Warning: Permanently added '10.128.0.237' (ED25519) to the list of known hosts. 2024/04/13 20:08:32 fuzzer started 2024/04/13 20:08:32 dialing manager at 10.128.0.163:30000 [ 23.852932][ T23] audit: type=1400 audit(1713038912.190:66): avc: denied { node_bind } for pid=347 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 23.885330][ T23] audit: type=1400 audit(1713038912.190:67): avc: denied { name_bind } for pid=347 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 23.948781][ T23] audit: type=1400 audit(1713038912.290:68): avc: denied { mounton } for pid=354 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.950246][ T354] cgroup1: Unknown subsys name 'net' [ 23.971230][ T23] audit: type=1400 audit(1713038912.290:69): avc: denied { mount } for pid=354 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.978120][ T354] cgroup1: Unknown subsys name 'net_prio' [ 24.005903][ T354] cgroup1: Unknown subsys name 'devices' [ 24.012281][ T23] audit: type=1400 audit(1713038912.350:70): avc: denied { unmount } for pid=354 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.179461][ T354] cgroup1: Unknown subsys name 'hugetlb' [ 24.185197][ T354] cgroup1: Unknown subsys name 'rlimit' [ 24.369647][ T23] audit: type=1400 audit(1713038912.710:71): avc: denied { mounton } for pid=354 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.404806][ T23] audit: type=1400 audit(1713038912.730:72): avc: denied { mount } for pid=354 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 24.419991][ T356] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.440023][ T23] audit: type=1400 audit(1713038912.730:73): avc: denied { setattr } for pid=354 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.494427][ T23] audit: type=1400 audit(1713038912.800:74): avc: denied { relabelto } for pid=356 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" 2024/04/13 20:08:32 code coverage: enabled 2024/04/13 20:08:32 comparison tracing: enabled 2024/04/13 20:08:32 extra coverage: enabled 2024/04/13 20:08:32 delay kcov mmap: mmap returned an invalid pointer 2024/04/13 20:08:32 setuid sandbox: enabled 2024/04/13 20:08:32 namespace sandbox: enabled 2024/04/13 20:08:32 Android sandbox: enabled 2024/04/13 20:08:32 fault injection: enabled 2024/04/13 20:08:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/04/13 20:08:32 net packet injection: enabled 2024/04/13 20:08:32 net device setup: enabled 2024/04/13 20:08:32 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2024/04/13 20:08:32 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/04/13 20:08:32 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/04/13 20:08:32 USB emulation: enabled 2024/04/13 20:08:32 hci packet injection: /dev/vhci does not exist 2024/04/13 20:08:32 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2024/04/13 20:08:32 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2024/04/13 20:08:32 swap file: enabled [ 24.519744][ T23] audit: type=1400 audit(1713038912.800:75): avc: denied { write } for pid=356 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.558220][ T354] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/04/13 20:08:33 starting 5 executor processes [ 25.080238][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.087292][ T370] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.094415][ T370] device bridge_slave_0 entered promiscuous mode [ 25.109098][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.115934][ T370] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.123408][ T370] device bridge_slave_1 entered promiscuous mode [ 25.187353][ T367] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.201052][ T367] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.209159][ T367] device bridge_slave_0 entered promiscuous mode [ 25.231091][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.251175][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.266530][ T371] device bridge_slave_0 entered promiscuous mode [ 25.279698][ T367] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.286513][ T367] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.300815][ T367] device bridge_slave_1 entered promiscuous mode [ 25.312464][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.320191][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.329012][ T371] device bridge_slave_1 entered promiscuous mode [ 25.367113][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.373941][ T369] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.381590][ T369] device bridge_slave_0 entered promiscuous mode [ 25.397630][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.404482][ T369] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.411902][ T369] device bridge_slave_1 entered promiscuous mode [ 25.508145][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.514981][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.522671][ T372] device bridge_slave_0 entered promiscuous mode [ 25.545169][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.552056][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.559454][ T372] device bridge_slave_1 entered promiscuous mode [ 25.604075][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.610949][ T370] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.618078][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.624791][ T370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.646729][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.653585][ T371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.660703][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.669191][ T371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.716553][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.723410][ T369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.730525][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.737292][ T369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.745969][ T367] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.752816][ T367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.759942][ T367] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.766679][ T367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.806259][ T104] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.813441][ T104] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.820775][ T104] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.828050][ T104] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.834995][ T104] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.841935][ T104] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.848956][ T104] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.855876][ T104] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.863667][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.872218][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.907577][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.921746][ T104] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.930906][ T104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.944473][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.956539][ T104] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.969206][ T104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.986949][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.003391][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.013791][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.028680][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.040653][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.048698][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.055604][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.079582][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.096945][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.104750][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.113404][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.121725][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.129788][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.136596][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.144034][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.152222][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.160291][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.167126][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.174563][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.182394][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.190266][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.199295][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.230342][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.237762][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.244954][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.254802][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.263720][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.271180][ T355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.278647][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.286802][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.294911][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.308147][ T355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.315528][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.323463][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.331223][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.339189][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.347086][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.355414][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.363236][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.371252][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.386968][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.403283][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.410739][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.418961][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.427059][ T104] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.433869][ T104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.441571][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.449761][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.457883][ T104] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.467593][ T104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.475837][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.493733][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.501926][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.510432][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.518152][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.543609][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.551627][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.559586][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.568656][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.576698][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.584444][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.607726][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.624229][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.632449][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.640649][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.648810][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.656422][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.664146][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.671826][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.702189][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.711008][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.719848][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.727809][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.735678][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.744022][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.752152][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.770154][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.778111][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.786081][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.798059][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.809617][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.818006][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.837286][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.845296][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.853712][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.861875][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.870766][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.878822][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.887076][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.899639][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.909322][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.926018][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 20:08:35 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100003e4e00000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) syz_mount_image$fuse(0x0, &(0x7f0000006340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000001, 0x12, r2, 0x0) ftruncate(r2, 0x8979) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000003c0)=@v1={0x0, @adiantum, 0x0, @desc3}) mount$incfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='rlog_pages=000000000000000000010']) [ 26.943245][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.956587][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.970697][ T104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:08:35 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x4, 0x80, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f00000002c0), &(0x7f0000000200)='%-010d \x00'}, 0x20) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1) splice(r2, &(0x7f0000000000)=0x1, r3, &(0x7f0000000100)=0x400, 0x8, 0x4) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000020c0)={0x43}, 0x10) bind$tipc(r4, 0x0, 0x0) r5 = socket$nl_audit(0x10, 0x3, 0x9) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) unshare(0x20000400) shutdown(r6, 0x0) ioctl$sock_netdev_private(r5, 0x8971, &(0x7f0000002300)="0ab7d8a8acafb3b6553a") sendmsg$tipc(r4, &(0x7f00000019c0)={&(0x7f00000013c0)=@name, 0x10, 0x0}, 0x0) write(r4, &(0x7f0000000180)="e58bc4a77dfa3ec85c31609b28639ecce3245f283680b02d25bfb824fac4eb05d206861036c0d0488ad828797bdb59ee39b5f15129b6d03e930e60bb18c35644da890c1656b4c6b8d28b49576cd26e1e09827f34b0a2679dd19ece945a4f0198946d0d0c4c6e96feda92e4c7c66676b2d2b7", 0x72) ioctl$KVM_CAP_SPLIT_IRQCHIP(r2, 0x4068aea3, &(0x7f0000000240)) r7 = eventfd2(0x47, 0x801) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x1c, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x9d}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000040)={r7, 0x30c1, 0x0, r3}) 20:08:35 executing program 3: unshare(0x60600) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f00000007c0)={[{@errors_remount}, {@nodiscard}, {@noquota}, {@init_itable}, {@minixdf}, {@resgid}, {@debug}, {@delalloc}, {@usrquota}]}, 0x10, 0x4d2, &(0x7f00000002c0)="$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") mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000001040)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file2'}}], [], 0x2c}) setxattr$incfs_size(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0), 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) fchmodat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) unshare(0x20000) chdir(&(0x7f0000000180)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 20:08:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0xa, 0x8000, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000000)="ee", &(0x7f0000000040)=""/228}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x2000002, &(0x7f00000001c0)=ANY=[], 0x1, 0x55a, &(0x7f0000000ac0)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000007d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='sys_exit\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) unshare(0x600) getsockname(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0xfffffffffffffffd, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8, r3}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000005c0)={r5, &(0x7f00000004c0)="3be0e4af8758f46d768dd45813e7893ab85fce6a54c1d4f5de166d974e0b3bc0532745fa23d3ea1c45ba7bb75154210939cb213601e22af4", &(0x7f0000000540)=""/108}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@generic={&(0x7f0000000340)='./file0\x00', 0x0, 0x18}, 0x18) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000200)={0xb, {{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @dev}}]}, 0x110) syz_emit_ethernet(0x5e, &(0x7f0000000280)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x28, 0x3a, 0x0, @dev={0xfe, 0x80, '\x00', 0x2a}, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @mcast1}}}}}}, 0x0) getdents(r3, 0x0, 0x700) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r6}, 0x10) rt_sigprocmask(0x2, &(0x7f0000000240)={[0x1000009]}, 0x0, 0x5d) r7 = signalfd(0xffffffffffffffff, &(0x7f00000002c0)={[0x7fffffff]}, 0x8) r8 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x17, 0x4, @tid=r8}, &(0x7f0000000080)) read$FUSE(r7, &(0x7f00000008c0)={0x2020}, 0x2020) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) io_setup(0x1, &(0x7f0000000b80)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 20:08:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x20081e, &(0x7f00000020c0)=ANY=[], 0x1, 0x4ef, &(0x7f0000000a00)="$eJzs3U1vW1kZAODXzpeTyUwywywAAVOGgYKqOonbRlUXUFYIoUqILkFqQ+JGUew4ip3ShC7S/4BEJVaw5Aew7oo9GwQ7NmWBxEcEaiqxMLrXN6mb2k1oEjuKn0e6uvfcY/s9J849x36d+AQwsC5FxE5EjEbE/YiYys7nsi1ut7bkdi92Hy/u7T5ezEWzefefubQ+ORdt90m8lz1mISJ+9L2In+bejFvf2l5dqFTKG63i+Eyjuj5T39q+ulJdWC4vl9dKpfm5+dmb126UTq2vn1RHs6MvP//Dzrd+njRrMjvT3o/T1Or6yEGcxHBE/OAsgvXBUNaf0X43hHeSj4iPIuLT9PqfiqH02QQALrJmcyqaU+1lAOCiy6c5sFy+mOUCJiOfLxZbObyPYyJfqdUbVx7UNteWWrmy6RjJP1iplGezXOF0jOSS8lx6/KpcOlS+FhEfRsQvxsbTcnGxVlnq5wsfABhg7x2a//8z1pr/AYALrtDvBgAAPWf+B4DBY/4HgMFj/geAwWP+B4DBY/4HgMFj/geAgfLDO3eSrbmXff/10sOtzdXaw6tL5fpqsbq5WFysbawXl2u15fQ7e6pHPV6lVlufux6bj6a/vV5vzNS3tu9Va5trjXvp93rfK4/0pFcAwNt8+MmzP+ciYufWeLpF21oO5mq42PL9bgDQN0P9bgDQN1b7gsF1gvf40gNwQXRYovc1hYgYP3yy2Ww2z65JwBm7/AX5fxhUbfl/fwUMA0b+HwaX/D8MrmYzd9w1/+O4NwQAzjc5fqDL5/8fZfvfZh8O/GTp8C2enmWrAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4HzbX/+3mK0FPhn5fLEY8X5ETMdI7sFKpTwbER9ExJ/GRsaS8lyf2wwAnFT+b7ls/a/LU59NHq4dzb0cS/cR8bNf3f3lo4VGY+OPyfl/HZxvPM3Ol/rRfgDgKPvzdLpveyP/Yvfx4v7Wy/b8/bsRUWjF39sdjb2D+MMxnO4LMRIRE//OZeWWXFvu4iR2nkTE5zv1PxeTaQ6ktfLp4fhJ7Pd7Gj//Wvx8WtfaJz+Lz51CW2DQPEvGn9udrr98XEr3na//QjpCnVw2/iUPtbiXjoGv4u+Pf0Ndxr9Lx41x/fffbx2Nv1n3JOKLwxH7sffaxp/9+Lku8T87Zvy/fOkrn3ara/464nJ0jt8ea6ZRXZ+pb21fXakuLJeXy2ul0vzc/OzNazdKM2mOeqb7bPCPW1c+6FaX9H+iS/zCEf3/+jH7/5v/3v/xV98S/5tf6xQ/Hx+/JX4yJ37jmPEXJn5X6FaXxF/q0v+jnv8rx4z//K/bbywbDgD0T31re3WhUilv9PJg/4VET4M6uAAHyW/NOWhGx4Pv9CrWaPxf92o23ylWtxHjNLJuwHlwcNFHxMt+NwYAAAAAAAAAAAAAAOioF/+x1O8+AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcHH9LwAA//89fM7W") quotactl$Q_SETINFO(0xffffffff80000601, &(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7}) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x8}]}]}}, 0x0, 0x32}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/mcfilter6\x00') pread64(r1, 0x0, 0x0, 0x68) preadv(r1, &(0x7f00000007c0)=[{&(0x7f00000000c0)=""/189, 0xbd}], 0x1, 0x2, 0x1282) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x8, 0x8, 0x9, 0x5, 0x201, r1, 0x80000000, '\x00', 0x0, r0, 0x3, 0x3}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x1, 0x2}]}, @union]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000280)=""/232, 0x44, 0xe8, 0x1}, 0x20) [ 27.007564][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.015568][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.041717][ T395] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 20:08:35 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0xffffffffffffffff, 0x8180) fchdir(r0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0005, &(0x7f0000000140)=ANY=[], 0xfe, 0x45a, &(0x7f0000000940)="$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") 20:08:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) shutdown(r0, 0x1) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, &(0x7f00000000c0)="04", 0x1, 0x20000005, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000600)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f4b906", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @time_exceed={0x2, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "fd9063", 0x0, 0x33, 0x0, @loopback, @empty, [@dstopts={0x33}]}}}}}}}, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x0, @any, 0x4}, 0xfffffffffffffdf4) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000600)='./bus\x00', 0x1810714, &(0x7f0000000180)=ANY=[@ANYBLOB="757365725f78617474722c6e6f6c617a7974696d652c6e6f75696433322c6d696e697864662c64696f726561645f6c6f636b2c005639dfe6bf5d7b918f1fae179a6087210418501392c2fb3f976bb0daac48f566cbb46103c289c71110b8a365e42660f5632456df5f7edbbf0f3c2c3d29bfc1b12bdeaa8d89c07d86427314f1be6f324a6657c4da38ccd8d895f8289db7e47b2999e34e15e7771506dc6a9a5cc7f32be448f485ca32481de9bf712036c1338f5f5253d15e991000d7"], 0xff, 0x470, &(0x7f0000000ac0)="$eJzs281vG0UbAPBn104/37dJSym0FBEoiIiPpElb6IELCCQOIIHgUI4hSatSt0FNkGhVQYpQOaJK3BFHJP4CTpwQcELiwgHuqFIFFVILF4zW3k1tY4cmceIQ/36S2xnv7M482Z3d8YwdQN8azv5JIv4XET9FxGA921xguP7frRuXpv64cWkqiWr1tV+TWrmbNy5NFUWL/XbmmZE0Iv0wyStpNnfh4pnJSmXmfJ4fmz/79tjchYtPnj47eWrm1My5iePHjx4Zf/qpiWNN+x1bYZxZfDcPvDd7cP+Lb1x9eerE1Te//SJr777769sb4+iW4Szw36o1rdse6XZlPfZX9XacSbnXreFOlSIiO10Dtf4/GKW4ffIG44UPeto4YE1l9+ytnTcvVIFNLIletwDojeJBn33+zV8D6zT02BCuP1v/AJTFfit/1beUI83LrOUfZDgiTiz8+Wn2ipZ5iGqbeQMAgNX6Khv/PNE0/svHH2nsayi3K18bGoqI3RGxJyLuioi9EXF3RK3sPRFx7zLrb10a+uc6THptRYHdoWz890y+ttU8/itGfzFUynP/r8U/kJw8XZk5nP9NRmJga5Yfb3fw4hDP//Bxp/obx3/ZK6u/GAvmB7lWbpmgm56cn+zWoPT65YgD5XbxJ4srAUlE7I+IA8s79K4icfqxzw92KvTv8S+hC+tM1c8iHq2f/4Voib+QLL0+ObYtKjOHx+pXRalNHd99f+WVTvWvKv4uyM7/jubrv6XE4O9J43rt3PLruPLzRx3XVssrvP63JK/X1nS35O+9Ozk/f348YkvyUi3f9P7E7X2LfFE+i3/kUPv+vyffJ4v/vog4GPFj0e0eyM/dgxHxUEQcWiL+b557+K1O2zbC+Z9ue/9bvP6Hms//8hOlM19/2an+O7v/Ha2lRvJ3ave/3PYOx+3cnG15iZVezQAAAPDfk9a+G5+ko4vpNB0drX+Hf2/sSCuzc/OPn5x959x0/Tv0QzGQFvOfgw3zoePJQn7Een4inysuth+JSHZHxCel7bX86NRsZbrHsUO/29mh/2d+aTeZDWwufq8F/au1/6c9agew/jz/oX/p/9C/9H/oX0X/f7XhvfdbylgLgM3J8x/6l/4P/Wux/1/ubTuA9ef5D31pNb/rX6tEeYlf72/QRDE7ulHasw6JSJe1Vzk2QJv7JVHuQu/u4U0JAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgi/4OAAD//0Lr7xk=") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x40000002}, 0x1c) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000}) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x20000000) [ 27.118837][ T400] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 27.134315][ T400] ext4 filesystem being mounted at /root/syzkaller-testdir4135658059/syzkaller.jph8t0/0/file1 supports timestamps until 2038 (0x7fffffff) 20:08:35 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{}, 'syz1\x00'}) r1 = socket(0x1e, 0x805, 0x0) connect$tipc(r1, &(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{}, 0x2}}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000040)={0x0, 0xea60}, 0x10) readv(r2, &(0x7f0000003440)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x0, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3b, &(0x7f0000000480)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x74}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0xfffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5574}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x6}, @alu={0x4, 0x1, 0xa, 0xa, 0xb, 0xfffffffffffffffe, 0xfffffffffffffffc}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x6}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) connect$tipc(r1, &(0x7f0000000000)=@id, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) close(r1) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x2) r5 = dup(r0) ioctl$UI_SET_SNDBIT(r5, 0x4004556a, 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 27.193469][ T405] EXT4-fs (loop2): #blocks per group too big: 24576 [ 27.269364][ T403] [EXT4 FS bs=4096, gc=1, bpg=71, ipg=32, mo=a80ec0a8, mo2=0001] [ 27.281629][ T403] System zones: 0-2, 18-18, 34-34 [ 27.289384][ T403] EXT4-fs (loop3): 1 orphan inode deleted [ 27.296748][ T403] EXT4-fs (loop3): mounted filesystem without journal. Opts: errors=remount-ro,nodiscard,noquota,init_itable,minixdf,resgid=0x0000000000000000,debug,delalloc,usrquota, [ 27.313993][ T408] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 27.322042][ T403] ext4 filesystem being mounted at /root/syzkaller-testdir3784934807/syzkaller.ng920y/1/file1 supports timestamps until 2038 (0x7fffffff) [ 27.337764][ T408] EXT4-fs error (device loop4): ext4_ext_check_inode:540: inode #15: comm syz-executor.4: pblk 0 bad header/extent: invalid eh_entries - magic f30a, entries 24833, max 4(4), depth 0(0) [ 27.357142][ T408] EXT4-fs error (device loop4): ext4_orphan_get:1240: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 27.369394][ T408] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 27.378187][ T408] ext2 filesystem being mounted at /root/syzkaller-testdir1273074055/syzkaller.VTg5H0/0/file0 supports timestamps until 2038 (0x7fffffff) 20:08:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x64, 0x0, 0x0, 0xfffff024}]}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000006c0)=@newsa={0x1a8, 0x10, 0x633, 0x0, 0x0, {{@in=@remote, @in=@local}, {@in6=@dev, 0x0, 0x32}, @in6=@local, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @algo_auth_trunc={0x6d, 0x14, {{'cmac(aes)\x00'}, 0x108, 0x0, "26d8808b972779674edf26677aab1bd8c3341935a47d015e1825f46626e7469f4a"}}]}, 0x1a8}}, 0x0) [ 27.440646][ T403] overlayfs: filesystem on './file0' not supported as upperdir [ 27.448921][ T403] incfs: Unexpected inode type [ 27.455010][ T403] ------------[ cut here ]------------ [ 27.460267][ T403] kernel BUG at fs/namei.c:2894! [ 27.465446][ T403] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 27.471305][ T403] CPU: 1 PID: 403 Comm: syz-executor.3 Not tainted 5.4.268-syzkaller-00012-gd0d34dcb02cc #0 [ 27.481197][ T403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 27.491110][ T403] RIP: 0010:may_delete+0x750/0x760 [ 27.496039][ T403] Code: 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c e8 fd ff ff 4c 89 e7 e8 71 13 f6 ff e9 db fd ff ff e8 87 3f c6 ff 0f 0b e8 80 3f c6 ff <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 56 53 48 89 fb [ 27.501614][ T425] input: syz1 as /devices/virtual/input/input4 [ 27.515487][ T403] RSP: 0018:ffff8881d2bcf788 EFLAGS: 00010293 [ 27.515496][ T403] RAX: ffffffff819e07a0 RBX: ffff8881f11a8348 RCX: ffff8881f0d1cec0 [ 27.515500][ T403] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000000000000000 [ 27.515505][ T403] RBP: ffff8881d50a9140 R08: ffffffff819e00c8 R09: 0000000000000003 [ 27.515510][ T403] R10: ffffffffffffffff R11: dffffc0000000001 R12: ffff8881f11a8330 [ 27.515515][ T403] R13: dffffc0000000000 R14: 0000000000000001 R15: ffff8881d5204b50 [ 27.515521][ T403] FS: 00007f335f12f6c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 27.515526][ T403] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 27.515531][ T403] CR2: 0000001b32527000 CR3: 00000001d6a72000 CR4: 00000000003406a0 [ 27.515537][ T403] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 27.515541][ T403] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 27.515544][ T403] Call Trace: [ 27.515560][ T403] ? __die+0xb4/0x100 [ 27.515568][ T403] ? die+0x26/0x50 [ 27.515576][ T403] ? do_trap+0x1e7/0x340 [ 27.515584][ T403] ? may_delete+0x750/0x760 [ 27.515590][ T403] ? may_delete+0x750/0x760 [ 27.515596][ T403] ? do_invalid_op+0xfb/0x110 [ 27.515602][ T403] ? may_delete+0x750/0x760 [ 27.515609][ T403] ? invalid_op+0x1e/0x30 [ 27.515617][ T403] ? may_delete+0x78/0x760 [ 27.515622][ T403] ? may_delete+0x750/0x760 [ 27.515628][ T403] ? may_delete+0x750/0x760 [ 27.515635][ T403] ? may_delete+0x750/0x760 [ 27.515643][ T403] vfs_rmdir+0x29/0x3c0 [ 27.515653][ T403] incfs_kill_sb+0x105/0x200 [ 27.515664][ T403] deactivate_locked_super+0xa8/0x110 [ 27.515674][ T403] deactivate_super+0x1e2/0x2a0 [ 27.515684][ T403] ? deactivate_locked_super+0x110/0x110 [ 27.515692][ T403] ? lockref_put_return+0xbf/0xe0 [ 27.515701][ T403] ? dput+0x294/0x2f0 [ 27.515710][ T403] cleanup_mnt+0x44e/0x500 [ 27.515719][ T403] task_work_run+0x140/0x170 [ 27.515729][ T403] do_exit+0xcaf/0x2bc0 [ 27.515740][ T403] ? put_task_struct+0x80/0x80 [ 27.515751][ T403] ? _raw_spin_lock_irqsave+0x210/0x210 [ 27.515759][ T403] do_group_exit+0x138/0x300 [ 27.515768][ T403] get_signal+0xdb1/0x1440 [ 27.515778][ T403] do_signal+0xb0/0x11f0 [ 27.515799][ T403] ? signal_fault+0x1e0/0x1e0 [ 27.746964][ T403] ? __se_sys_futex+0x355/0x470 [ 27.751633][ T403] ? __x64_sys_futex+0xf0/0xf0 [ 27.757524][ T403] ? fpu__clear+0x3c0/0x3c0 [ 27.762848][ T403] exit_to_usermode_loop+0xc0/0x1a0 [ 27.768034][ T403] prepare_exit_to_usermode+0x199/0x200 [ 27.776204][ T403] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 27.783561][ T403] Modules linked in: 20:08:36 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x6c, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x27b8, 0x1ed, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000300)={0x24, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x22, 0x5, {[@local=@item_4={0x3, 0x2, 0x0, "8031fce1"}]}}, 0x0}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) 20:08:36 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@private, @in=@local, 0x4e24, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in6=@private1, 0x0, 0x0, 0x0, 0x5}}, 0xe8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x20081, 0x0) pipe(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r5, 0x0, r7, 0x0, 0x800ff06, 0x0) write$binfmt_misc(r4, &(0x7f0000000740)=ANY=[], 0xfffffc8f) splice(r3, 0x0, r6, 0x0, 0x800, 0x0) dup2(r3, r6) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x22}, 0x44) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000040)='percpu_alloc_percpu\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x5, 0x5, 0x8, 0x8}, 0x48) inotify_add_watch(r7, &(0x7f0000000180)='./file0\x00', 0x22000122) write$vga_arbiter(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='target PCI:0:b:4.3'], 0x13) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000000041}, 0xc) connect$inet6(r0, &(0x7f00000000c0), 0x1c) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0xff, 0x23f, &(0x7f0000000540)="$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") syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x10000, 0x0, 0x3, 0x0, &(0x7f0000000000)) r9 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdirat(r9, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f00000013c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f0000000780)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000500)='.\x00', 0x0, 0x3) open(&(0x7f00000025c0)='./file0\x00', 0x0, 0x0) r10 = syz_open_dev$evdev(&(0x7f0000000340), 0x5, 0x220800) ioctl$LOOP_CHANGE_FD(r9, 0x4c06, r10) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 27.790759][ T403] ---[ end trace aec07c56817ed079 ]--- [ 27.801420][ T418] EXT4-fs (loop0): Mount option "dioread_lock" incompatible with ext2 [ 27.809664][ T403] RIP: 0010:may_delete+0x750/0x760 [ 27.816052][ T403] Code: 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c e8 fd ff ff 4c 89 e7 e8 71 13 f6 ff e9 db fd ff ff e8 87 3f c6 ff 0f 0b e8 80 3f c6 ff <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 56 53 48 89 fb [ 27.844787][ T403] RSP: 0018:ffff8881d2bcf788 EFLAGS: 00010293 [ 27.852362][ T403] RAX: ffffffff819e07a0 RBX: ffff8881f11a8348 RCX: ffff8881f0d1cec0 [ 27.860503][ T403] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000000000000000 [ 27.868534][ T403] RBP: ffff8881d50a9140 R08: ffffffff819e00c8 R09: 0000000000000003 [ 27.876371][ T403] R10: ffffffffffffffff R11: dffffc0000000001 R12: ffff8881f11a8330 [ 27.884346][ T403] R13: dffffc0000000000 R14: 0000000000000001 R15: ffff8881d5204b50 [ 27.892472][ T403] FS: 00007f335f12f6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 27.909986][ T418] capability: warning: `syz-executor.0' uses deprecated v2 capabilities in a way that may be insecure [ 27.914560][ T403] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 27.927294][ T403] CR2: 00007fff035e57b0 CR3: 00000001eeaa9000 CR4: 00000000003406b0 [ 27.941413][ T403] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 27.952213][ T403] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 27.960265][ T403] Kernel panic - not syncing: Fatal exception [ 27.966508][ T403] Kernel Offset: disabled [ 27.970651][ T403] Rebooting in 86400 seconds..