 246.307414][ T3152] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 246.307431][ T3152] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 246.307447][ T3152] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 246.307463][ T3152] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 15:24:12 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40049409, &(0x7f00000000c0)) 15:24:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed00"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 246.307479][ T3152] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 246.307561][ T3152] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 246.309135][ T3152] hid-generic 0000:0000:0000.0004: hidraw1: HID v0.00 Device [syz1] on syz1 [ 246.359662][ T4174] erofs: (device loop3): mounted with root inode @ nid 36. [ 246.626173][ T4187] loop3: detected capacity change from 0 to 4 15:24:12 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x5) writev(r0, &(0x7f0000000740)=[{&(0x7f0000000280)="2b1bc3e6", 0x4}], 0x1) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 15:24:12 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x5450, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:12 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f00000000c0)) 15:24:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed00"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 246.638343][ T4187] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:12 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40087602, &(0x7f00000000c0)) 15:24:12 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) 15:24:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed0000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:12 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x5451, &(0x7f0000000180)={0x0, 0x2d9b63c7}) [ 246.688442][ T3152] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 246.694863][ T3152] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 246.703648][ T3152] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 246.714873][ T3152] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 15:24:12 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40186366, &(0x7f00000000c0)) 15:24:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed0000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 246.737804][ T4197] loop3: detected capacity change from 0 to 4 [ 246.747385][ T3152] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 246.748842][ T4197] erofs: (device loop3): mounted with root inode @ nid 36. [ 246.761719][ T3152] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 246.769914][ T3152] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 246.778094][ T3152] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 246.783433][ T3152] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 15:24:12 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)) [ 246.793383][ T3152] hid-generic 0000:0000:0000.0005: hidraw1: HID v0.00 Device [syz1] on syz1 15:24:12 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x5452, &(0x7f0000000180)={0x0, 0x2d9b63c7}) [ 246.850191][ T4205] loop3: detected capacity change from 0 to 4 [ 246.859748][ T4205] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:14 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x5460, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:14 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x4020940d, &(0x7f00000000c0)) 15:24:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed0000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:14 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) [ 248.774497][ T4211] loop3: detected capacity change from 0 to 4 [ 248.780351][ T3759] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 248.786828][ T3759] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 248.793972][ T4211] erofs: (device loop3): mounted with root inode @ nid 36. [ 248.812275][ T3759] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 248.833925][ T3759] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 248.841110][ T3759] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 248.867768][ T3759] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 248.876596][ T3759] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 248.915190][ T3759] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 248.924659][ T3759] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 248.939113][ T3759] hid-generic 0000:0000:0000.0006: hidraw1: HID v0.00 Device [syz1] on syz1 15:24:15 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044902, &(0x7f00000000c0)) 15:24:15 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x8933, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 249.262215][ T4220] loop3: detected capacity change from 0 to 4 [ 249.272364][ T3794] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 15:24:15 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044941, &(0x7f00000000c0)) [ 249.286461][ T4220] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:15 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80086301, &(0x7f00000000c0)) 15:24:15 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x400448c9, &(0x7f0000000180)={0x0, 0x2d9b63c7}) [ 249.356334][ T4228] loop3: detected capacity change from 0 to 4 [ 249.367481][ T4228] erofs: (device loop3): mounted with root inode @ nid 36. [ 249.825367][ T4232] loop3: detected capacity change from 0 to 4 15:24:15 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80086601, &(0x7f00000000c0)) 15:24:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:15 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x400448dd, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:16 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) [ 249.871151][ T3748] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 249.880286][ T3748] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 15:24:16 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80087601, &(0x7f00000000c0)) 15:24:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 249.896167][ T3748] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 249.901234][ T4232] erofs: (device loop3): mounted with root inode @ nid 36. [ 249.911538][ T3748] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 249.938892][ T3748] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 15:24:16 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x801c581f, &(0x7f00000000c0)) [ 249.961522][ T3748] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 249.966549][ T3748] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 249.972217][ T3748] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 249.977728][ T3748] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 249.983662][ T3748] hid-generic 0000:0000:0000.0007: hidraw1: HID v0.00 Device [syz1] on syz1 15:24:16 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x400454ca, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:16 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0xc0045878, &(0x7f00000000c0)) [ 250.026586][ T4246] loop3: detected capacity change from 0 to 4 [ 250.032142][ T4246] erofs: (device loop3): mounted with root inode @ nid 36. [ 250.915007][ T4256] loop3: detected capacity change from 0 to 4 [ 250.918439][ T3748] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 250.937208][ T3748] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 250.945254][ T3748] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 15:24:17 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x40049409, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:17 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0xc0045878, &(0x7f00000000c0)) 15:24:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:17 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) [ 250.958658][ T4256] erofs: (device loop3): mounted with root inode @ nid 36. [ 250.965031][ T3748] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 250.987420][ T3748] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 250.997313][ T3748] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 251.004220][ T3748] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 251.013371][ T3748] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 15:24:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 251.023852][ T3748] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 15:24:17 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0xc0189436, &(0x7f00000000c0)) [ 251.037871][ T3748] hid-generic 0000:0000:0000.0008: hidraw1: HID v0.00 Device [syz1] on syz1 15:24:17 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x40086602, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:17 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0xc020660b, &(0x7f00000000c0)) [ 251.081324][ T4264] loop3: detected capacity change from 0 to 4 15:24:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 251.098974][ T4264] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:17 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x40087602, &(0x7f0000000180)={0x0, 0x2d9b63c7}) [ 251.113378][ T39] audit: type=1400 audit(1664033057.292:148): avc: denied { setattr } for pid=4262 comm="syz-executor.3" path="/syzkaller-testdir1099318745/syzkaller.IBTzkO/38/file0" dev="loop3" ino=36 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 15:24:17 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) [ 251.173056][ T4270] loop3: detected capacity change from 0 to 4 [ 251.181581][ T4270] erofs: (device loop3): mounted with root inode @ nid 36. [ 252.344352][ T4277] loop3: detected capacity change from 0 to 4 15:24:18 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x2}) 15:24:18 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x40186366, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:18 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) 15:24:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 252.370714][ T4277] erofs: (device loop3): mounted with root inode @ nid 36. [ 252.604667][ T4283] loop3: detected capacity change from 0 to 4 15:24:18 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) 15:24:18 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x401c5820, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:18 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x3}) 15:24:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 252.622137][ T3760] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 252.634431][ T3760] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 252.651726][ T3760] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 252.672531][ T4283] erofs: (device loop3): mounted with root inode @ nid 36. [ 252.697799][ T3760] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 252.704889][ T3760] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 252.718156][ T3760] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 252.733679][ T3760] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 252.738793][ T3760] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 15:24:18 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x4}) [ 252.744595][ T3760] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 15:24:18 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x4020940d, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:18 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 252.769585][ T3760] hid-generic 0000:0000:0000.0009: hidraw1: HID v0.00 Device [syz1] on syz1 [ 252.782066][ T4294] loop3: detected capacity change from 0 to 4 15:24:18 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x5}) 15:24:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:19 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) [ 252.821123][ T4294] erofs: (device loop3): mounted with root inode @ nid 36. [ 252.862031][ T3760] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 252.871022][ T3760] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 252.891473][ T3760] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 252.911129][ T3760] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 252.922358][ T3760] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 252.931766][ T3760] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 252.937347][ T3760] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 252.944454][ T3760] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 252.959391][ T3760] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 252.969190][ T3760] hid-generic 0000:0000:0000.000A: hidraw1: HID v0.00 Device [syz1] on syz1 15:24:19 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x80086301, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:19 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x6}) 15:24:19 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) [ 253.037797][ T4306] loop3: detected capacity change from 0 to 4 15:24:19 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x7}) [ 253.058884][ T4306] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:19 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x300}) 15:24:19 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x80086601, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:19 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 253.157295][ T4317] loop3: detected capacity change from 0 to 4 [ 253.175468][ T4317] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:19 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x500}) 15:24:19 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x80087601, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:19 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 253.682436][ T4322] loop3: detected capacity change from 0 to 4 [ 253.694229][ T4322] erofs: (device loop3): mounted with root inode @ nid 36. [ 253.977196][ T4326] loop3: detected capacity change from 0 to 4 [ 253.997609][ T4326] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:20 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x801c581f, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:20 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x600}) 15:24:20 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:20 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) 15:24:20 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc0045878, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:20 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x700}) 15:24:20 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0xff00}) [ 254.133578][ T4337] loop3: detected capacity change from 0 to 4 [ 254.147588][ T4337] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:20 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x1000000}) 15:24:20 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc0045878, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:20 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x2000000}) [ 254.204806][ T4343] loop3: detected capacity change from 0 to 4 15:24:20 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 254.212510][ T4343] erofs: (device loop3): mounted with root inode @ nid 36. [ 256.889317][ T4350] loop3: detected capacity change from 0 to 4 15:24:22 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x3000000}) 15:24:22 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc0189436, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:23 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) [ 256.922336][ T4350] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:23 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc0206607, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:23 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x4000000}) [ 257.053250][ T4360] loop3: detected capacity change from 0 to 4 [ 257.064674][ T4360] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:23 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x5000000}) 15:24:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r1, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:23 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc0206612, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:23 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x6000000}) [ 257.204932][ T4367] loop3: detected capacity change from 0 to 4 15:24:23 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x7000000}) [ 257.236609][ T4367] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:24 executing program 2: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f00000000c0), 0x7) 15:24:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, 0x0, 0x0) 15:24:24 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0xfdfdffff}) 15:24:24 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc0206637, &(0x7f0000000180)={0x0, 0x2d9b63c7}) 15:24:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, 0x0, 0x0) 15:24:24 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0xff000000}) [ 258.210969][ T4383] loop3: detected capacity change from 0 to 4 [ 258.248332][ T4383] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, 0x0, 0x0) 15:24:24 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0xfffffdfd}) 15:24:24 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x2, 0x2d9b63c7}) [ 258.357695][ T4389] loop3: detected capacity change from 0 to 4 15:24:24 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) 15:24:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) [ 258.381869][ T4389] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:25 executing program 2: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f00000000c0), 0x7) 15:24:25 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) [ 259.851445][ T4401] loop3: detected capacity change from 0 to 4 [ 259.873159][ T4401] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:25 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x3, 0x2d9b63c7}) 15:24:25 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x2}) 15:24:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 15:24:26 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x4, 0x2d9b63c7}) 15:24:26 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x3}) [ 260.038179][ T4406] loop3: detected capacity change from 0 to 4 [ 260.049055][ T4406] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:26 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x4}) 15:24:26 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x5, 0x2d9b63c7}) 15:24:26 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x5}) 15:24:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 260.222374][ T4414] Zero length message leads to an empty skb [ 260.817580][ T4424] loop3: detected capacity change from 0 to 4 15:24:26 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x6, 0x2d9b63c7}) 15:24:26 executing program 2: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f00000000c0), 0x7) 15:24:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 15:24:26 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x6}) [ 260.898269][ T4424] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:27 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x7}) 15:24:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 15:24:27 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x7, 0x2d9b63c7}) [ 261.203073][ T4431] loop3: detected capacity change from 0 to 4 [ 261.297400][ T4431] erofs: (device loop3): mounted with root inode @ nid 36. [ 261.306280][ T1352] ieee802154 phy0 wpan0: encryption failed: -22 [ 261.313264][ T1352] ieee802154 phy1 wpan1: encryption failed: -22 [ 261.624915][ T4434] loop3: detected capacity change from 0 to 4 15:24:27 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x300}) 15:24:27 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0xc, 0x2d9b63c7}) 15:24:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, 0x0, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 261.645392][ T4434] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:27 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x500}) 15:24:27 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x10, 0x2d9b63c7}) 15:24:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, 0x0, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:27 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) [ 261.729555][ T4442] loop3: detected capacity change from 0 to 4 [ 261.758377][ T4442] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, 0x0, 0x583d9510eb979b13, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:27 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x600}) 15:24:27 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x300, 0x2d9b63c7}) 15:24:28 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x700}) [ 261.862822][ T4453] loop3: detected capacity change from 0 to 4 [ 261.895150][ T4453] erofs: (device loop3): mounted with root inode @ nid 36. [ 263.620086][ T4458] loop3: detected capacity change from 0 to 4 15:24:29 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0xff00}) 15:24:29 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x500, 0x2d9b63c7}) 15:24:29 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) 15:24:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x0, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 263.683480][ T4458] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:30 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x1000000}) 15:24:30 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x600, 0x2d9b63c7}) [ 263.953192][ T4468] loop3: detected capacity change from 0 to 4 15:24:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x0, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) [ 263.975941][ T4468] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:30 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x2000000}) 15:24:30 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x700, 0x2d9b63c7}) 15:24:30 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x3000000}) [ 264.086610][ T4475] loop3: detected capacity change from 0 to 4 15:24:30 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x4000000}) [ 264.093400][ T3794] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 264.093514][ T3794] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 264.093649][ T3794] Buffer I/O error on dev loop3, logical block 0, async page read [ 264.135221][ T4475] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, r2, 0x0, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 15:24:30 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) 15:24:30 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0xc00, 0x2d9b63c7}) 15:24:30 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x5000000}) [ 264.716089][ T4484] loop3: detected capacity change from 0 to 4 [ 264.725678][ T4484] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:30 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x1b45, 0x2d9b63c7}) 15:24:30 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x6000000}) [ 264.800858][ T4490] loop3: detected capacity change from 0 to 4 [ 264.811883][ T4490] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:31 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x7000000}) 15:24:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, r2, 0x583d9510eb979b13}, 0x14}}, 0x0) 15:24:31 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x1f00, 0x2d9b63c7}) [ 264.879022][ T4497] loop3: detected capacity change from 0 to 4 [ 264.890600][ T4497] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:31 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0xfdfdffff}) 15:24:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, r2, 0x583d9510eb979b13}, 0x14}}, 0x0) 15:24:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, r2, 0x583d9510eb979b13}, 0x14}}, 0x0) 15:24:31 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0xff000000}) 15:24:32 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x3f00, 0x2d9b63c7}) 15:24:32 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) [ 265.887995][ T4508] loop3: detected capacity change from 0 to 4 [ 265.898912][ T4508] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:32 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0xfffffdfd}) 15:24:32 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x451b, 0x2d9b63c7}) [ 266.005155][ T4514] loop3: detected capacity change from 0 to 4 [ 266.012108][ T4514] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:32 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)) 15:24:32 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0xff00, 0x2d9b63c7}) [ 266.612819][ T4518] loop3: detected capacity change from 0 to 4 [ 266.619493][ T4518] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:32 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x2}) 15:24:32 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x3}) 15:24:32 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) 15:24:32 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000024002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) 15:24:32 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0xff0f, 0x2d9b63c7}) [ 267.747486][ T39] audit: type=1400 audit(1664033073.932:149): avc: denied { read write } for pid=4523 comm="syz-executor.1" name="nullb0" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 267.784192][ T4528] loop3: detected capacity change from 0 to 4 [ 267.800640][ T4528] erofs: (device loop3): mounted with root inode @ nid 36. [ 267.809798][ T39] audit: type=1400 audit(1664033073.962:150): avc: denied { open } for pid=4523 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 267.826738][ T39] audit: type=1400 audit(1664033073.962:151): avc: denied { map } for pid=4523 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 15:24:34 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x4}) [ 267.884101][ T39] audit: type=1400 audit(1664033073.962:152): avc: denied { execute } for pid=4523 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 15:24:34 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x100000, 0x2d9b63c7}) [ 267.917702][ T39] audit: type=1400 audit(1664033073.972:153): avc: denied { read write } for pid=4523 comm="syz-executor.1" name="fuse" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 15:24:34 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000024002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) [ 267.930062][ T4533] loop3: detected capacity change from 0 to 4 [ 267.932214][ T3794] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 267.932278][ T3794] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 267.932297][ T3794] Buffer I/O error on dev loop3, logical block 0, async page read [ 267.932348][ T3794] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 267.932389][ T3794] Buffer I/O error on dev loop3, logical block 0, async page read [ 267.932450][ T3794] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 267.932478][ T3794] Buffer I/O error on dev loop3, logical block 0, async page read [ 267.932541][ T3794] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 15:24:34 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x5}) [ 267.932570][ T3794] Buffer I/O error on dev loop3, logical block 0, async page read [ 267.932691][ T3794] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 267.932720][ T3794] Buffer I/O error on dev loop3, logical block 0, async page read [ 267.932791][ T3794] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 267.932852][ T3794] Buffer I/O error on dev loop3, logical block 0, async page read [ 267.932923][ T3794] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 267.932951][ T3794] Buffer I/O error on dev loop3, logical block 0, async page read [ 267.933029][ T3794] Buffer I/O error on dev loop3, logical block 0, async page read [ 267.933098][ T3794] Buffer I/O error on dev loop3, logical block 0, async page read [ 267.949688][ T39] audit: type=1400 audit(1664033073.972:154): avc: denied { open } for pid=4523 comm="syz-executor.1" path="/dev/fuse" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 267.988342][ T4533] erofs: (device loop3): mounted with root inode @ nid 36. [ 267.999614][ T39] audit: type=1400 audit(1664033074.062:155): avc: denied { append } for pid=3113 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 268.125574][ T39] audit: type=1400 audit(1664033074.062:156): avc: denied { open } for pid=3113 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 268.149941][ T39] audit: type=1400 audit(1664033074.062:157): avc: denied { getattr } for pid=3113 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 268.950135][ T4541] loop3: detected capacity change from 0 to 4 [ 268.964126][ T4541] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:35 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x1000000, 0x2d9b63c7}) 15:24:35 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) 15:24:35 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x6}) 15:24:35 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000024002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) 15:24:35 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x2000000, 0x2d9b63c7}) 15:24:35 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000024002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) 15:24:35 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x7}) [ 269.029583][ T4549] loop3: detected capacity change from 0 to 4 [ 269.041072][ T4549] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:35 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x300}) 15:24:35 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x500}) 15:24:35 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x3000000, 0x2d9b63c7}) 15:24:35 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000024002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) [ 269.144014][ T4558] loop3: detected capacity change from 0 to 4 [ 269.156418][ T4558] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:36 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x600}) 15:24:36 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x4000000, 0x2d9b63c7}) 15:24:36 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) 15:24:36 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000024002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) [ 270.654282][ T4569] loop3: detected capacity change from 0 to 4 [ 270.666713][ T4569] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:36 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x700}) 15:24:36 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000024002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) 15:24:36 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x4924924, 0x2d9b63c7}) [ 270.951499][ T4574] loop3: detected capacity change from 0 to 4 15:24:37 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) [ 270.965204][ T4574] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:37 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x5000000, 0x2d9b63c7}) 15:24:37 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000024002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4) 15:24:37 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0xff00}) [ 271.025749][ T4582] loop3: detected capacity change from 0 to 4 15:24:37 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x1000000}) [ 271.037588][ T4582] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:37 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x6000000, 0x2d9b63c7}) 15:24:37 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000024002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4) [ 271.093587][ T4588] loop3: detected capacity change from 0 to 4 [ 271.103452][ T4588] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:37 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x2000000}) [ 271.901393][ T4600] loop3: detected capacity change from 0 to 4 15:24:38 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x3000000}) 15:24:38 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000340)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/9, 0x9}}, 0x120) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x7) 15:24:38 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x7000000, 0x2d9b63c7}) 15:24:38 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000024002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4) 15:24:38 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x4000000}) [ 271.909962][ T4600] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:38 executing program 1: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000024002, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:24:38 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0xc000000, 0x2d9b63c7}) [ 271.982909][ T4607] loop3: detected capacity change from 0 to 4 [ 271.992707][ T4607] erofs: (device loop3): mounted with root inode @ nid 36. 15:24:38 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x80044940, &(0x7f00000000c0)={0x0, 0x0, 0x5000000}) 15:24:38 executing program 1: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000024002, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:24:38 executing program 1: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000024002, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 15:24:38 executing program 3: r0 = syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000040)="030045319544afdf1b45", 0xa, 0x480}], 0x0, &(0x7f0000000300)=ANY=[], 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x1b450000, 0x2d9b63c7}) [ 272.085333][ T4615] loop3: detected capacity change from 0 to 4 [ 272.094496][ T4615] erofs: (device loop3): mounted with root inode @ nid 36. [ 272.109702][ T4615] ------------[ cut here ]------------ [ 272.116037][ T4615] WARNING: CPU: 0 PID: 4615 at fs/iomap/iter.c:35 iomap_iter+0xd74/0x1100 [ 272.124887][ T4615] Modules linked in: [ 272.136127][ T4615] CPU: 0 PID: 4615 Comm: syz-executor.3 Not tainted 6.0.0-rc6-syzkaller-00286-ga63f2e7cb110 #0 [ 272.148907][ T4615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 272.165176][ T4615] RIP: 0010:iomap_iter+0xd74/0x1100 [ 272.172555][ T4615] Code: e9 55 fd ff ff e8 9c ad d3 ff e9 fb f8 ff ff e8 92 ad d3 ff e9 34 f8 ff ff e8 48 0f 88 ff 0f 0b e9 f1 f9 ff ff e8 3c 0f 88 ff <0f> 0b e9 86 f7 ff ff e8 30 0f 88 ff 0f 0b e9 5e f7 ff ff e8 24 0f [ 272.201072][ T4615] RSP: 0018:ffffc90003eafa88 EFLAGS: 00010216 [ 272.207535][ T4615] RAX: 00000000000009b2 RBX: ffffc90003eafb98 RCX: ffffc900035d9000 [ 272.214422][ T4615] RDX: 0000000000040000 RSI: ffffffff81f328b4 RDI: 0000000000000006 [ 272.223640][ T4615] RBP: 000000001256edfd R08: 0000000000000006 R09: 000000001256edfd [ 272.236557][ T4615] R10: 000000001b450000 R11: 000000000008c07c R12: 000000001256a8e2 [ 272.246416][ T4615] R13: 000000001b450000 R14: ffffc90003eafbc0 R15: ffffc90003eafc08 [ 272.255568][ T4615] FS: 00007f001235e700(0000) GS:ffff88802c800000(0000) knlGS:0000000000000000 [ 272.268354][ T4615] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 272.275651][ T4615] CR2: 00007f607b972b60 CR3: 000000000f323000 CR4: 0000000000150ef0 [ 272.289608][ T4615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 272.298749][ T4615] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 272.308740][ T4615] Call Trace: [ 272.311682][ T4615] [ 272.314043][ T4615] ? fiemap_prep+0x13f/0x220 [ 272.317545][ T4615] iomap_fiemap+0x1e8/0x360 [ 272.324571][ T4615] ? iomap_bmap+0x280/0x280 [ 272.330444][ T4615] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 272.352002][ T4615] erofs_fiemap+0x6d/0xa0 [ 272.357424][ T4615] do_vfs_ioctl+0x466/0x15c0 [ 272.364930][ T4615] ? vfs_fileattr_set+0xbe0/0xbe0 [ 272.371056][ T4615] ? selinux_inode_getsecctx+0x90/0x90 [ 272.376275][ T4615] ? __ct_user_exit+0xff/0x150 [ 272.382789][ T4615] ? lock_downgrade+0x5fb/0x6e0 [ 272.387465][ T4615] ? selinux_file_ioctl+0xb1/0x270 [ 272.391895][ T4615] __x64_sys_ioctl+0x108/0x200 [ 272.395755][ T4615] do_syscall_64+0x35/0xb0 [ 272.405963][ T4615] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 272.413556][ T4615] RIP: 0033:0x7f001128a669 [ 272.419186][ T4615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 272.438559][ T4615] RSP: 002b:00007f001235e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.449584][ T4615] RAX: ffffffffffffffda RBX: 00007f00113abf80 RCX: 00007f001128a669 [ 272.458058][ T4615] RDX: 0000000020000180 RSI: 00000000c020660b RDI: 0000000000000005 [ 272.465497][ T4615] RBP: 00007f00112e5560 R08: 0000000000000000 R09: 0000000000000000 [ 272.471348][ T4615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 272.477586][ T4615] R13: 00007fffb869587f R14: 00007f001235e300 R15: 0000000000022000 [ 272.483907][ T4615] [ 272.486474][ T4615] Kernel panic - not syncing: panic_on_warn set ... [ 272.492125][ T4615] CPU: 0 PID: 4615 Comm: syz-executor.3 Not tainted 6.0.0-rc6-syzkaller-00286-ga63f2e7cb110 #0 [ 272.500406][ T4615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 272.507557][ T4615] Call Trace: [ 272.510280][ T4615] [ 272.512556][ T4615] dump_stack_lvl+0xcd/0x134 [ 272.517118][ T4615] panic+0x2c8/0x627 [ 272.521001][ T4615] ? panic_print_sys_info.part.0+0x10b/0x10b [ 272.525300][ T4615] ? __warn.cold+0x248/0x2c4 [ 272.529888][ T4615] ? iomap_iter+0xd74/0x1100 [ 272.534463][ T4615] __warn.cold+0x259/0x2c4 [ 272.538016][ T4615] ? iomap_iter+0xd74/0x1100 [ 272.541522][ T4615] report_bug+0x1bc/0x210 [ 272.545426][ T4615] handle_bug+0x3c/0x60 [ 272.548614][ T4615] exc_invalid_op+0x14/0x40 [ 272.552254][ T4615] asm_exc_invalid_op+0x16/0x20 [ 272.556261][ T4615] RIP: 0010:iomap_iter+0xd74/0x1100 [ 272.560233][ T4615] Code: e9 55 fd ff ff e8 9c ad d3 ff e9 fb f8 ff ff e8 92 ad d3 ff e9 34 f8 ff ff e8 48 0f 88 ff 0f 0b e9 f1 f9 ff ff e8 3c 0f 88 ff <0f> 0b e9 86 f7 ff ff e8 30 0f 88 ff 0f 0b e9 5e f7 ff ff e8 24 0f [ 272.574391][ T4615] RSP: 0018:ffffc90003eafa88 EFLAGS: 00010216 [ 272.579050][ T4615] RAX: 00000000000009b2 RBX: ffffc90003eafb98 RCX: ffffc900035d9000 [ 272.584980][ T4615] RDX: 0000000000040000 RSI: ffffffff81f328b4 RDI: 0000000000000006 [ 272.591197][ T4615] RBP: 000000001256edfd R08: 0000000000000006 R09: 000000001256edfd [ 272.597613][ T4615] R10: 000000001b450000 R11: 000000000008c07c R12: 000000001256a8e2 [ 272.603268][ T4615] R13: 000000001b450000 R14: ffffc90003eafbc0 R15: ffffc90003eafc08 [ 272.608112][ T4615] ? iomap_iter+0xd74/0x1100 [ 272.610701][ T4615] ? iomap_iter+0xd74/0x1100 [ 272.613334][ T4615] ? fiemap_prep+0x13f/0x220 [ 272.615974][ T4615] iomap_fiemap+0x1e8/0x360 [ 272.618697][ T4615] ? iomap_bmap+0x280/0x280 [ 272.631910][ T4615] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 272.636229][ T4615] erofs_fiemap+0x6d/0xa0 [ 272.639290][ T4615] do_vfs_ioctl+0x466/0x15c0 [ 272.643356][ T4615] ? vfs_fileattr_set+0xbe0/0xbe0 [ 272.647655][ T4615] ? selinux_inode_getsecctx+0x90/0x90 [ 272.651921][ T4615] ? __ct_user_exit+0xff/0x150 [ 272.655338][ T4615] ? lock_downgrade+0x5fb/0x6e0 [ 272.659138][ T4615] ? selinux_file_ioctl+0xb1/0x270 [ 272.662960][ T4615] __x64_sys_ioctl+0x108/0x200 [ 272.666268][ T4615] do_syscall_64+0x35/0xb0 [ 272.670109][ T4615] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 272.674864][ T4615] RIP: 0033:0x7f001128a669 [ 272.678524][ T4615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 272.694842][ T4615] RSP: 002b:00007f001235e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.701961][ T4615] RAX: ffffffffffffffda RBX: 00007f00113abf80 RCX: 00007f001128a669 [ 272.707151][ T4615] RDX: 0000000020000180 RSI: 00000000c020660b RDI: 0000000000000005 [ 272.712742][ T4615] RBP: 00007f00112e5560 R08: 0000000000000000 R09: 0000000000000000 [ 272.719078][ T4615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 272.724726][ T4615] R13: 00007fffb869587f R14: 00007f001235e300 R15: 0000000000022000 [ 272.729891][ T4615] [ 272.733345][ T4615] Kernel Offset: disabled [ 272.736573][ T4615] Rebooting in 86400 seconds.. VM DIAGNOSIS: 15:24:38 Registers: info registers vcpu 0 RAX=000000000000006c RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8461bb01 RDI=ffffffff91488040 RBP=ffffffff91488000 RSP=ffffc90003eaf3e0 R8 =0000000000000001 R9 =000000000000001f R10=0000000000000000 R11=0000000000000000 R12=0000000000000000 R13=000000000000006c R14=ffffffff8461baa0 R15=0000000000000000 RIP=ffffffff8461bb2b RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 ffffffff 00c00000 DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 00007f001235e700 ffffffff 00c00000 GS =0000 ffff88802c800000 ffffffff 00c00000 LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f607b878004 CR3=000000000f323000 CR4=00150ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=25252525252525252525252525252525 XMM01=000000000000ff000000000000000000 XMM02=000000000000ff000000000000000000 XMM03=28203a73666f7265205d373036345420 XMM04=205b5d3134393934312e38363220205b XMM05=663d7373616c637420745f7366706d74 XMM06=79733d747865746e6f637420745f6467 XMM07=5f6d65747379733d747865746e6f6373 XMM08=632f6e69622f00736c6c6568732f6374 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000003 RCX=ffffffff81a9ca9b RDX=0000000000000003 RSI=0000000000000003 RDI=0000000000000005 RBP=ffffffff89f70880 RSP=ffffc90000d777b0 R8 =0000000000000005 R9 =0000000000000002 R10=0000000000000003 R11=0000000000000000 R12=0000000000000003 R13=0000000000000005 R14=0000000000000003 R15=0000000000000000 RIP=ffffffff817b353b RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802c900000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f00117b0000 CR3=0000000075913000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007f78e6f847c000007f78e6f847c8 XMM02=00007f78e6f847e000007f78e6f847c0 XMM03=00007f78e6f847c800007f78e6f847c0 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=000000000000000000000000307a7973 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 2 RAX=0000000000314e79 RBX=ffff888012532040 RCX=ffffffff897ffe95 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=0000000000000002 RSP=ffffc9000068fe00 R8 =0000000000000001 R9 =ffff88802ca34c4b R10=ffffed1005946989 R11=0000000000000001 R12=ffffed10024a6408 R13=0000000000000002 R14=ffffffff8dde41d0 R15=0000000000000000 RIP=ffffffff898304cb RFL=00000242 [---Z---] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802ca00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe0000091000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe000008f000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055dd79c14106 CR3=0000000074c23000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffff00ffffffffffffffff XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 3 RAX=00000000000b3145 RBX=ffff888012534080 RCX=ffffffff897ffe95 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=0000000000000003 RSP=ffffc9000069fe00 R8 =0000000000000001 R9 =ffff88802cb34c4b R10=ffffed1005966989 R11=0000000000000001 R12=ffffed10024a6810 R13=0000000000000003 R14=ffffffff8dde41d0 R15=0000000000000000 RIP=ffffffff898304cb RFL=00000242 [---Z---] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802cb00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe00000d8000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe00000d6000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f316257d1b8 CR3=0000000074c23000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffff00ffffffffffffffff XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000