last executing test programs: 753.385162ms ago: executing program 2 (id=422): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xe, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000ecff850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r3, 0x0, &(0x7f0000001780)=""/4096}, 0x20) 707.621092ms ago: executing program 2 (id=424): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x121301, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x2810000, &(0x7f0000000380)={[{@user_xattr}, {@noquota}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@jqfmt_vfsv1}, {@data_err_abort}, {@dioread_nolock}, {@noquota}, {@min_batch_time={'min_batch_time', 0x3d, 0x8}}, {@delalloc}, {@user_xattr}, {@quota}]}, 0x1, 0x54f, &(0x7f0000000b00)="$eJzs3d9rW1UcAPDvTdv91nUwhopIYQ9O5tK19ccEH+aj6HCg7zO0d2U0WUaTjrUO3B7ciy8yBBEH4ru++zj8B/wrBjoYMoo++BK56U2XrUmbZdnamc8HbnvOvTc995t7v6fn5iQkgKE1kf0oRLwcEd8kEQfbto1GvnFibb/V+1dnsyWJRuPTv5JI8nWt/ZP89/688lJE/PZVxPHCxnZryysLpXI5Xczrk/XKpcna8sqJC5XSfDqfXpyemTn19sz0e+++M7BY3zj7z/ef3P7w1NdHV7/75e6hm0mcjgP5tvY4nsC19spETOTPyVicfmTHqQE0tpMk230A9GUkz/OxyPqAgzGSZz3w//dlRDSAIZXIfxhSrXFA695+QPfBz417H6zdAG2Mf3TttZHY07w32reaPHRnlN3vjg+g/ayNX/+8dTNbYnCvQwBs6dr1iDg5Orqx/0vy/q9/J3vY59E29H/w7NzOxj9vdhr/FNbHP9Fh/LO/Q+72Y+v8L9wdQDNdZeO/9zuOf9cnrcZH8toLzTHfWHL+QjnN+rYXI+JYjO3O6pvN55xavdPotq19/JctWfutsWB+HHdHdz/8mLlSvfQkMbe7dz3ilY7j32T9/Ccdzn/2fJztsY0j6a3Xum3bOv6nq/FTxOsdz/+DGa1k8/nJyeb1MNm6Kjb6+8aR37u1v93xZ+d/3+bxjyft87W1x2/jxz3/pt229Xv970o+a5Z35euulOr1xamIXcnHG9dPP3hsq97aP4v/2NHN+79O1//eiPi8x/hvHP751f7jf7qy+Oce6/w/fuHOR1/80K393s7/W83SsXxNL/1frwf4JM8dAAAAAAAA7DSFiDgQSaG4Xi4UisW193ccjn2FcrVWP36+unRxLpqflR2PsUJrpvtg2/shpvL3w7bq04/UZyLiUER8O7K3WS/OVstz2x08AAAAAAAAAAAAAAAAAAAA7BD7u3z+P/PHyHYfHfDU+cpvGF5b5v8gvukJ2JH8/4fhJf9heMl/GF7yH4aX/IfhJf9heMl/GF7yHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAbq7Jkz2dJYvX91NqvPXV5eWqhePjGX1haKlaXZ4mx18VJxvlqdL6fF2Wplq79XrlYvTU3H0pXJelqrT9aWV85VqksX6+cuVErz6bl07JlEBQAAAAAAAAAAAAAAAAAAAM+X2vLKQqlcThcVFPoqjO6Mw1AYcGG7eyYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeOC/AAAA///ktDiZ") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x6) 707.509472ms ago: executing program 1 (id=425): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x2409c8c1, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f0000000e80)="0d0ad7c36d6617110e434332d6ac582208222cfb7c37ce1148f448455bc37f5f70c92774dcb201629979039d7c8943b207e5bdf9ab8eed9ace110469c51f4f211dd9fad815eb5b273ac04e1edc679bcdf0a0d24482de5454be9003cb80714a95e136bb704ee58e707d1e69b3c3a1c2c37f9c0402e14abdeb32086a49aff25e5c0f0131d59b4783316b9fa2c71c51ce76942d5f519145c9e3bf0d4182b4a62970b2ce81d35a7afc8384b387b8e21f2051d90d92323a710cabe5275d335b64453e759251a140de480541d8dd7662a14296a59eba99b95bfdf5b22992c323865b471d13ad79867e2692fd4eece299a81e2b33336b6801f51c2ae8d73e4df90c9bd70cd535b72cbdf67754acdc44b3780450308d9c5527c3314eb7b2cc38b61e96403a30a8ba0c8a357aa04d3c62bc51bcf55cf214f44a909b29c30c18c3a43c86472612086664a80f2aa8490e58352732acb96eb46deab42895d1957a6029ad86e7a5ced6bde89c158aaee721954beeebe5973059007f7dd5459029af6d3f1d73d35f07d19b7cedfc80d1d7ef37f8b113f564afd0f093202929fef43e788619ca522c7f679dd2f27949d879b4dab46581a0e054b4ed1db37e43f528748b56ec5a54b7af198d4ae551046f7814fe3a5cbc1cc7cb6655fc198939b049f3c02443148c588e34d6ebef81096b4e48f468016d2bde0828664c0874d71e2d88b3bc04079d4a504255a83c3f07a4f1c3e5a4c66f55f36e51e344392487c8299d8d1bfb568780c0d57df48990cb5d6b35c3f7445f80312186d8598faf61072d4eefc961fb5a7e72b971c8f94a8346effd27362cee8d72a98b55e317de280d2d63ee83ca7140b7913122d402c536d914c8510c81d08f0ad1c952f5b7ad5e7ef72d7c58cb4d5bafbea535b381df6ebe94c62cf782cf7ab81c017c296a88ca91d641b45748d230cf5e87e5dbee4764ea4d131ae022e6bbf3ffc3ea7b264737d9db44354bfffa63d79bc403d3ac23fb615edc382d18b0daf1bbb2fbd708d1830ddac1c3f098b8cb1ef9a0019d804bf5d953110f12f3b9a8b9b7e0c61cb5d34116add1fc9a92721ffa5fdc83e1488cf88aa6e56ad2dd55e0aadd827cc7b4e7242f01241f49e905e5e7451092c28c3f6560a6a0002e5d91fc253a5a8fd8f27e42f4f02f5849528b7d93df9b0c568022acaff410e797e88d2f8eeadbba66e423335b843df734d203fa62a861b712da8f33d5ea721767871aa2cd53e659e505507de9a54d7e6fa3c20bbfb28cd6dd2b314dabbb59e9ce15c0a94ec3b3efc54eaaa27bd7576a687dcaf58dc182662539943014a02e76dc89f48c9f83cc7199038418f965ad3dc866098b89cabcac8691b0f51ffb71902337e49293309c4480a8f1b32411cc1b55a0ec0fe2c2572fe9d488a25bfc12ba74048e1d7beee93321c7aa49ea17cb9728dc46e5272154b3b995feacbacb8885621b335274af4df9365f8c8121ff323b572d320c8fc46acd6218b9579d43005e7b0506ccb14d9a0dac4cc6efaf5366c44342eaea8b5a11457f5afbea913ce4975ab67e6a85bc46e714ca5741da38a7cceb9e85d77fd03f83f7a5ecc7241e69e2bda327f769b48ba5f13662585c72778d12bd0e9a62a3d0dbe376d1aee81e6845c2cf23f42c458ae5668c8d387bf9ab224bc9703f1c08347be810d2f19278fe8d97560b3c9f1816667d0461a25e778eb1404dcaac1ed0a6a0745f3a5d2dc1b6babf98f5135d531cb26334ef2fec4c78c95b7193935139664fc65f17b047eb3dc39e251ba52ce33f8099719f1a789db1690347355e7b02d4c522692b9597fd31abb90f973ae4eb0bd0d900cdd887ff01d4845d7f0aee39b220a65a5aeee0fd386054070723c841c042d5339cc6325f07f0f733d124c6524f388ef7419f42c06278b8fceaa3a16b202dfb539b129762397e29cdd679ca6240272fa0c3e2e8c0a27aaa407f30b4024d0638dfca1bc9483db3ccc2880f", 0x5c6, 0x6d91fb6102d8910c, 0x0, 0xfffffffffffffe38) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 684.363682ms ago: executing program 1 (id=427): unshare(0x66000080) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000a5"], &(0x7f0000000b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="5800000010000104000020000000000000000000", @ANYRES32=0x0, @ANYBLOB="2b12020000000000280012800b00010067656e6576650000180002"], 0x58}}, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'geneve0\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x11, @loopback, 0x0, 0x0, 'wlc\x00', 0x3b, 0x0, 0x37}, 0x2c) sendto$packet(r2, &(0x7f0000000180)="0b032200e0ff25120200475400f6a13bb100c117080008004803", 0x10000, 0xffffffffffffc117, &(0x7f0000000140)={0x11, 0x0, r3}, 0x14) 635.823142ms ago: executing program 4 (id=428): syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000080000000015000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe2$9p(0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000480)=ANY=[], 0x8) 635.686422ms ago: executing program 1 (id=429): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000fb"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="e33110495bfcaaaaaaaaaaaa86dd"], 0x0) 635.601842ms ago: executing program 4 (id=430): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0xa46, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x80440, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 635.468812ms ago: executing program 1 (id=431): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x18) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000440), 0x1000a) sendfile(r0, r3, &(0x7f0000000000), 0x1001) 621.907962ms ago: executing program 1 (id=432): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x2000, &(0x7f0000000780)={&(0x7f0000000380)=ANY=[@ANYBLOB="340000001800dd8d00000000000000000200000000000006000000000600150006000000100016800c0001"], 0x34}}, 0x0) 612.407242ms ago: executing program 1 (id=433): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = gettid() r1 = eventfd2(0x0, 0x0) r2 = dup(r1) read$FUSE(r2, &(0x7f0000000a40)={0x2020}, 0x2020) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./bus\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x36c, &(0x7f00000023c0)="$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") r4 = syz_open_dev$loop(&(0x7f0000001580), 0x7, 0x82480) ioctl$LOOP_GET_STATUS64(r4, 0x4c05, &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_RINGS_GET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000002a80)=ANY=[], 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x40080) 499.628672ms ago: executing program 4 (id=435): syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f0000000140)={[{@bsdgroups}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0xda}}, {@init_itable}, {@nojournal_checksum}, {@nomblk_io_submit}]}, 0xa, 0xbb8, &(0x7f00000017c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) 479.020381ms ago: executing program 2 (id=437): syz_emit_ethernet(0x4e, &(0x7f0000000880)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "010448", 0x18, 0x3a, 0xff, @remote, @local, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @remote}}}}}}, 0x0) 379.822741ms ago: executing program 2 (id=439): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x891018, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$bind(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x12f451, 0x0) listxattr(0x0, 0x0, 0x0) mount$bind(&(0x7f00000000c0)='.\x00', &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x80700a, 0x0) 353.445801ms ago: executing program 2 (id=442): bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x82000, 0x0, 0xfe, 0x0, &(0x7f0000000000)) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000400), 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) chdir(&(0x7f0000000140)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) 287.48442ms ago: executing program 4 (id=443): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000240)=ANY=[], 0x8) connect$inet6(r1, &(0x7f0000000500)={0xa, 0x1, 0x0, @mcast1, 0x9}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000440), 0x1000a) sendfile(r1, r2, &(0x7f0000000000), 0x1001) 287.284241ms ago: executing program 0 (id=444): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x100) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 278.66976ms ago: executing program 2 (id=445): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2000, &(0x7f0000000780)={&(0x7f0000000380)=ANY=[@ANYBLOB="340000001800dd8d00000000000000000200000000000006000000000600150006000000100016800c0001"], 0x34}}, 0x0) 274.82895ms ago: executing program 0 (id=446): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x100) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="9802"], 0x298) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x80, 0x10) 221.340181ms ago: executing program 32 (id=445): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2000, &(0x7f0000000780)={&(0x7f0000000380)=ANY=[@ANYBLOB="340000001800dd8d00000000000000000200000000000006000000000600150006000000100016800c0001"], 0x34}}, 0x0) 179.82142ms ago: executing program 0 (id=448): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, 0x0, 0x40000) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000) 179.70863ms ago: executing program 4 (id=449): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000001080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x21408, 0x0, 0x3, 0x0, &(0x7f0000006380)) bpf$PROG_LOAD(0x5, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000004c0)='smb3\x00', 0x0, &(0x7f0000000500)='acl') 179.63319ms ago: executing program 4 (id=450): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e24, 0xd, @remote, 0x6}, 0x1c) listen(r0, 0x5) 99.89652ms ago: executing program 3 (id=453): syz_emit_ethernet(0x81, &(0x7f0000000380)={@random="591a1d9a2bdb", @link_local={0x1, 0x80, 0xc2, 0x25}, @val={@void}, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x6f, 0x64, 0x0, 0x0, 0x29, 0x0, @empty=0xe0, @multicast1}, {0x0, 0x10, 0x5b, 0x0, @gue={{0x1, 0x0, 0x3, 0xd, 0x100, @void}, "ff6ee7e33c6951c011c5516326ff5fa98abd5d97bf4061e838b60fc4bb3c8a920cd74e93055bb2431a7f08b36dac6fec16628f6d23b148d6f2fcc9dc6f222aa6f9ed1582d77284a4b4be2753a73445"}}}}}}, 0x0) 99.82987ms ago: executing program 3 (id=454): syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000000, 0x0) 95.09535ms ago: executing program 3 (id=455): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x143fde, 0x80, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f00000000c0)={r2, 0x0, 0x0}, 0x20) 78.51889ms ago: executing program 0 (id=456): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r4, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x40000, 0x0}, 0x0) 31.88248ms ago: executing program 3 (id=457): r0 = syz_io_uring_setup(0x7a30, &(0x7f0000000140), &(0x7f0000ffb000), &(0x7f0000ffb000)) io_uring_register$IORING_REGISTER_BUFFERS2(r0, 0xf, &(0x7f0000001440)={0x1, 0x0, 0x0, &(0x7f00000013c0)=[{0x0}], 0x0}, 0x20) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) 31.693269ms ago: executing program 0 (id=458): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x100) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r1}, 0x10) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}}) 31.590409ms ago: executing program 3 (id=459): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x8, 0x3, 0x450, 0x0, 0x1acc02, 0x148, 0x0, 0x10, 0x3b8, 0x2a8, 0x2a8, 0x3b8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x40000, 0x2f8, 0x320, 0x0, {0x0, 0x5803}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x9, 0x1, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x10, './file0\x00'}}]}, @common=@inet=@SET1={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4b0) 7.32255ms ago: executing program 3 (id=460): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r0, 0x0, 0xc, 0x4058801, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast1}, 0x18) 0s ago: executing program 0 (id=461): r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x3, 0x7fe3, 0x1, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000080), &(0x7f0000000200)}, 0x20) sendfile(r1, r0, 0x0, 0x2) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.142' (ED25519) to the list of known hosts. [ 21.685806][ T23] audit: type=1400 audit(1738241234.530:66): avc: denied { mounton } for pid=342 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.687422][ T342] cgroup1: Unknown subsys name 'net' [ 21.708370][ T23] audit: type=1400 audit(1738241234.530:67): avc: denied { mount } for pid=342 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.713707][ T342] cgroup1: Unknown subsys name 'net_prio' [ 21.741159][ T342] cgroup1: Unknown subsys name 'devices' [ 21.747387][ T23] audit: type=1400 audit(1738241234.590:68): avc: denied { unmount } for pid=342 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.913265][ T342] cgroup1: Unknown subsys name 'hugetlb' [ 21.918957][ T342] cgroup1: Unknown subsys name 'rlimit' [ 22.089220][ T23] audit: type=1400 audit(1738241234.930:69): avc: denied { setattr } for pid=342 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9593 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.112440][ T23] audit: type=1400 audit(1738241234.930:70): avc: denied { mounton } for pid=342 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.132433][ T345] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.137123][ T23] audit: type=1400 audit(1738241234.930:71): avc: denied { mount } for pid=342 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.168327][ T23] audit: type=1400 audit(1738241235.000:72): avc: denied { read } for pid=146 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 22.189863][ T23] audit: type=1400 audit(1738241235.000:73): avc: denied { relabelto } for pid=345 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.215068][ T23] audit: type=1400 audit(1738241235.000:74): avc: denied { write } for pid=345 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.215099][ T342] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.240336][ T23] audit: type=1400 audit(1738241235.010:75): avc: denied { read } for pid=342 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.817411][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.824645][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.832161][ T354] device bridge_slave_0 entered promiscuous mode [ 22.841209][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.848037][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.855728][ T354] device bridge_slave_1 entered promiscuous mode [ 22.917542][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.924576][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.932152][ T353] device bridge_slave_0 entered promiscuous mode [ 22.944289][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.951384][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.958598][ T353] device bridge_slave_1 entered promiscuous mode [ 22.991101][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.997954][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.005454][ T352] device bridge_slave_0 entered promiscuous mode [ 23.015649][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.022549][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.029723][ T352] device bridge_slave_1 entered promiscuous mode [ 23.052819][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.059667][ T355] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.067630][ T355] device bridge_slave_0 entered promiscuous mode [ 23.090103][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.097292][ T355] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.104657][ T355] device bridge_slave_1 entered promiscuous mode [ 23.148236][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.155345][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.162898][ T356] device bridge_slave_0 entered promiscuous mode [ 23.169711][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.176641][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.183950][ T356] device bridge_slave_1 entered promiscuous mode [ 23.326004][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.333142][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.340284][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.347104][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.365044][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.372005][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.379288][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.386078][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.406366][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.413240][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.420348][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.427095][ T356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.436036][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.442890][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.450160][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.456943][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.490336][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.497190][ T355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.504362][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.511206][ T355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.530422][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.537609][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.545228][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.552755][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.559685][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.566643][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.573674][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.580689][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.587610][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.594566][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.601611][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.617027][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.636122][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.644299][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.651164][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.668926][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.677507][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.684361][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.691891][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.699839][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.706691][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.741839][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.749502][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.758063][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.764926][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.772604][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.781413][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.788246][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.795518][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.803306][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.811453][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.818266][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.825532][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.836767][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.844186][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.871225][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.878822][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.887297][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.895778][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.904656][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.913023][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.921219][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.928029][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.935299][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.943570][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.951756][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.959948][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.968179][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.975123][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.982867][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.991178][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.999188][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.006050][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.013495][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.022345][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.030559][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.037377][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.062569][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.071511][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.079332][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.087581][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.098300][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.106881][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.129464][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.137601][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.145460][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.154139][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.162136][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.169961][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.178934][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.186986][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.212374][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.221232][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.229336][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.237692][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.245847][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.254627][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.262814][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.270639][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.301038][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.309423][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.318118][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.326494][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.334401][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.342528][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.350559][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.358472][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.380427][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.388702][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.397288][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.405718][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.414299][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.423167][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.431013][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.438627][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.446890][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.455914][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.464249][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.474775][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.482956][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.505383][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.514014][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.522719][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.531141][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.555874][ T355] request_module fs-gadgetfs succeeded, but still no fs? [ 24.565215][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.574761][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.591918][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.599728][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.635872][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.640041][ T376] EXT4-fs warning (device loop4): ext4_fill_super:3783: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 24.656298][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.671722][ T376] EXT4-fs (loop4): Encoding requested by superblock is unknown [ 24.691387][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.699622][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.708007][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.716033][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.991757][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.008100][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.028450][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.058303][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.111332][ T399] ====================================================== [ 25.111332][ T399] WARNING: the mand mount option is being deprecated and [ 25.111332][ T399] will be removed in v5.15! [ 25.111332][ T399] ====================================================== [ 25.221923][ T404] FAT-fs (loop3): Unrecognized mount option "" or missing value [ 25.315798][ T409] hub 2-0:1.0: USB hub found [ 25.320845][ T409] hub 2-0:1.0: 1 port detected [ 25.481504][ T402] EXT4-fs (loop4): Unrecognized mount option "mb_optimize_scan=0x0000000000000001" or missing value [ 25.543323][ T399] EXT4-fs (loop1): Unsupported blocksize for fs encryption [ 25.664876][ T418] netlink: 24 bytes leftover after parsing attributes in process `syz.1.14'. [ 25.774018][ T424] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (17031!=33349) [ 25.790670][ T424] EXT4-fs (loop4): Unsupported blocksize for fs encryption [ 26.048415][ T424] syz.4.16 uses obsolete (PF_INET,SOCK_PACKET) [ 26.282755][ T477] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 26.326009][ T477] EXT4-fs error (device loop0): ext4_validate_block_bitmap:418: comm syz.0.26: bg 0: block 131: padding at end of block bitmap is not set [ 26.378806][ T477] EXT4-fs error (device loop0) in ext4_free_blocks:5016: Corrupt filesystem [ 26.411914][ T477] EXT4-fs (loop0): 1 truncate cleaned up [ 26.420430][ T477] EXT4-fs (loop0): mounted filesystem without journal. Opts: minixdf,norecovery,init_itable,jqfmt=vfsv1,dioread_lock,jqfmt=vfsold,data=journal,,errors=continue [ 26.444858][ T477] EXT4-fs (loop0): shut down requested (0) [ 26.460689][ T477] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop0 ino=12 [ 26.471804][ T477] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop0 ino=12 [ 26.480878][ T477] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop0 ino=12 [ 26.499774][ T477] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop0 ino=12 [ 26.508599][ T477] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop0 ino=12 [ 26.545174][ T477] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop0 ino=14 [ 26.769513][ T23] kauditd_printk_skb: 61 callbacks suppressed [ 26.769523][ T23] audit: type=1400 audit(1738241239.610:137): avc: denied { read } for pid=505 comm="syz.4.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 26.831247][ T23] audit: type=1400 audit(1738241239.630:138): avc: denied { mounton } for pid=507 comm="syz.2.38" path="/8/file0" dev="tmpfs" ino=13539 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 26.949069][ T517] [ 26.951863][ T517] ********************************************************** [ 26.959047][ T517] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 26.973709][ T519] netlink: 8 bytes leftover after parsing attributes in process `syz.4.42'. [ 27.022972][ T517] ** ** [ 27.033067][ T517] ** trace_printk() being used. Allocating extra memory. ** [ 27.055408][ T23] audit: type=1400 audit(1738241239.900:139): avc: denied { read write } for pid=527 comm="syz.2.45" name="fuse" dev="devtmpfs" ino=9388 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 27.059279][ T517] ** ** [ 27.088031][ T517] ** This means that this is a DEBUG kernel and it is ** [ 27.098955][ T23] audit: type=1400 audit(1738241239.930:140): avc: denied { open } for pid=527 comm="syz.2.45" path="/dev/fuse" dev="devtmpfs" ino=9388 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 27.100827][ T517] ** unsafe for production use. ** [ 27.143331][ T23] audit: type=1400 audit(1738241239.930:141): avc: denied { mounton } for pid=527 comm="syz.2.45" path="/10/file0" dev="tmpfs" ino=13606 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 27.148164][ T517] ** ** [ 27.180572][ T534] device veth0_to_team entered promiscuous mode [ 27.183526][ T517] ** If you see this message and you are not debugging ** [ 27.197500][ T517] ** the kernel, report this immediately to your vendor! ** [ 27.206688][ T537] serio: Serial port ptm0 [ 27.210879][ T23] audit: type=1400 audit(1738241239.940:142): avc: denied { create } for pid=529 comm="syz.4.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 27.210897][ T23] audit: type=1400 audit(1738241240.020:143): avc: denied { write } for pid=533 comm="syz.1.48" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 27.243512][ T517] ** ** [ 27.270871][ T517] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 27.283782][ T517] ********************************************************** [ 27.321492][ T23] audit: type=1400 audit(1738241240.170:144): avc: denied { create } for pid=513 comm="syz.0.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 27.344680][ T517] netlink: 12 bytes leftover after parsing attributes in process `syz.0.40'. [ 27.361273][ T23] audit: type=1400 audit(1738241240.190:145): avc: denied { write } for pid=513 comm="syz.0.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 27.383170][ T23] audit: type=1400 audit(1738241240.190:146): avc: denied { nlmsg_read } for pid=513 comm="syz.0.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 27.618392][ T567] netlink: 24 bytes leftover after parsing attributes in process `syz.0.62'. [ 27.633758][ T567] sch_tbf: burst 88 is lower than device bond_slave_0 mtu (1514) ! [ 27.645638][ T568] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 27.668537][ T568] EXT4-fs (loop4): can't mount with data=, fs mounted w/o journal [ 27.965019][ T583] syz.2.69[583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.965075][ T583] syz.2.69[583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.018298][ T579] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 28.044585][ T585] EXT4-fs error (device loop0): ext4_validate_block_bitmap:418: comm syz.0.70: bg 0: block 131: padding at end of block bitmap is not set [ 28.100489][ T585] EXT4-fs error (device loop0) in ext4_free_blocks:5016: Corrupt filesystem [ 28.100668][ T585] EXT4-fs (loop0): 1 truncate cleaned up [ 28.100679][ T585] EXT4-fs (loop0): mounted filesystem without journal. Opts: minixdf,norecovery,init_itable,jqfmt=vfsv1,dioread_lock,jqfmt=vfsold,data=journal,,errors=continue [ 28.102962][ T585] EXT4-fs (loop0): shut down requested (0) [ 28.110270][ T585] EXT4-fs (loop0): re-mounted. Opts: (null) [ 28.118848][ T579] EXT4-fs (loop1): orphan cleanup on readonly fs [ 28.120476][ T579] EXT4-fs error (device loop1): ext4_validate_block_bitmap:418: comm syz.1.68: bg 0: block 40: padding at end of block bitmap is not set [ 28.120609][ T579] EXT4-fs error (device loop1) in ext4_free_blocks:5016: Corrupt filesystem [ 28.134845][ T579] EXT4-fs (loop1): 1 truncate cleaned up [ 28.134898][ T579] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 28.658556][ T636] capability: warning: `syz.3.90' uses 32-bit capabilities (legacy support in use) [ 28.681531][ T637] input: syz0 as /devices/virtual/input/input4 [ 28.764785][ T649] netlink: 'syz.1.96': attribute type 16 has an invalid length. [ 28.805282][ T649] netlink: 'syz.1.96': attribute type 17 has an invalid length. [ 28.874324][ T660] EXT4-fs (loop3): mounted filesystem without journal. Opts: nodelalloc,grpid,auto_da_alloc,,errors=continue [ 28.874425][ T660] ext4 filesystem being mounted at /12/file1 supports timestamps until (%ptR?) (0x7fffffff) [ 28.886398][ T660] xt_hashlimit: size too large, truncated to 1048576 [ 28.927419][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 28.927798][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 28.928144][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 28.928477][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 28.928834][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 28.929157][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 28.929520][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 28.929904][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 28.968620][ T535] syz.1.48 (535) used greatest stack depth: 21432 bytes left [ 29.067123][ T649] syz.1.96 (649) used greatest stack depth: 20512 bytes left [ 29.121068][ T671] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (17031!=33349) [ 29.133707][ T671] EXT4-fs (loop4): Unsupported blocksize for fs encryption [ 29.150179][ T674] EXT4-fs (loop1): orphan cleanup on readonly fs [ 29.157183][ T674] EXT4-fs warning (device loop1): ext4_enable_quotas:6100: Failed to enable quota tracking (type=2, err=-22, ino=15). Please run e2fsck to fix. [ 29.171726][ T674] EXT4-fs (loop1): Cannot turn on quotas: error -22 [ 29.178365][ T674] EXT4-fs error (device loop1): ext4_ext_check_inode:540: inode #13: comm syz.1.103: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 29.197911][ T674] EXT4-fs error (device loop1): ext4_orphan_get:1242: comm syz.1.103: couldn't read orphan inode 13 (err -117) [ 29.209807][ T674] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 29.398392][ T685] device syzkaller0 entered promiscuous mode [ 29.514108][ T696] syz.3.112[696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.514168][ T696] syz.3.112[696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.625581][ T710] xt_hashlimit: size too large, truncated to 1048576 [ 29.789816][ T728] capability: warning: `syz.0.127' uses deprecated v2 capabilities in a way that may be insecure [ 30.039425][ T747] EXT4-fs (loop3): Unrecognized mount option "mb_optimize_scan=0x0000000000000000" or missing value [ 30.276186][ T768] syz.3.143[768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.276242][ T768] syz.3.143[768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.305301][ T768] netlink: 4 bytes leftover after parsing attributes in process `syz.3.143'. [ 30.309702][ T770] xt_hashlimit: size too large, truncated to 1048576 [ 30.331540][ T768] device bridge_slave_1 left promiscuous mode [ 30.331651][ T768] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.344542][ T768] device bridge_slave_0 left promiscuous mode [ 30.353647][ T768] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.591833][ T789] syz.4.154 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 30.686714][ T795] EXT4-fs (loop3): Unsupported blocksize for fs encryption [ 30.783333][ T753] cgroup: syz.0.132 (753) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 30.874869][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. [ 30.894818][ T753] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 31.002592][ T813] EXT4-fs (loop1): Test dummy encryption mode enabled [ 31.045111][ T813] EXT4-fs (loop1): Ignoring removed orlov option [ 31.059232][ T813] EXT4-fs (loop1): Ignoring removed orlov option [ 31.066556][ T813] EXT4-fs (loop1): Unsupported blocksize for fs encryption [ 31.096356][ T825] EXT4-fs (loop2): Unsupported blocksize for fs encryption [ 31.455613][ T841] EXT4-fs (loop0): Unsupported blocksize for fs encryption [ 32.036001][ T23] kauditd_printk_skb: 26 callbacks suppressed [ 32.036012][ T23] audit: type=1400 audit(1738241244.880:171): avc: denied { create } for pid=874 comm="syz.1.187" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 32.290038][ T902] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. [ 32.328457][ T23] audit: type=1400 audit(1738241245.170:172): avc: denied { execute } for pid=910 comm="syz.2.204" name="file2" dev="tmpfs" ino=16961 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 32.336144][ T911] process 'syz.2.204' launched './file2' with NULL argv: empty string added [ 32.368135][ T23] audit: type=1400 audit(1738241245.210:173): avc: denied { execute_no_trans } for pid=910 comm="syz.2.204" path="/43/file2" dev="tmpfs" ino=16961 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 32.416668][ T920] Zero length message leads to an empty skb [ 32.417871][ T23] audit: type=1400 audit(1738241245.220:174): avc: denied { name_bind } for pid=910 comm="syz.2.204" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 32.476684][ T926] device wireguard0 entered promiscuous mode [ 32.521391][ T23] audit: type=1400 audit(1738241245.370:175): avc: denied { write } for pid=928 comm="syz.2.212" name="rtc0" dev="devtmpfs" ino=9598 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 32.522099][ T929] rtc_cmos 00:00: Alarms can be up to one day in the future [ 32.556573][ T936] overlayfs: invalid origin (79000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000) [ 32.594375][ T941] netlink: 28 bytes leftover after parsing attributes in process `syz.4.218'. [ 32.612882][ T23] audit: type=1400 audit(1738241245.370:176): avc: denied { open } for pid=928 comm="syz.2.212" path="/dev/rtc0" dev="devtmpfs" ino=9598 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 32.643989][ T23] audit: type=1400 audit(1738241245.370:177): avc: denied { ioctl } for pid=928 comm="syz.2.212" path="/dev/rtc0" dev="devtmpfs" ino=9598 ioctlcmd=0x700f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 32.697884][ T23] audit: type=1400 audit(1738241245.540:178): avc: denied { audit_write } for pid=946 comm="syz.4.222" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 32.748129][ T23] audit: type=1107 audit(1738241245.540:179): pid=946 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 32.856548][ T964] overlayfs: missing 'lowerdir' [ 33.107203][ T23] audit: type=1400 audit(1738241245.950:180): avc: denied { mount } for pid=984 comm="syz.3.237" name="/" dev="loop3" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 33.415315][ T1002] device wireguard0 entered promiscuous mode [ 33.461550][ T1009] EXT4-fs (loop1): Ignoring removed orlov option [ 33.468329][ T1009] EXT4-fs (loop1): Unsupported blocksize for fs encryption [ 33.529749][ T1021] syz.1.252[1021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.529806][ T1021] syz.1.252[1021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.651038][ T1034] EXT4-fs (loop1): Unrecognized mount option "mb_optimize_scan=0x0000000000000001" or missing value [ 33.837701][ T1047] xt_hashlimit: size too large, truncated to 1048576 [ 33.889957][ T1053] syz.3.266[1053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.890015][ T1053] syz.3.266[1053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.902884][ T1040] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 33.950911][ T1053] netlink: 4 bytes leftover after parsing attributes in process `syz.3.266'. [ 33.992825][ T1053] device wireguard0 entered promiscuous mode [ 34.000656][ T1040] EXT4-fs error (device loop2): ext4_mb_generate_buddy:748: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 34.023770][ T1040] EXT4-fs (loop2): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1088 with error 28 [ 34.047464][ T1040] EXT4-fs (loop2): This should not happen!! Data will be lost [ 34.047464][ T1040] [ 34.057489][ T1040] EXT4-fs (loop2): Total free blocks count 0 [ 34.063529][ T1040] EXT4-fs (loop2): Free/Dirty block details [ 34.070003][ T1040] EXT4-fs (loop2): free_blocks=2415919104 [ 34.075984][ T1040] EXT4-fs (loop2): dirty_blocks=1088 [ 34.081304][ T1040] EXT4-fs (loop2): Block reservation details [ 34.087164][ T1040] EXT4-fs (loop2): i_reserved_data_blocks=68 [ 34.230926][ T1063] EXT4-fs (loop3): Unsupported blocksize for fs encryption [ 34.325112][ T1068] EXT4-fs (loop2): Unsupported blocksize for fs encryption [ 34.384137][ T1074] device syzkaller0 entered promiscuous mode [ 34.458825][ T1088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=108 sclass=netlink_route_socket pid=1088 comm=syz.2.277 [ 34.537268][ T1092] EXT4-fs (loop4): Unsupported blocksize for fs encryption [ 34.840398][ T13] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 34.871562][ T1116] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 34.889454][ T1110] EXT4-fs (loop1): mounted filesystem without journal. Opts: grpquota,inode_readahead_blks=0x0000000000000800,minixdf,,errors=continue [ 34.913712][ T1110] ext4 filesystem being mounted at /51/bus supports timestamps until (%ptR?) (0x7fffffff) [ 34.984745][ T1119] FAT-fs (loop4): Directory bread(block 64) failed [ 34.998973][ T1119] FAT-fs (loop4): Directory bread(block 65) failed [ 35.006100][ T1119] FAT-fs (loop4): Directory bread(block 66) failed [ 35.013679][ T1119] FAT-fs (loop4): Directory bread(block 67) failed [ 35.020634][ T1119] FAT-fs (loop4): Directory bread(block 68) failed [ 35.027227][ T1119] FAT-fs (loop4): Directory bread(block 69) failed [ 35.058014][ T1119] FAT-fs (loop4): Directory bread(block 70) failed [ 35.074276][ T1119] FAT-fs (loop4): Directory bread(block 71) failed [ 35.082013][ T13] usb 4-1: Using ep0 maxpacket: 16 [ 35.096988][ T1119] FAT-fs (loop4): Directory bread(block 72) failed [ 35.104137][ T1119] FAT-fs (loop4): Directory bread(block 73) failed [ 35.177474][ T1126] 9pnet: p9_fd_create_unix (1126): problem connecting socket: ./file0: -111 [ 35.200462][ T13] usb 4-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 35.224020][ T13] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 35.244313][ T13] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 35.420459][ T13] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 35.436207][ T13] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 35.459848][ T13] usb 4-1: Product: syz [ 35.472547][ T13] usb 4-1: Manufacturer: syz [ 35.486164][ T13] usb 4-1: SerialNumber: syz [ 36.041600][ T1100] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 36.140441][ T13] usb 4-1: 0:2 : does not exist [ 36.166894][ T1161] netlink: 8 bytes leftover after parsing attributes in process `syz.4.303'. [ 36.198918][ T1165] syz.1.307[1165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.198975][ T1165] syz.1.307[1165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.263790][ T1177] netlink: 4 bytes leftover after parsing attributes in process `syz.1.313'. [ 36.320640][ T1185] xt_hashlimit: size too large, truncated to 1048576 [ 36.345337][ T13] usb 4-1: 1:0: cannot get min/max values for control 4 (id 1) [ 36.379501][ T13] usb 4-1: USB disconnect, device number 2 [ 36.749486][ T1231] xt_CT: You must specify a L4 protocol and not use inversions on it [ 36.805061][ T1246] rtc_cmos 00:00: Alarms can be up to one day in the future [ 36.860714][ T1249] EXT4-fs (loop4): Unsupported blocksize for fs encryption [ 36.879741][ T1252] EXT4-fs error (device loop3): ext4_validate_block_bitmap:418: comm syz.3.346: bg 0: block 248: padding at end of block bitmap is not set [ 36.894674][ T1252] EXT4-fs (loop3): 1 truncate cleaned up [ 36.900671][ T1252] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 36.909660][ T1252] ext4 filesystem being mounted at /57/bus supports timestamps until (%ptR?) (0x7fffffff) [ 37.111902][ T1267] fuse: Unknown parameter '0xffffffffffffffff18446744073709551615' [ 37.176703][ T1275] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=1275 comm=syz.3.355 [ 37.195300][ T1270] netlink: 12 bytes leftover after parsing attributes in process `syz.0.353'. [ 37.286930][ T1281] device syzkaller0 entered promiscuous mode [ 37.448303][ T1291] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 37.460203][ T1291] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (29254!=20869) [ 37.470809][ T1291] EXT4-fs (loop2): external journal device major/minor numbers have changed [ 37.479992][ T1291] EXT4-fs (loop2): filesystem has both journal inode and journal device! [ 37.643669][ T1296] EXT4-fs (loop0): mounted filesystem without journal. Opts: nodelalloc,bsdgroups,,errors=continue [ 37.687680][ T23] kauditd_printk_skb: 42 callbacks suppressed [ 37.687691][ T23] audit: type=1400 audit(1738241250.530:221): avc: denied { read } for pid=1295 comm="syz.0.364" name="file1" dev="loop0" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 37.715745][ T23] audit: type=1400 audit(1738241250.530:222): avc: denied { open } for pid=1295 comm="syz.0.364" path="/63/file1/file1" dev="loop0" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 37.741975][ T23] audit: type=1400 audit(1738241250.540:223): avc: denied { ioctl } for pid=1295 comm="syz.0.364" path="/63/file1/file1" dev="loop0" ino=15 ioctlcmd=0x6628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 37.766802][ T23] audit: type=1400 audit(1738241250.540:224): avc: denied { unmount } for pid=353 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 37.869527][ T1320] netlink: 16 bytes leftover after parsing attributes in process `syz.1.374'. [ 37.897766][ T1316] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 37.911704][ T1316] EXT4-fs (loop0): Unsupported blocksize for fs encryption [ 37.954123][ T23] audit: type=1400 audit(1738241250.800:225): avc: denied { mounton } for pid=1332 comm="syz.1.380" path="/85/file0" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 37.954548][ T1333] overlayfs: statfs failed on './file0' [ 37.976858][ T23] audit: type=1400 audit(1738241250.800:226): avc: denied { getattr } for pid=1332 comm="syz.1.380" name="/" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 38.006439][ T23] audit: type=1400 audit(1738241250.850:227): avc: denied { ioctl } for pid=1332 comm="syz.1.380" path="socket:[20552]" dev="sockfs" ino=20552 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.066921][ T1341] xt_hashlimit: size too large, truncated to 1048576 [ 38.215481][ T1357] EXT4-fs (loop0): Unsupported blocksize for fs encryption [ 38.300167][ T1370] fuse: Bad value for 'fd' [ 38.306562][ T23] audit: type=1400 audit(1738241251.150:228): avc: denied { mount } for pid=1369 comm="syz.1.398" name="/" dev="overlay" ino=20665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 38.369432][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. [ 38.387396][ T23] audit: type=1400 audit(1738241251.200:229): avc: denied { rename } for pid=1369 comm="syz.1.398" name="#2" dev="tmpfs" ino=20680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 38.469886][ T1386] netlink: 'syz.3.404': attribute type 2 has an invalid length. [ 38.478311][ T1384] netlink: 16 bytes leftover after parsing attributes in process `syz.4.403'. [ 38.514133][ T1384] syz.4.403[1384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.514192][ T1384] syz.4.403[1384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.614961][ T23] audit: type=1400 audit(1738241251.460:230): avc: denied { mounton } for pid=1391 comm="syz.4.406" path="/91/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 38.649783][ T1397] EXT4-fs (loop3): Ignoring removed oldalloc option [ 38.656348][ T1397] EXT4-fs (loop3): Ignoring removed mblk_io_submit option [ 38.662925][ T1401] netlink: 12 bytes leftover after parsing attributes in process `syz.1.410'. [ 38.672308][ T1397] EXT4-fs (loop3): can't mount with dioread_nolock if block size != PAGE_SIZE [ 38.883104][ T1437] netlink: 16 bytes leftover after parsing attributes in process `syz.1.427'. [ 38.899049][ T1430] EXT4-fs (loop2): can't mount with dioread_nolock if block size != PAGE_SIZE [ 39.102883][ T1453] EXT4-fs (loop4): Ignoring removed nomblk_io_submit option [ 39.136492][ T1453] EXT4-fs (loop4): mounted filesystem without journal. Opts: bsdgroups,max_dir_size_kb=0x00000000000000da,init_itable,nojournal_checksum,nomblk_io_submit,,errors=continue [ 39.215885][ T1468] serio: Serial port ptm0 [ 39.533400][ T1485] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.535778][ T1507] xt_bpf: check failed: parse error [ 39.559504][ T1485] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.572046][ T1485] device bridge_slave_0 entered promiscuous mode [ 39.581771][ T1485] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.588751][ T1485] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.231525][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 122s! [kworker/0:2:108] [ 178.239668][ C0] Modules linked in: [ 178.243395][ C0] CPU: 0 PID: 108 Comm: kworker/0:2 Not tainted 5.4.289-syzkaller-00025-g49530c73f82d #0 [ 178.253030][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 178.262936][ C0] Workqueue: events bpf_prog_free_deferred [ 178.268569][ C0] RIP: 0010:smp_call_function_single+0x235/0x4a0 [ 178.274726][ C0] Code: 0f 85 df 01 00 00 44 8b 74 24 58 44 89 f6 83 e6 01 31 ff e8 3d ab 0a 00 41 83 e6 01 75 0a e8 42 a8 0a 00 e9 f4 00 00 00 f3 90 <42> 0f b6 04 2b 84 c0 75 15 f7 44 24 58 01 00 00 00 0f 84 d6 00 00 [ 178.294732][ C0] RSP: 0018:ffff8881ede0f8e0 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 178.302964][ C0] RAX: ffffffff8159a251 RBX: 1ffff1103dbc1f27 RCX: ffff8881ee816e40 [ 178.310777][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 178.318589][ C0] RBP: ffff8881ede0f9d0 R08: ffffffff8159a223 R09: ffffed103edeb189 [ 178.326488][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff1103dbc1f20 [ 178.334298][ C0] R13: dffffc0000000000 R14: 0000000000000001 R15: 0000000000000000 [ 178.342113][ C0] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 178.350878][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 178.357302][ C0] CR2: 000000110c2e15ac CR3: 00000001ed972000 CR4: 00000000003406b0 [ 178.365118][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 178.372923][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 178.380736][ C0] Call Trace: [ 178.383863][ C0] [ 178.386561][ C0] ? watchdog_timer_fn+0x53d/0x600 [ 178.391504][ C0] ? proc_watchdog_cpumask+0xc0/0xc0 [ 178.396627][ C0] ? __hrtimer_run_queues+0x3e9/0xb90 [ 178.401834][ C0] ? hrtimer_interrupt+0x890/0x890 [ 178.406779][ C0] ? ktime_get+0xf9/0x130 [ 178.410943][ C0] ? ktime_get_update_offsets_now+0x26c/0x280 [ 178.416845][ C0] ? hrtimer_interrupt+0x38a/0x890 [ 178.421797][ C0] ? smp_apic_timer_interrupt+0x110/0x490 [ 178.427349][ C0] ? apic_timer_interrupt+0xf/0x20 [ 178.432304][ C0] [ 178.435078][ C0] ? smp_call_function_single+0x223/0x4a0 [ 178.440631][ C0] ? smp_call_function_single+0x251/0x4a0 [ 178.446190][ C0] ? smp_call_function_single+0x235/0x4a0 [ 178.451739][ C0] ? flush_tlb_all+0x20/0x20 [ 178.456168][ C0] ? generic_smp_call_function_single_interrupt+0x10/0x10 [ 178.463110][ C0] ? check_preemption_disabled+0x9f/0x320 [ 178.468664][ C0] ? flush_tlb_all+0x20/0x20 [ 178.473093][ C0] ? debug_smp_processor_id+0x20/0x20 [ 178.478299][ C0] ? find_next_and_bit+0x156/0x190 [ 178.483246][ C0] ? cpumask_next_and+0x11/0x30 [ 178.487937][ C0] smp_call_function_many+0x6fe/0x9b0 [ 178.493153][ C0] ? remove_vm_area+0x15f/0x1c0 [ 178.497828][ C0] ? flush_tlb_all+0x20/0x20 [ 178.502259][ C0] ? smp_call_function_any+0x190/0x190 [ 178.507553][ C0] ? flush_tlb_all+0x20/0x20 [ 178.511977][ C0] on_each_cpu+0xa5/0x1a0 [ 178.516144][ C0] ? smp_call_function+0x90/0x90 [ 178.520917][ C0] ? purge_fragmented_blocks_allcpus+0x7c9/0x840 [ 178.527083][ C0] __purge_vmap_area_lazy+0xea/0x1610 [ 178.532288][ C0] ? pcpu_free_vm_areas+0xc0/0xc0 [ 178.537153][ C0] ? find_next_bit+0xc3/0x100 [ 178.541665][ C0] _vm_unmap_aliases+0x2dd/0x370 [ 178.546445][ C0] __vunmap+0x5b1/0x890 [ 178.550430][ C0] bpf_jit_free+0x94/0x1f0 [ 178.554704][ C0] process_one_work+0x765/0xd20 [ 178.559374][ C0] worker_thread+0xaef/0x1470 [ 178.563887][ C0] kthread+0x2da/0x360 [ 178.567794][ C0] ? worker_clr_flags+0x170/0x170 [ 178.572651][ C0] ? kthread_blkcg+0xd0/0xd0 [ 178.577075][ C0] ret_from_fork+0x1f/0x30 [ 178.581334][ C0] Sending NMI from CPU 0 to CPUs 1: [ 178.587377][ C0] NMI backtrace for cpu 1 [ 178.587381][ C0] CPU: 1 PID: 1509 Comm: syz.0.461 Not tainted 5.4.289-syzkaller-00025-g49530c73f82d #0 [ 178.587384][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 178.587386][ C0] RIP: 0010:kvm_wait+0xea/0x150 [ 178.587392][ C0] Code: 42 0f b6 04 20 84 c0 75 6b 41 0f b6 45 00 3a 44 24 14 75 26 41 f7 c7 00 02 00 00 75 0f 0f 1f 44 00 00 0f 00 2d 77 67 77 03 f4 0e 0f 1f 44 00 00 0f 00 2d 68 67 77 03 fb f4 4c 89 7c 24 18 ff [ 178.587394][ C0] RSP: 0018:ffff8881e60df200 EFLAGS: 00000046 [ 178.587398][ C0] RAX: 0000000000000003 RBX: 1ffff1103cc1be44 RCX: ffffffff814c1b74 [ 178.587401][ C0] RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8881edb54ba8 [ 178.587403][ C0] RBP: ffff8881e60df2b0 R08: dffffc0000000000 R09: ffffed103db6a976 [ 178.587406][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 178.587408][ C0] R13: ffff8881edb54ba8 R14: ffff8881e60df240 R15: 0000000000000046 [ 178.587411][ C0] FS: 00007fe8f32396c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 178.587414][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 178.587416][ C0] CR2: 0000000020008000 CR3: 00000001e7b10000 CR4: 00000000003406a0 [ 178.587419][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 178.587422][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 178.587423][ C0] Call Trace: [ 178.587425][ C0] [ 178.587427][ C0] ? nmi_cpu_backtrace+0x112/0x130 [ 178.587429][ C0] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 178.587431][ C0] ? nmi_handle+0xad/0x2f0 [ 178.587432][ C0] ? kvm_wait+0xea/0x150 [ 178.587434][ C0] ? do_nmi+0x251/0x610 [ 178.587436][ C0] ? end_repeat_nmi+0x16/0x2c [ 178.587438][ C0] ? __pv_queued_spin_lock_slowpath+0x6d4/0xc70 [ 178.587440][ C0] ? kvm_wait+0xea/0x150 [ 178.587441][ C0] ? kvm_wait+0xea/0x150 [ 178.587443][ C0] ? kvm_wait+0xea/0x150 [ 178.587444][ C0] [ 178.587446][ C0] ? stack_trace_save+0x118/0x1c0 [ 178.587448][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 178.587450][ C0] ? kmalloc_order_trace+0x2a/0x100 [ 178.587452][ C0] ? htab_map_update_elem+0x2db/0x830 [ 178.587454][ C0] ? __se_sys_bpf+0x9296/0xbcb0 [ 178.587456][ C0] ? do_syscall_64+0xca/0x1c0 [ 178.587458][ C0] __pv_queued_spin_lock_slowpath+0x72f/0xc70 [ 178.587460][ C0] ? __pv_queued_spin_unlock_slowpath+0x280/0x280 [ 178.587462][ C0] ? prep_new_page+0x2cf/0x370 [ 178.587464][ C0] _raw_spin_lock_irqsave+0x1a0/0x210 [ 178.587466][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 178.587468][ C0] ? htab_map_hash+0x299/0x6c0 [ 178.587470][ C0] htab_map_delete_elem+0xdb/0x480 [ 178.587472][ C0] bpf_prog_2c29ac5cdc6b1842+0xe24/0x1000 [ 178.587474][ C0] bpf_trace_run4+0x149/0x310 [ 178.587475][ C0] ? bpf_trace_run3+0x2f0/0x2f0 [ 178.587477][ C0] ? __alloc_pages_nodemask+0x840/0x840 [ 178.587479][ C0] ? setup_fault_attr+0x3d0/0x3d0 [ 178.587482][ C0] ? __bpf_trace_mm_page_free_batched+0x60/0x60 [ 178.587484][ C0] __bpf_trace_mm_page_alloc+0xba/0xe0 [ 178.587486][ C0] __alloc_pages_nodemask+0x7a5/0x840 [ 178.587488][ C0] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 178.587490][ C0] kmalloc_order_trace+0x2a/0x100 [ 178.587491][ C0] alloc_htab_elem+0x285/0x760 [ 178.587493][ C0] htab_map_update_elem+0x2db/0x830 [ 178.587495][ C0] ? htab_map_lookup_elem+0x2b0/0x2b0 [ 178.587497][ C0] __se_sys_bpf+0x9296/0xbcb0 [ 178.587499][ C0] ? do_futex+0x19f0/0x19f0 [ 178.587500][ C0] ? __x64_sys_bpf+0x80/0x80 [ 178.587502][ C0] ? do_futex+0x13c1/0x19f0 [ 178.587504][ C0] ? entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 178.587506][ C0] ? futex_exit_release+0x1e0/0x1e0 [ 178.587508][ C0] ? check_preemption_disabled+0x153/0x320 [ 178.587510][ C0] ? debug_smp_processor_id+0x20/0x20 [ 178.587512][ C0] ? __se_sys_futex+0x355/0x470 [ 178.587514][ C0] ? __do_page_fault+0x725/0xbb0 [ 178.587515][ C0] do_syscall_64+0xca/0x1c0 [ 178.587518][ C0] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 178.587519][ C0] RIP: 0033:0x7fe8f4bceda9 [ 178.587526][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.587528][ C0] RSP: 002b:00007fe8f3239038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 178.587532][ C0] RAX: ffffffffffffffda RBX: 00007fe8f4de7fa0 RCX: 00007fe8f4bceda9 [ 178.587535][ C0] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000002 [ 178.587537][ C0] RBP: 00007fe8f4c502a0 R08: 0000000000000000 R09: 0000000000000000 [ 178.587540][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 178.587543][ C0] R13: 0000000000000000 R14: 00007fe8f4de7fa0 R15: 00007ffc5dcff5f8