Warning: Permanently added '10.128.1.126' (ED25519) to the list of known hosts. 2024/04/27 05:13:27 fuzzer started 2024/04/27 05:13:27 dialing manager at 10.128.0.163:30000 [ 23.238793][ T23] audit: type=1400 audit(1714194807.910:66): avc: denied { node_bind } for pid=346 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 23.261354][ T23] audit: type=1400 audit(1714194807.940:67): avc: denied { name_bind } for pid=346 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 23.297482][ T23] audit: type=1400 audit(1714194807.970:68): avc: denied { mounton } for pid=354 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 23.299028][ T354] cgroup1: Unknown subsys name 'net' [ 23.319908][ T23] audit: type=1400 audit(1714194807.970:69): avc: denied { mount } for pid=354 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.325419][ T354] cgroup1: Unknown subsys name 'net_prio' [ 23.347499][ T23] audit: type=1400 audit(1714194808.030:70): avc: denied { read } for pid=144 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 23.352895][ T354] cgroup1: Unknown subsys name 'devices' [ 23.380747][ T23] audit: type=1400 audit(1714194808.060:71): avc: denied { unmount } for pid=354 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.492082][ T354] cgroup1: Unknown subsys name 'hugetlb' [ 23.497768][ T354] cgroup1: Unknown subsys name 'rlimit' [ 23.651940][ T23] audit: type=1400 audit(1714194808.330:72): avc: denied { mounton } for pid=354 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.676677][ T23] audit: type=1400 audit(1714194808.330:73): avc: denied { mount } for pid=354 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.682618][ T356] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.699817][ T23] audit: type=1400 audit(1714194808.330:74): avc: denied { setattr } for pid=354 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9294 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.730960][ T23] audit: type=1400 audit(1714194808.380:75): avc: denied { relabelto } for pid=356 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.775876][ T354] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/04/27 05:13:28 code coverage: enabled 2024/04/27 05:13:28 comparison tracing: enabled 2024/04/27 05:13:28 extra coverage: enabled 2024/04/27 05:13:28 delay kcov mmap: mmap returned an invalid pointer 2024/04/27 05:13:28 setuid sandbox: enabled 2024/04/27 05:13:28 namespace sandbox: enabled 2024/04/27 05:13:28 Android sandbox: enabled 2024/04/27 05:13:28 fault injection: enabled 2024/04/27 05:13:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/04/27 05:13:28 net packet injection: enabled 2024/04/27 05:13:28 net device setup: enabled 2024/04/27 05:13:28 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2024/04/27 05:13:28 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/04/27 05:13:28 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/04/27 05:13:28 USB emulation: enabled 2024/04/27 05:13:28 hci packet injection: /dev/vhci does not exist 2024/04/27 05:13:28 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2024/04/27 05:13:28 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2024/04/27 05:13:28 swap file: enabled 2024/04/27 05:13:28 starting 5 executor processes [ 24.272973][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.279844][ T364] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.287296][ T364] device bridge_slave_0 entered promiscuous mode [ 24.308783][ T364] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.315877][ T364] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.323182][ T364] device bridge_slave_1 entered promiscuous mode [ 24.393310][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.400198][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.407538][ T371] device bridge_slave_0 entered promiscuous mode [ 24.415840][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.422739][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.430160][ T371] device bridge_slave_1 entered promiscuous mode [ 24.479366][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.486243][ T369] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.493791][ T369] device bridge_slave_0 entered promiscuous mode [ 24.524069][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.531071][ T369] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.538477][ T369] device bridge_slave_1 entered promiscuous mode [ 24.575902][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.583138][ T370] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.590569][ T370] device bridge_slave_0 entered promiscuous mode [ 24.600731][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.607555][ T370] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.614967][ T370] device bridge_slave_1 entered promiscuous mode [ 24.644262][ T366] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.651279][ T366] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.658606][ T366] device bridge_slave_0 entered promiscuous mode [ 24.668821][ T366] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.675805][ T366] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.683196][ T366] device bridge_slave_1 entered promiscuous mode [ 24.812745][ T364] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.819594][ T364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.826743][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.833613][ T364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.865469][ T366] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.872544][ T366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.879748][ T366] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.886607][ T366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.912384][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.919217][ T371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.926380][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.933217][ T371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.944144][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.951007][ T369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.958113][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.964914][ T369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.986956][ T18] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.994254][ T18] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.001513][ T18] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.008446][ T18] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.015713][ T18] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.022758][ T18] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.030278][ T18] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.037265][ T18] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.044788][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.052092][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.070197][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.078144][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.084985][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.092696][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.100793][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.107611][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.114880][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.122749][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.159002][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.170097][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.191083][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.199256][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.206116][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.213355][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.221758][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.228572][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.262036][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.270844][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.299958][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.308094][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.314943][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.322554][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.330618][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.337434][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.345490][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.352833][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.361233][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.368060][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.375270][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.383406][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.390424][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.397829][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.405668][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.413380][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.421349][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.429032][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.437380][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.445085][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.452427][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.459775][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.467796][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.475897][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.482722][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.490133][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.509523][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.517731][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.526408][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.533272][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.561151][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.569189][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.577475][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.586135][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.594991][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.603134][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.611370][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.619152][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.627062][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.635052][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.643040][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.651269][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000191bda0000200001000000000280000000000003"], 0x69) close(r0) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) [ 25.659339][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.667253][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.674997][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.682997][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.699512][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='proc\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100, 0x0) getdents(r0, &(0x7f0000002380)=""/129, 0x18) getdents(r0, &(0x7f0000000200)=""/222, 0xde) [ 25.713963][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.720532][ T392] process 'syz-executor.0' launched './file0' with NULL argv: empty string added [ 25.754128][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x74, 0x0, 0x1, 0x409, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @multicast2}}}]}, @CTA_TIMEOUT={0x8}, @CTA_HELP={0x10, 0x5, 0x0, 0x1, {0xa, 0x1, 'H.245\x00'}}]}, 0x74}}, 0x0) [ 25.764651][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.774392][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.784728][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.793202][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.801706][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000240)=@framed={{}, [@printk={@x}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) futimesat(0xffffffffffffffff, 0x0, 0x0) [ 25.810123][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.817919][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.851232][ T401] [ 25.853382][ T401] ********************************************************** [ 25.853588][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.861265][ T401] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 25.870388][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.880793][ T401] ** ** [ 25.883458][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.890435][ T401] ** trace_printk() being used. Allocating extra memory. ** [ 25.898376][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.905926][ T401] ** ** [ 25.913464][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.920850][ T401] ** This means that this is a DEBUG kernel and it is ** [ 25.928848][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.936065][ T401] ** unsafe for production use. ** [ 25.943945][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.951058][ T401] ** ** [ 25.958612][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.965822][ T401] ** If you see this message and you are not debugging ** [ 25.973493][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.980587][ T401] ** the kernel, report this immediately to your vendor! ** [ 25.988550][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.995676][ T401] ** ** [ 26.003495][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.010704][ T401] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 26.018611][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.025732][ T401] ********************************************************** [ 26.053531][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.061934][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.070473][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.078552][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.086775][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.095031][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.103122][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="5c0000001200010200"/56, @ANYRES32=0x0, @ANYBLOB="00000013da2e000000000000000000000d00010000080000d7bcd911e7"], 0x5c}}, 0x0) executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newaddr={0x34, 0x14, 0x509, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x6, 0xf0000000}}, @IFA_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x34}}, 0x0) [ 26.111285][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.120114][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.150790][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready executing program 0: connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x44, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_SSID={0x11, 0x34, @random="5e4a34d1c5134222d7ff2b1743"}, @NL80211_ATTR_MAC_HINT={0xa, 0xc8, @from_mac=@device_b}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16e4}]]}, 0x44}}, 0x0) executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x9c) getsockname$inet6(r2, 0x0, &(0x7f0000000240)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040), 0x6) r1 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r1, 0x0, 0xc8, &(0x7f0000003d40), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) setsockopt$MRT_ADD_VIF(r1, 0x0, 0xca, &(0x7f0000003d80)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_addr=@local, @dev}, 0x10) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000240)) eventfd(0x8) write(r0, &(0x7f00000001c0)="0cefdcb2", 0x4) [ 26.158887][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.167425][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.179139][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000000000000000120000f1850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000340)='module_request\x00', r0}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x6, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r3) executing program 1: unshare(0x40400) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4500, &(0x7f0000000880)={[{@errors_remount}, {@noquota}, {@nouid32}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xfffffffffffffffe}}, {@nomblk_io_submit}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@barrier}, {@delalloc}, {@usrquota}]}, 0x50, 0x4c6, &(0x7f0000000ec0)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x0, 0x6}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2124db5, &(0x7f0000000800)={[], [{@obj_role={'obj_role', 0x3d, 'sched_switch\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_gt}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x35, 0x38, 0x61, 0x32, 0x65, 0x35], 0x2d, [0x33, 0x61, 0x31, 0x61], 0x2d, [0x36, 0x66, 0x37, 0x37], 0x2d, [0x37, 0x5a, 0x38, 0x39], 0x2d, [0x31, 0x32, 0xff, 0x66, 0x39, 0x61, 0x30, 0x31]}}}]}, 0x0, 0x549, &(0x7f00000014c0)="$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") bind$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x1200052, &(0x7f00000003c0), 0x1, 0x793, &(0x7f00000029c0)="$eJzs3c1rXFUbAPDnTpKmb9r3TV4QbF0FBA2UTkyNrYKLigsRLBR0bTtMpqFmkimZSWlCoBYR3AhaXAi66dqPunPrx1b/Bd2ISEvVtFhxISN3PjqTZiadtvloze8Htz3n3jM595l77zln5h7mBrBjjab/ZCL2R8R7ScRwY30SEQO1VH/E0Xq5myvL+XRJolp99bekVubGynI+2l6T2tPI7IuIb96OOJBZW295cWkmVywW5hv58crsmfHy4tLB07O56cJ0Ye7wxOTkoSPPHBncuFj/+H5p79X3X3ry86N/vfXo5Xe/TeJo7G1sa49jo4zGaOM9GUjfwlVe3OjKtlmy3TvAPUkvzb76VR77Yzj6aqne9F4SAHiQnI+IKgCwwyT6fwDYYZrfA9xYWc6nS/X89n4fsdWuvRARu+vxN+9v1rf0N+7Z7a7dBx26kay635FExMgG1D8aER9/+fqn6RKbdB8SoJM3L0TEyZHRZvvfan+SNXMW6nqfkPFUD2VGb8tr/2DrfJWOf55tjf9a11/m1vgnOox/Bjtcu/diNGJXe37t9Z+5sgHVdJWO/54faM1tu9kWf8NIXyP339qYbyA5dbpYSNu2/0XEWAwMpvmJdeoYu/739VUr+lrJ9vHf7xff+CStP/2/VSJzpf+2JncqV8ndb9xN1y5EPNbfKf7k1vFPuox/j/dYx8vPvfNRt21p/Gm8zWV1/Js/q6x6KeKJ6Bx/U7Le/MTD47XTYbx5UnTwxU8fDnWrv/34p0taf/OzwFZIj//Q+vGPJO3zNct3X8d3l4a/7rbtzvF3Pv93Ja/V0s3G41yuUpmfiNiVvLJ2/aHWa5v5Zvk0/rHHO1//653/6WfCkz3G33/118/uPf7NlcY/dVfH/+4Tl2/O9HWrv7fjP1lLjTXW9NL+9bqD9/PeAQAAAAAAAAAAAAAAAAAAAAAAAECvMhGxN5JM9lY6k8lm68/wfiSGMsVSuXLgVGlhbipqz8oeiYFM86cuh9t+D3Wi8Xv4zfyh2/JPR8T/I+KDwf/U8tl8qTi13cEDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQMOeLs//T/0yuN17BwBsmt13LHG9sCU7AgBsmTv3/wDAv43+HwB2Hv0/AOw8+n8A2Hn0/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGyy48eOpUv1z5XlfJqfOru4MFM6e3CqUJ7Jzi7ks/nS/JnsdKk0XSxk86XZtpf+0OnvFUulM5Mxt3BuvFIoV8bLi0snZksLc5UTp2dz04UThYEtiwwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeldeXJrJFYuFeYmHJVEdrh+6B2V/Nj/x88Ef961X5qLTeOMT290yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwc/gkAAP//skMoxA==") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040)=0x18, &(0x7f0000000140)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000940)=ANY=[@ANYRESDEC=r1, @ANYRES8=r0, @ANYRES8=r2], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000a00)=@raw={'raw\x00', 0x4001, 0x3, 0x458, 0x0, 0xb, 0x148, 0x0, 0x148, 0x3f0, 0x240, 0x240, 0x3f0, 0x215, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth0\x00', {}, {}, 0x11}, 0x2e8, 0x2a0, 0x308, 0x0, {0xff0f000000000000}, [@common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x21, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ip={@broadcast, @broadcast, 0x0, 0x0, 'team0\x00', 'netpci0\x00'}, 0xec010000, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4b8) executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000100)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r1, 0x0) sendmmsg$inet6(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4000000) executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x87}, @printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}]}, &(0x7f0000000080)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 4: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000000)={0x24, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00220f0000000bf896e406096592f7"], 0x0}, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000080), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0x4018480c, &(0x7f00000000c0)={0x2, 0xffffffff, 0x0, 0x0, 0x4e496f8}) [ 26.222661][ T408] cgroup: syz-executor.4 (408) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 26.241806][ T408] cgroup: "memory" requires setting use_hierarchy to 1 on the root executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f", 0x1}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1}, 0x0) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00', r3}, 0x10) write$cgroup_int(r0, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000500)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0xffffffffffffffff, 0x0) executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0/file0\x00', 0x0) executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000008000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) rt_sigaction(0x19, &(0x7f0000000000)={0xfffffffffffffffc, 0x44000006, 0x0}, 0x0, 0x8, &(0x7f0000000440)) r1 = memfd_create(&(0x7f00000006c0)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\xf2\xed\x04\x00\x00\x00\xd4N\x12\x9b\x1f\t\xd1Z+\x86T\x16\xf8\x01\x00\x00\x00\x9f+\x8d!\x0fG\xab\xc2\xdc\xa3\xb3\xae8\x9f9?\xefo\xa4k\x01\xb2>\xa1\x9c\x86xm\xe6\x9bZ4\x91\x1a\xdb\xdd\x89\xb9\xc0LF;\xd6\x84\x195\x06\x00\x00\x00~\xf3S\x12\"p^\xc1jP\x8a\xc6[\xbd\xe7q]\xdd\r\x1aZS\x01*\x1b\xfd\xbcMA\xdcq\xa1\x00\xb3\xf9\x91r\x7f\xdc\xf1\xc3G,\xdb\xccS\x15\x95b\x17\xab\xe4?\x96\x95\xa4kP\x99YO\xb8V\xd5p\x90X\xaaf', 0x0) fallocate(r1, 0x0, 0x400000000000000, 0x7) executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000002880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}}, 0x0, 0x0, 0x0) io_setup(0x6, &(0x7f0000002140)=0x0) io_submit(r1, 0x1, &(0x7f0000002340)=[&(0x7f0000002180)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) [ 26.311189][ T421] EXT4-fs (loop1): Ignoring removed nomblk_io_submit option [ 26.376878][ T421] EXT4-fs error (device loop1): ext4_xattr_delete_inode:2930: inode #16: comm syz-executor.1: corrupted xattr block 8 [ 26.390205][ T421] EXT4-fs (loop1): Remounting filesystem read-only [ 26.396838][ T421] EXT4-fs warning (device loop1): ext4_evict_inode:321: xattr delete (err -117) [ 26.406142][ T421] EXT4-fs (loop1): 1 orphan inode deleted executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x9c) getsockname$inet6(r2, 0x0, &(0x7f0000000240)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000001100)='./file0\x00', 0x3000490, &(0x7f0000000100)={[{@lazytime}, {@usrjquota}, {@errors_remount}, {@norecovery}, {@auto_da_alloc}, {@mblk_io_submit}, {@nouid32}, {@barrier_val}, {@grpjquota}, {}]}, 0x45, 0x7b1, &(0x7f00000004c0)="$eJzs3c9rHNcdAPDvrFY/7VYqFFr3JCi0BuNV5ap2C4Wq9FAKNRjaUw+1xWotHK20RrsylhCJTQjkEkhCbsnF5/y8hFzz45BL8n8EGyeRTRxyCAqzP6SVtCvvOtKuHX8+MNZ7M2/2ve+82TfPmtFuAE+tyfSfTMSJiHg5iRivr08iYrCaykbM1so92NzIp0sSW1v/+Sqplrm/uZGPpn1Sx+qZX0fExy9EnMrsr7e8tr44VywWVur5qcrS1any2vrpK0tzC4WFwvLZ6ZmZM+f+dO7s4cX6zefrx++88s/fvzP73fO/evelT5KYjeP1bc1xHJbJmKwfk8H0EO7yj8OurG/ef7aDQk1nQPYoG0OX0o4ZqPfKiRiPgYP6Z7SXLQMAjspzEbHVzkDbLQDAEy2pXf//1u92AAC90vg9wP3NjXxj6e9vJHrr7t8jYqQWf+P+Zm1Ltn7PbqR6H3TsfrLrzkgSEROHUP9kRLzxwf/fSpc4ovuQAK3cuBkRlyYm94//yb5nFrr1h9arF5ozk3s2Gv+gdz5M5z9/bjX/y2zPf6LF/Ge4xXv3UTz8/Z+5fQjVtJXO//7a9Gzbg6b46yYG6rmfVed8g8nlK8VCOrb9PCJOxuBwmp8+oI6T976/125b8/zv61efeTOtP/25UyJzOzu8e5/5ucrcj4m52d2bEb/Jtoo/Hf+Hq/2ftJn/Xuiwjn/95cXX221L40/jbSz74z9aW7ciftey/5PtMsmBzydOVU+HqcZJ0cJ7szHWrv7J7E7/p0taf+P/Ar2Q9v/YwfFPJM3Pa5Y7funtp8U+uzX+UbtCzed/6/hbn/9DyX+r6aH6uutzlcrKdMRQ8u/968/s7NvIN8qn8Z/8bev3f2P8a3H+/y99/UsdHojsnS/ffvT4j1Ya/3xX/d91IkYeLA60q7+z/p/ZtU8n41+nDXzU4wYAAAAAAAAAAAAAAAAAAAAAAAAA3chExPFIMrntdCaTy9W+w/uXMZYplsqVU5dLq8vzUf2u7IkYzDQ+6nK86fNQp+ufh9/In9mT/2NE/CIiXhsereZz+VJxvt/BAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDdsTbf/5/6YnhP4YF+tBAAOBIjLuwA8LRJstl+NwEA6LWRrkqPHlk7AIDe6e76DwD8FLj+A8DT5yHX/71/BgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADdunD+fLpsfbu5kU/z89fWVhdL107PF8qLuaXVfC5fWrmaWyiVFoqFXL601PaFbtR+FEulqzOxvHp9qlIoV6bKa+sXl0qry5WLV5bmFgoXC4M9iwwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOldeW1+cKxYLKxJ9SSx+WuuHx6U9Et0l4kat/x6X9hxeIoZ2RonR/gxOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAE+AHwIAAP//4VQjgA==") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r1, &(0x7f0000000080), 0x208e24b) ioctl$FS_IOC_GETFSMAP(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x2904c, 0x0, 0x10003}) executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000300)={0x0, r1}) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0xfe44, 0x0) [ 26.412619][ T421] EXT4-fs (loop1): mounted filesystem without journal. Opts: errors=remount-ro,noquota,nouid32,auto_da_alloc=0xfffffffffffffffe,nomblk_io_submit,journal_dev=0x0000000000000007,barrier,delalloc,usrquota, [ 26.432940][ T421] ext4 filesystem being mounted at /root/syzkaller-testdir766014879/syzkaller.ZplX9w/0/file1 supports timestamps until 2038 (0x7fffffff) executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$packet(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x5c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="a800000000010904000500000000000002000d00240001801400018008000100e000000108000200ac1e01010c00028005000100000009002400028014000180080001000000010908000200ac1e00010c000280050001000000000044000f800800014000000006080003400000002b080003400000000808000240000000400800014000000000fb0001400000000708000140000044f10800034000000003080007"], 0xa8}}, 0x0) executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0xeb5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) r1 = inotify_init() r2 = socket$nl_generic(0x10, 0x3, 0x10) getdents64(r0, &(0x7f00000002c0)=""/232, 0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000100000000000000060000000014001462726fbb0ae435a04b551416a4b5e93504695b7d64636173f3b8e4e497ca8464544ece41f3e087a2bcc6be742d6c696e6b0000"], 0x30}}, 0x0) inotify_add_watch(r1, &(0x7f0000000040)='./control\x00', 0x5000410) rmdir(&(0x7f0000000100)='./control\x00') getsockname$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000280)={@mcast1, r5}, 0x14) executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmsg$AUDIT_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, 0x3e9, 0x0, 0x70bd27, 0x0, {0x4, 0x1, 0x0, 0x0, 0x7, 0x1001ff, 0xfb, 0x0, 0x0, 0x0, 0x1ff}, ["", "", ""]}, 0x3c}}, 0x20000884) executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000b00)=0x80000001, 0x12) [ 26.534287][ T456] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. executing program 3: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) pwritev2(r0, &(0x7f00000015c0)=[{&(0x7f0000000340)="ec", 0x1}], 0x1, 0xfffff, 0x0, 0x0) open(0x0, 0x0, 0x0) [ 26.599692][ T13] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 26.635246][ T454] EXT4-fs (loop0): Ignoring removed mblk_io_submit option executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x9c) getsockname$inet6(r2, 0x0, &(0x7f0000000240)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7e12ddc5a89047bf00"}) r1 = syz_open_pts(r0, 0x0) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet(0x2, 0x3, 0x4) sendmsg$inet(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000240)=[@ip_retopts={{0x10}}], 0x10}, 0x0) [ 26.662452][ T454] EXT4-fs (loop0): mounted filesystem without journal. Opts: lazytime,usrjquota=,errors=remount-ro,norecovery,auto_da_alloc,mblk_io_submit,nouid32,barrier=0x0000000000000000,grpjquota=,bsddf, [ 26.675501][ T421] syz-executor.1 (421) used greatest stack depth: 22584 bytes left executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000000000008500000072"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mlock(&(0x7f0000fec000/0x14000)=nil, 0x14000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='mm_page_free_batched\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000ac0)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x3810746, &(0x7f00000001c0)={[{@noauto_da_alloc}, {@user_xattr}, {@noinit_itable}, {@stripe={'stripe', 0x3d, 0x4}}, {@nodelalloc}, {@jqfmt_vfsv0}, {@dioread_nolock}, {@bh}, {@nodiscard}]}, 0xff, 0x45c, &(0x7f0000000380)="$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") [ 26.735421][ T454] ------------[ cut here ]------------ [ 26.740699][ T454] kernel BUG at fs/ext4/ext4.h:2984! [ 26.747003][ T454] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 26.752890][ T454] CPU: 1 PID: 454 Comm: syz-executor.0 Not tainted 5.4.268-syzkaller-00003-g2d5d8240a7cb #0 [ 26.762778][ T454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 26.772692][ T454] RIP: 0010:ext4_trim_fs+0x1e69/0x1e80 [ 26.777962][ T454] Code: 80 e1 07 80 c1 03 38 c1 0f 8c 40 e7 ff ff 48 8d bc 24 f0 01 00 00 e8 76 c4 c8 ff e9 2e e7 ff ff e8 bc a8 6f ff e8 87 f0 98 ff <0f> 0b e8 80 f0 98 ff 0f 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f [ 26.797405][ T454] RSP: 0018:ffff8881ec0ef500 EFLAGS: 00010283 [ 26.803305][ T454] RAX: ffffffff81cb5699 RBX: 0000000000000001 RCX: 0000000000040000 [ 26.811112][ T454] RDX: ffffc9000013e000 RSI: 00000000000007bb RDI: 00000000000007bc [ 26.818927][ T454] RBP: ffff8881ec0ef770 R08: ffffffff81cb4014 R09: 0000000000000003 [ 26.826752][ T454] R10: ffffffffffffffff R11: dffffc0000000001 R12: 0000000000000001 [ 26.834560][ T454] R13: dffffc0000000000 R14: ffff8881ec967000 R15: 0000000000148260 [ 26.842364][ T454] FS: 00007f51f95296c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 26.851128][ T454] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.857548][ T454] CR2: 0000001b32421000 CR3: 00000001ed656000 CR4: 00000000003406a0 [ 26.865362][ T454] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.873171][ T454] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 26.880987][ T454] Call Trace: [ 26.884119][ T454] ? __die+0xb4/0x100 [ 26.887929][ T454] ? die+0x26/0x50 [ 26.891486][ T454] ? do_trap+0x1e7/0x340 [ 26.895568][ T454] ? ext4_trim_fs+0x1e69/0x1e80 [ 26.900257][ T454] ? ext4_trim_fs+0x1e69/0x1e80 [ 26.905024][ T454] ? do_invalid_op+0xfb/0x110 [ 26.909540][ T454] ? ext4_trim_fs+0x1e69/0x1e80 [ 26.914239][ T454] ? invalid_op+0x1e/0x30 [ 26.918394][ T454] ? ext4_trim_fs+0x7e4/0x1e80 [ 26.922993][ T454] ? ext4_trim_fs+0x1e69/0x1e80 [ 26.927681][ T454] ? ext4_trim_fs+0x1e69/0x1e80 [ 26.932371][ T454] ? ext4_group_add_blocks+0xde0/0xde0 [ 26.937661][ T454] ? cap_capable+0x1b1/0x250 [ 26.942091][ T454] ext4_ioctl+0x2168/0x3ff0 [ 26.946429][ T454] ? asan.module_dtor+0x20/0x20 [ 26.951127][ T454] ? call_rcu+0x10/0x10 [ 26.955110][ T454] ? slow_avc_audit+0x26c/0x3c0 [ 26.959798][ T454] ? avc_get_hash_stats+0x1a0/0x1a0 [ 26.964829][ T454] ? avc_update_node+0x897/0x960 [ 26.969607][ T454] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 26.975245][ T454] ? avc_denied+0x15c/0x1d0 [ 26.979592][ T454] ? avc_has_extended_perms+0xa4c/0x1120 [ 26.985048][ T454] ? avc_has_extended_perms+0xafc/0x1120 [ 26.990520][ T454] ? avc_flush+0x1f0/0x1f0 [ 26.994777][ T454] ? blkdev_write_iter+0x346/0x3e0 [ 26.999722][ T454] ? do_futex+0x13c1/0x19f0 [ 27.004060][ T454] ? fsnotify_compare_groups+0x83/0x110 [ 27.009439][ T454] ? fsnotify+0x11d9/0x1340 [ 27.013777][ T454] ? asan.module_dtor+0x20/0x20 [ 27.018468][ T454] do_vfs_ioctl+0x742/0x1720 [ 27.022898][ T454] ? ioctl_preallocate+0x250/0x250 [ 27.027841][ T454] ? __fget+0x407/0x490 [ 27.031832][ T454] ? fget_many+0x20/0x20 [ 27.035914][ T454] ? switch_fpu_return+0x1d4/0x410 [ 27.040860][ T454] ? security_file_ioctl+0x7d/0xa0 [ 27.045805][ T454] __x64_sys_ioctl+0xd4/0x110 [ 27.050322][ T454] do_syscall_64+0xca/0x1c0 [ 27.054662][ T454] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 27.060396][ T454] Modules linked in: [ 27.070956][ T454] ---[ end trace 281db4c66aa2b59b ]--- [ 27.076460][ T454] RIP: 0010:ext4_trim_fs+0x1e69/0x1e80 [ 27.083474][ T454] Code: 80 e1 07 80 c1 03 38 c1 0f 8c 40 e7 ff ff 48 8d bc 24 f0 01 00 00 e8 76 c4 c8 ff e9 2e e7 ff ff e8 bc a8 6f ff e8 87 f0 98 ff <0f> 0b e8 80 f0 98 ff 0f 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f [ 27.105983][ T454] RSP: 0018:ffff8881ec0ef500 EFLAGS: 00010283 [ 27.111975][ T454] RAX: ffffffff81cb5699 RBX: 0000000000000001 RCX: 0000000000040000 [ 27.120485][ T454] RDX: ffffc9000013e000 RSI: 00000000000007bb RDI: 00000000000007bc [ 27.121348][ T472] ====================================================== [ 27.121348][ T472] WARNING: the mand mount option is being deprecated and [ 27.121348][ T472] will be removed in v5.15! [ 27.121348][ T472] ====================================================== [ 27.136365][ T454] RBP: ffff8881ec0ef770 R08: ffffffff81cb4014 R09: 0000000000000003 [ 27.163439][ T454] R10: ffffffffffffffff R11: dffffc0000000001 R12: 0000000000000001 [ 27.171932][ T454] R13: dffffc0000000000 R14: ffff8881ec967000 R15: 0000000000148260 [ 27.180379][ T454] FS: 00007f51f95296c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 27.189204][ T454] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 27.195620][ T454] CR2: 000055555600d818 CR3: 00000001ed656000 CR4: 00000000003406b0 [ 27.203622][ T454] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 27.218266][ T472] EXT4-fs (loop2): Ignoring removed bh option [ 27.230634][ T454] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 27.243950][ T472] EXT4-fs (loop2): can't mount with dioread_nolock if block size != PAGE_SIZE [ 27.253217][ T454] Kernel panic - not syncing: Fatal exception [ 27.259345][ T454] Kernel Offset: disabled [ 27.263494][ T454] Rebooting in 86400 seconds..