last executing test programs: 14.604875592s ago: executing program 2 (id=147): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40082, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x3) bind$inet6(0xffffffffffffffff, &(0x7f0000001080)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r5, 0x8, 0x0, 0x3, 0x0, {0xa, 0x0, 0x6, @rand_addr=' \x01\x00', 0x200000}}}, 0x32) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x550b6c) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="80fd02000000", 0x6}], 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) 13.577737483s ago: executing program 2 (id=150): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xb, 0x81}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e85000000070000"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000a00)={'syz1\x00', {0x6ec9, 0x7, 0x5, 0x5}, 0x3e, [0x9, 0xffffffff, 0x8, 0x2, 0x5334, 0x400, 0x80000000, 0x5, 0x8, 0x0, 0x6, 0xf5, 0x9, 0x39, 0x747d5a13, 0x8, 0xfffffb9a, 0xfffffffa, 0x4, 0xfffffffb, 0x4, 0x3, 0x4, 0xf252, 0x4, 0x800, 0x300000, 0x7, 0xe, 0x4623d, 0x0, 0x0, 0x1ff, 0x8000, 0x3ff, 0x3, 0xd, 0x3, 0x400ba55, 0x8da8, 0x2, 0x200, 0x2, 0x400008, 0xe, 0x4, 0x2, 0x0, 0x8, 0x9, 0x1, 0x199f, 0x8, 0x2, 0x7c, 0x1, 0x4, 0x6, 0x1000, 0x5, 0x40, 0x9, 0x7, 0x5], [0x6, 0x1e, 0x3, 0x8000, 0xfffffffe, 0x3, 0x0, 0x5, 0x7, 0xfffffffc, 0x4, 0x7fff, 0x72c, 0x1c32, 0x3, 0x9, 0x10000, 0x400, 0x8001, 0x3, 0x7, 0x297, 0x5, 0x0, 0x981, 0x4, 0x100, 0x3ff, 0x0, 0xfffffffe, 0x0, 0x1000001, 0x10, 0xfffffff9, 0x0, 0x5, 0x1, 0xffffffff, 0x4, 0x8, 0x800, 0xffff, 0x6, 0x96, 0xfffffffd, 0x101, 0x10, 0x2, 0x401, 0xc, 0x3, 0x379, 0x9, 0xe, 0x5, 0x7, 0x7, 0x2, 0x1, 0x1, 0x8, 0x6, 0x200, 0x6], [0x401, 0xc584, 0xffff, 0xcd4, 0x7, 0x20, 0x7, 0x4, 0x8, 0x10, 0x7, 0x9, 0xe8b, 0x4, 0x80000001, 0x8, 0xffffffff, 0x1000, 0x2, 0x13, 0x1, 0xfffffff9, 0xe55, 0x10, 0x80000001, 0x4, 0x4, 0x5, 0x9, 0x2, 0x20000005, 0x80, 0x4, 0x9, 0x47, 0x2, 0x3, 0x4, 0x7, 0x6d7e, 0x3, 0x8, 0x8001, 0xbf23, 0x6, 0x8, 0x95a, 0xffffffff, 0x4, 0x3, 0x6, 0x100fffd, 0x2005, 0x7, 0x4, 0xea, 0x9, 0x5, 0x6, 0xd9, 0x0, 0x7ff, 0x401, 0x5], [0x108e, 0x7fff, 0x3, 0x3, 0x0, 0x2, 0x6, 0x4, 0x50, 0x2, 0x763, 0xb, 0x402, 0x800, 0x2, 0x1000, 0x7f, 0x5, 0x3fa6, 0x4, 0x0, 0x5, 0x1e0, 0x0, 0xe47, 0x3, 0x3, 0x4, 0x200, 0x1000, 0x3b, 0x2, 0x5, 0x800, 0xa80a, 0x65f413f9, 0x4, 0x8, 0x8a8, 0x2, 0x40, 0x7, 0x16a, 0x4, 0x4, 0x10, 0x0, 0x0, 0x7fff, 0x2, 0xfffffff8, 0x9, 0x1, 0x200, 0x7, 0x4edf, 0xfffffffd, 0x7, 0xe, 0x2, 0xa, 0xf, 0x133, 0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r3, 0x5501) readv(r3, 0x0, 0x0) write$input_event(r3, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfe4f) socket(0x400000000010, 0x3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$TCFLSH(r4, 0x400455c8, 0x4) syz_usb_connect(0x2, 0xfffffffffffffe86, 0x0, 0x0) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) 9.364397735s ago: executing program 2 (id=169): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xf0667000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x4, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000040)=0x80000001, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x1e, 0x2200c851, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x850, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x8c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x70) 7.235110577s ago: executing program 1 (id=173): syz_emit_ethernet(0x11e, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000500", 0xe8, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8001, [{0x18, 0xf, "00000000e50053bff4db7fb81947a98ef6c30aef8bffd4310d8c8cfbdfdcf5ad49792ea9afa9553dcd662ba253fb01a9bda9916838f848a6e18c02bf95848d398ec9dba34d082016dcb10b44b93da65d02ba88666428204a908ad971d0047aabc2491e667b9900"/118}, {0x18, 0xa, "a78ce54006598080a8030037004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af1802"}, {0x0, 0x1, "005ff9297d00001392000100"}]}}}}}}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00'}, 0x10) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x181040, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_io_uring_complete(0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000280)={'syztnl0\x00', &(0x7f0000000680)={'tunl0\x00', 0x0, 0x80, 0x80, 0xd, 0x7, {{0xa, 0x4, 0x3, 0xd, 0x28, 0x64, 0x0, 0x0, 0x2f, 0x0, @loopback, @rand_addr=0x64010100, {[@timestamp={0x44, 0x14, 0x93, 0x0, 0x6, [0x3, 0x4, 0x81, 0xfff]}]}}}}}) pipe(&(0x7f0000000400)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x2b, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1940}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10001}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0xd8, &(0x7f0000000300)=""/216, 0x41100, 0xc, '\x00', r5, 0x0, r6, 0x8, &(0x7f0000000700)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x4, 0xd, 0x6, 0x1}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000780)=[{0x3, 0x5, 0x7, 0xb}, {0x1, 0x4, 0xd, 0x7}, {0x1, 0x4, 0x3, 0xb}, {0x2, 0x2, 0x7, 0xb}, {0x0, 0x2, 0x2, 0x9}], 0x10, 0xb97}, 0x94) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 7.081800831s ago: executing program 2 (id=174): r0 = syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="12010064cba300be81065ddf1e815bb100000000404c054b02000000000001090224000100003003090400ed0103000200092107000801220700090581030000810001"], 0x0) writev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000003c0)="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", 0xfe}, {&(0x7f00000001c0)="8ed5f5c2c70f952830967b43c74593b6aefbb9e61f1022b2357465e9e7005400092ab1305ca3368254c94d93f74a970b009bde3a9988be07ec6da8af716cad40878cb6be0466e538682da112d73210c0c4895f1dec56ff6ce3ea81047c3f7c876b7e1e025943522b5a0ddbff2c9bcac5e1d74692b92fe3990bc5c61a0834b258fdcf915954535029a44758f4ec7a8072a9db28a5ce4a51fe61fce5d84d2d1c427f88019fba463dfde203d1a22fa59d613564d9b3e639ccb621a7e6c5265deac8", 0xc0}, {&(0x7f00000004c0)="8b3f3e37b07366b4c2e9039fd7f93375402fcd559495ad90d661c6bf1a34612799958bde6929352b20d1498ee73040b2a3054291d005a6226bd39cc56ec5c382a8b60779f0b0bd782fc4471258ede4edcfedf3bf2eb5f2065413755f820bae843af9a6938f191a2320327e34031b2a7d05fd5aa8ec00138bd3acd3f6fcd7a39b9dbc9fe69d256ec85af5", 0x8a}, {&(0x7f0000000580)="c98d75f33bec07d64445da2a09d50674f6069f591ed0f7afe2750113b3c3f534e87b8e7317d4d14a84bdbadb8eddb4556efe840a95ccdd9b9da39f3d115ae730a176f2bd2d3c899e0a02463721660fd9b13e08decda441663c5353a0661f2f81d6348c646bd9b69a810b171b6f8d1d1ae16049cc7f1c4a5f6abe98b2f14ed1fa19e598ed4b94fe238554c341f44781e87f967c60ef6ee1849e11f25eb95087a074ba6a84b3baa2ae7212f810c245da238a6bb2974acb266babcffdc58a36", 0xbe}, {&(0x7f0000000640)="b81abfd053d531cd5bbfa0e66a132ccf4e8bc14f5de8b42499104252b32cca5b47f812a2ad450d479281e60e85813c902e184dea443e5bc153bbffac21d4aae06042d70a2b4bd1310879cf87e803a093be503c03d115386cbf88a1709c8cb56fafecbe6a41822c24475fe91308c4fe5f99abeb164d562613d250b12626e9b4f04d391e9354d3ca09455310aabf9b6ebd5835f6231374f1ccab141d6a3127d462105bf435cd112550be57cfdfe2a79bfff537e6a8be0410a85c0a43b63a53fff228f303fc63b6562430d8a0e7a3a6cfc9aa3fed409cbea26bdd49afbb74ba2ac4a73c4bab406d428083e93f8cd6920729765924ca", 0xf4}, {&(0x7f0000000740)="b244b528b65fa61087631f98d0168147129195232275ff06947e435afe08044898821da9a486410c60458eba8fa5f17d61b470720911ce602b83e08e9e80166f4372b353309c6cb17c42d21d907c154401e4be8f9b72909a6d6308f8de831bfb8ea9383d169a41f085818e3d30c2ffca2b73139c16cf1f9864f4eae664fdd09c46486791", 0x84}, {&(0x7f0000000000)="df28dc9fa946bf3a57399fa6", 0xc}, {&(0x7f00000002c0)="22c0588ceaf5be79f1f938d2a04954bc7d65fc334c71e32be9b836a6", 0x1c}], 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000efffffff850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='io_uring_submit_sqe\x00', r1}, 0x18) arch_prctl$ARCH_GET_XCOMP_PERM(0x1022, &(0x7f0000000280)) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000100)='./bus\x00', 0x800000, &(0x7f0000000180)=ANY=[@ANYBLOB='utf8=1,iocharset=cp1255,uni_xlate=0,check=strict,utf8=0,uni_xlate=0,utf8=0,codepage=850,check=relaxed,shortname=winnt\x00\x00hortname=lower,shortname=win95,shortname=win95,nonumtail=0,shortname=mixed,uni_xlate=1,allow_utime=00000000000000000000777,\x00'], 0xff, 0x377, &(0x7f0000000600)="$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") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x28) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x80042, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbee6, 0x8031, 0xffffffffffffffff, 0xffffe000) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) read$FUSE(0xffffffffffffffff, 0x0, 0x0) setrlimit(0x8, &(0x7f0000000080)={0xfffffffffffffffd, 0xfffffffffffffffd}) mlockall(0x7) syz_usb_control_io$hid(r0, &(0x7f0000000040)={0x24, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="00220800e0ffc1d1e43b888113868e684eba7a0889cd62389821"], 0x0}, 0x0) 6.719075117s ago: executing program 0 (id=176): syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./bus\x00', 0x342c2e, &(0x7f0000000080), 0x3, 0x445, &(0x7f0000000800)="$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") openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./bus\x00', 0x88000, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) mkdir(&(0x7f0000000280)='.\x00', 0x30) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x200000000000022a, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'sit0\x00'}) socket$nl_generic(0x10, 0x3, 0x10) openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0), 0x80040, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@loopback={0xff00000000000000, 0x777fe6a4b23f}, 0x0, 0x0, 0x0, 0x12, 0x9, 0x24, 0x5}, 0x20) 6.489628482s ago: executing program 1 (id=177): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000abd92de000000000000ea04850000007b00000095"], 0x0, 0x0, 0xfffffffffffffe61, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) sync() unshare(0x20020000) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) fchdir(r1) close(r1) r2 = open(&(0x7f0000000000)='.\x00', 0x800, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000005c40)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x9, 0x1000000, 0x0, {}, [{0x50, 0x1, [@m_bpf={0x4c, 0x1, 0x0, 0x0, {{0x8}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x0, 0x0, 0x7c}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0xf0}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) unlinkat(r2, &(0x7f0000000280)='./file0\x00', 0x200) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/image_size', 0x141a82, 0x0) sendfile(r4, r4, 0x0, 0x4) 5.896142954s ago: executing program 4 (id=179): sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}, 0x1, 0x0, 0x0, 0x2004d808}, 0x0) 5.836863675s ago: executing program 1 (id=180): prlimit64(0x0, 0x1, &(0x7f0000000140)={0x84, 0x8b}, 0x0) syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x18) preadv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600722, 0x19) mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b707000008000000850000006900000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) clock_nanosleep(0x9, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f00000022c0)='./bus\x00', 0x810094, &(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES64=0x0, @ANYRES32=0x0, @ANYRESHEX], 0x6, 0x2de, &(0x7f0000000480)="$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") bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057000000"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) r7 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_access(r7, &(0x7f0000000040)=ANY=[@ANYRES64=r5], 0x66) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) 5.825977315s ago: executing program 0 (id=181): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) readv(0xffffffffffffffff, 0x0, 0x0) (fail_nth: 1) 5.419280603s ago: executing program 0 (id=182): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40082, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)) r1 = socket$pppl2tp(0x18, 0x1, 0x1) mkdirat(0xffffffffffffff9c, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x3) bind$inet6(0xffffffffffffffff, &(0x7f0000001080)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, 0x0, &(0x7f00000000c0)) socket$pppl2tp(0x18, 0x1, 0x1) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r7, 0x8, 0x0, 0x3, 0x0, {0xa, 0x0, 0x6, @rand_addr=' \x01\x00', 0x200000}}}, 0x32) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x550b6c) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="80fd02000000", 0x6}], 0x1, 0x0, 0x0) 5.376642534s ago: executing program 4 (id=183): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="190000000400000004000000"], 0x48) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x3d, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$exfat(&(0x7f0000001500), &(0x7f0000001540)='./file1\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYRES32=r5, @ANYRESDEC, @ANYBLOB="6572726f72733d636f6e74696e75652c00a3a2a4e7417e941910c27d130b55ac2d5f7a61e59ec6d5de07239091924c32eeb367d16409d6d3ec1fb755f9a7989ebc4e96918e268f0b7acebf67c07bc4731250f87d27b5e9e61000e70f0c6a4e2432073d0d3e18f864e9ef64637d14e5485f36e53c821cb5898685c055a367ea51b653eff6581710f6c3824bc667bd24219163c60803099f985567be0d978e301b4f6603628606afadb04eee58f42f1853f2e8598a5e250e0f4c9a", @ANYRESOCT, @ANYRES64=r1, @ANYRES32=0x0, @ANYRES32=r0], 0x1, 0x150e, &(0x7f0000001580)="$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") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r7 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000003b00)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ppoll(&(0x7f0000000200)=[{r7, 0xc}], 0x1, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 4.670475568s ago: executing program 3 (id=184): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x6, 0x4, 0xfff, 0x7, 0x88}, 0xa3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x50) (fail_nth: 1) 4.397166003s ago: executing program 0 (id=185): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080), 0x64, 0x52b, &(0x7f0000000f80)="$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") openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0xffffffb3, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) mount$incfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYRESHEX=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r4, 0x540a, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000240)=0x3) io_uring_setup(0x1de1, &(0x7f0000000000)={0x0, 0x941f, 0x2, 0x0, 0xfff7fffc, 0x0, r3}) r5 = syz_io_uring_setup(0x22d8, &(0x7f0000000300)={0x0, 0xe3de, 0x1000, 0x0, 0x284}, &(0x7f00000000c0), &(0x7f0000000280)) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x20042, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) mprotect(&(0x7f000004f000/0x800000)=nil, 0x800000, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00003, 0x8) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1) 4.07386159s ago: executing program 4 (id=186): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40082, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) mkdirat(0xffffffffffffff9c, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x3) bind$inet6(0xffffffffffffffff, &(0x7f0000001080)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_SNDMTU(r7, 0x112, 0xc, 0x0, &(0x7f00000000c0)) socket$pppl2tp(0x18, 0x1, 0x1) r8 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r8, 0x8, 0x0, 0x3, 0x0, {0xa, 0x0, 0x6, @rand_addr=' \x01\x00', 0x200000}}}, 0x32) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x550b6c) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="80fd02000000", 0x6}], 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) 4.073558319s ago: executing program 3 (id=187): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40082, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)) r1 = socket$pppl2tp(0x18, 0x1, 0x1) mkdirat(0xffffffffffffff9c, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x3) bind$inet6(0xffffffffffffffff, &(0x7f0000001080)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, 0x0, &(0x7f00000000c0)) socket$pppl2tp(0x18, 0x1, 0x1) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r7, 0x8, 0x0, 0x3, 0x0, {0xa, 0x0, 0x6, @rand_addr=' \x01\x00', 0x200000}}}, 0x32) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x550b6c) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="80fd02000000", 0x6}], 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) 4.001796171s ago: executing program 2 (id=188): sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000000) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs={0x0, 0x0, 0x40}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000000000000000000000008000"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="160000000000000004f1ffff0400000000000000", @ANYBLOB="51b2bdda7ea166076784ce2f0782079a9309f554caec6bf221a77f054d0a3ec9d3f12d041e043d18bcb637b89f7e4503916ad8b6d25b65abcfb96d2f3b07ac166d24994b0de81bf47cbe6b999338b00b8282e1784fbedb09fb23cc71d57805507f930cae720c83797bb2766dfb055433162d13823a1d29a63858ec7241bd5e500e08d3f0dcb9ba6ceccf1bb2f2c164286740d595658f4beb583c8b223801668b041ec0d554214ea4c4da42f19b53aa9802bd6f9cc48caab435f3f946e2c24c9be410402100b32452dc77075f226241923389048a9b1a5ddd44828928a21cb997381694b51cab3ea7acf81f66421b486f3a7872cd04af5d9b78", @ANYBLOB="00000000000000000000000000000000000000001a9ab316341b0e3ac651a0da9527df8d38fddaa0bb03a4", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x4, {{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x2, 0x200000000000}, 0x0, 0x0, 0x1}, [@tmpl={0x44, 0x5, [{{@in6=@rand_addr=' \x01\x00', 0x2, 0x2b}, 0xa, @in=@rand_addr=0x64010102, 0x0, 0x4}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) listen(0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) futex(&(0x7f000000cffc)=0x2, 0x5, 0x40000000, 0x0, &(0x7f0000000000), 0x2000000) r5 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000002c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', r6, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7800, 0x7800, 0xfffffffc, 0xdc64}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f00000000c0)={'ip6_vti0\x00', r7, 0x0, 0x0, 0x2, 0x1000, 0x44, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, 0x7, 0x0, 0xfffffffc}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 2.317006464s ago: executing program 4 (id=189): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000040000"], 0x0}, 0x94) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r3}, 0x10) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000}]}}) 2.085663309s ago: executing program 3 (id=190): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000040000"], 0x0}, 0x94) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r3}, 0x10) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000}]}}) (fail_nth: 1) 2.073292429s ago: executing program 1 (id=191): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback={0xff00000000000000, 0x777fe6a4b23f}, 0x0, 0x0, 0x0, 0x12, 0x9, 0x24, 0x5}, 0x20) 2.060149549s ago: executing program 4 (id=192): syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") creat(&(0x7f0000000000)='./bus\x00', 0xd931d3864d39ddd8) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x24403}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @lowpan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2004d808}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) socket(0x10, 0x803, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x7, &(0x7f0000000140)=@framed={{0x18, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x85ffffff}, @exit={0x95, 0x0, 0x7b00}, @call={0x85, 0x0, 0x0, 0x13}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0x92, &(0x7f0000000240)=""/146}, 0x90) write(r5, &(0x7f0000004200)='t', 0x1) sendfile(r5, r4, 0x0, 0x3ffff) sendfile(r5, r4, 0x0, 0x7ffff000) 1.997800811s ago: executing program 3 (id=193): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d40)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000000203010200000000000000000000000009000200000000470200000008000340000000000800010001"], 0x30}, 0x1, 0x0, 0x0, 0x4045}, 0x0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000014c0)=ANY=[@ANYBLOB="2800000002030102000000000000000001000000090002000000047a02"], 0x28}, 0x1, 0x0, 0x0, 0x2000c811}, 0xc010) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000580)='./bus\x00', 0x88e, &(0x7f0000000700)={[{@errors_remount}, {@mblk_io_submit}, {@usrjquota}, {@test_dummy_encryption_v1}, {@test_dummy_encryption_v1}, {@mblk_io_submit}, {@nogrpid}]}, 0x3, 0x45a, &(0x7f0000001100)="$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") 1.997440991s ago: executing program 1 (id=194): syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x123f41, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$vsock_stream(0x28, 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) unshare(0x62040200) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000080000000b"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x48000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$incfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="64656600f0ffff66696e654ae2b8225f752c00"/28]) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="07270c69273c6d69af3707e046864d72bc0788158081a833d3549111c52938756304be3446541ab63d442ea1fbd600f65d65c0a3837b619ea8649475b4707554e9cc69fd5bc48966e4076fb33502cbe9230c6a113b49944805", @ANYBLOB="706552aa94c26adb7d2a51a73b3c2cb3f26705b01b4ed813b37f3b8c3c0adfe60c95c8be8302365865644ffd15710af7c674b6fec7a99ef2a7cda18ddd8be7f9e6808d36635ae29728c6ad843d0f1de1c4422eb0932e9ef3c2c17f92a12dde2a82488dab7d0b8986581bed3cd139ebbc", @ANYRESDEC=r3], 0x0, 0x0, 0x2b, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x800082, &(0x7f0000000680)=ANY=[@ANYBLOB="756d61736b3d30303030303030303030303030303030303030333737372c616c6c6f775f7574696d653d30303030303030332c000000000083ec4c0d6e84de0249d09f31ef580c3d00000000"], 0x1, 0x191, &(0x7f00000002c0)="$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") ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, 0x0) pipe2$9p(&(0x7f00000000c0), 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.848621313s ago: executing program 0 (id=195): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40082, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)) r1 = socket$pppl2tp(0x18, 0x1, 0x1) mkdirat(0xffffffffffffff9c, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x3) bind$inet6(0xffffffffffffffff, &(0x7f0000001080)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, 0x0, &(0x7f00000000c0)) socket$pppl2tp(0x18, 0x1, 0x1) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r7, 0x8, 0x0, 0x3, 0x0, {0xa, 0x0, 0x6, @rand_addr=' \x01\x00', 0x200000}}}, 0x32) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x550b6c) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="80fd02000000", 0x6}], 0x1, 0x0, 0x0) 1.656366547s ago: executing program 3 (id=196): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="190000000400000004000000"], 0x48) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x3d, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$exfat(&(0x7f0000001500), &(0x7f0000001540)='./file1\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYRES32=r5, @ANYRESDEC, @ANYBLOB="6572726f72733d636f6e74696e75652c00a3a2a4e7417e941910c27d130b55ac2d5f7a61e59ec6d5de07239091924c32eeb367d16409d6d3ec1fb755f9a7989ebc4e96918e268f0b7acebf67c07bc4731250f87d27b5e9e61000e70f0c6a4e2432073d0d3e18f864e9ef64637d14e5485f36e53c821cb5898685c055a367ea51b653eff6581710f6c3824bc667bd24219163c60803099f985567be0d978e301b4f6603628606afadb04eee58f42f1853f2e8598a5e250e0f4c9a", @ANYRESOCT, @ANYRES64=r1, @ANYRES32=0x0, @ANYRES32=r0], 0x1, 0x150e, &(0x7f0000001580)="$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") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r7 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000003b00)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ppoll(&(0x7f0000000200)=[{r7, 0xc}], 0x1, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 815.001884ms ago: executing program 0 (id=197): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x44, 0x86}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x3d, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000003b00)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 167.296847ms ago: executing program 1 (id=198): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xb, 0x81}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$uinput_user_dev(r4, &(0x7f0000000a00)={'syz1\x00', {0x6ec9, 0x7, 0x5, 0x5}, 0x3e, [0x9, 0xffffffff, 0x8, 0x2, 0x5334, 0x400, 0x80000000, 0x5, 0x8, 0x0, 0x6, 0xf5, 0x9, 0x39, 0x747d5a13, 0x8, 0xfffffb9a, 0xfffffffa, 0x4, 0xfffffffb, 0x4, 0x3, 0x4, 0xf252, 0x4, 0x800, 0x300000, 0x7, 0xe, 0x4623d, 0x0, 0x0, 0x1ff, 0x8000, 0x3ff, 0x3, 0xd, 0x3, 0x400ba55, 0x8da8, 0x2, 0x200, 0x2, 0x400008, 0xe, 0x4, 0x2, 0x0, 0x8, 0x9, 0x1, 0x199f, 0x8, 0x2, 0x7c, 0x1, 0x4, 0x6, 0x1000, 0x5, 0x40, 0x9, 0x7, 0x5], [0x6, 0x1e, 0x3, 0x8000, 0xfffffffe, 0x3, 0x0, 0x5, 0x7, 0xfffffffc, 0x4, 0x7fff, 0x72c, 0x1c32, 0x3, 0x9, 0x10000, 0x400, 0x8001, 0x3, 0x7, 0x297, 0x5, 0x0, 0x981, 0x4, 0x100, 0x3ff, 0x0, 0xfffffffe, 0x0, 0x1000001, 0x10, 0xfffffff9, 0x0, 0x5, 0x1, 0xffffffff, 0x4, 0x8, 0x800, 0xffff, 0x6, 0x96, 0xfffffffd, 0x101, 0x10, 0x2, 0x401, 0xc, 0x3, 0x379, 0x9, 0xe, 0x5, 0x7, 0x7, 0x2, 0x1, 0x1, 0x8, 0x6, 0x200, 0x6], [0x401, 0xc584, 0xffff, 0xcd4, 0x7, 0x20, 0x7, 0x4, 0x8, 0x10, 0x7, 0x9, 0xe8b, 0x4, 0x80000001, 0x8, 0xffffffff, 0x1000, 0x2, 0x13, 0x1, 0xfffffff9, 0xe55, 0x10, 0x80000001, 0x4, 0x4, 0x5, 0x9, 0x2, 0x20000005, 0x80, 0x4, 0x9, 0x47, 0x2, 0x3, 0x4, 0x7, 0x6d7e, 0x3, 0x8, 0x8001, 0xbf23, 0x6, 0x8, 0x95a, 0xffffffff, 0x4, 0x3, 0x6, 0x100fffd, 0x2005, 0x7, 0x4, 0xea, 0x9, 0x5, 0x6, 0xd9, 0x0, 0x7ff, 0x401, 0x5], [0x108e, 0x7fff, 0x3, 0x3, 0x0, 0x2, 0x6, 0x4, 0x50, 0x2, 0x763, 0xb, 0x402, 0x800, 0x2, 0x1000, 0x7f, 0x5, 0x3fa6, 0x4, 0x0, 0x5, 0x1e0, 0x0, 0xe47, 0x3, 0x3, 0x4, 0x200, 0x1000, 0x3b, 0x2, 0x5, 0x800, 0xa80a, 0x65f413f9, 0x4, 0x8, 0x8a8, 0x2, 0x40, 0x7, 0x16a, 0x4, 0x4, 0x10, 0x0, 0x0, 0x7fff, 0x2, 0xfffffff8, 0x9, 0x1, 0x200, 0x7, 0x4edf, 0xfffffffd, 0x7, 0xe, 0x2, 0xa, 0xf, 0x133, 0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r4, 0x5501) readv(r4, 0x0, 0x0) write$input_event(r4, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfe4f) r5 = socket(0x400000000010, 0x3, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCXONC(r6, 0x540a, 0x0) ioctl$TCFLSH(r6, 0x400455c8, 0x4) syz_usb_connect(0x2, 0xfffffffffffffe86, 0x0, 0x0) ioctl$TIOCVHANGUP(r6, 0x5437, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000400)={'ip_vti0\x00', 0x0, 0x7801, 0x1, 0x1, 0xfffffffd, {{0x6, 0x4, 0x0, 0x2f, 0x18, 0x64, 0x0, 0x4, 0x2b, 0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0x22}, {[@timestamp={0x44, 0x4, 0x89, 0x0, 0x5}]}}}}}) fstat(r7, &(0x7f0000000480)) 166.808087ms ago: executing program 3 (id=199): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40082, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)) r1 = socket$pppl2tp(0x18, 0x1, 0x1) mkdirat(0xffffffffffffff9c, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x3) bind$inet6(0xffffffffffffffff, &(0x7f0000001080)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, 0x0, &(0x7f00000000c0)) socket$pppl2tp(0x18, 0x1, 0x1) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r7, 0x8, 0x0, 0x3, 0x0, {0xa, 0x0, 0x6, @rand_addr=' \x01\x00', 0x200000}}}, 0x32) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000000c0)=0x550b6c) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="80fd02000000", 0x6}], 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) 12.83973ms ago: executing program 2 (id=200): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000300)={[{@minixdf}, {}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@commit={'commit', 0x3d, 0x5}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@nodelalloc}, {@noblock_validity}, {@nomblk_io_submit}]}, 0x1, 0x566, &(0x7f00000015c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x88240, 0x0) socket$nl_route(0x10, 0x3, 0x0) getpriority(0x0, 0xffffffffffffffff) mkdirat(0xffffffffffffff9c, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004050}, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000080), 0x72a, 0x500, 0x0) poll(&(0x7f0000000340)=[{r0, 0x8a}], 0x1, 0xf3) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000000000f7850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r5, &(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) bind$tipc(r5, &(0x7f0000000040)=@name={0x1e, 0x2, 0x3, {{0x42, 0xfffff000}, 0x3}}, 0x10) r6 = socket$tipc(0x1e, 0x2, 0x0) r7 = socket$tipc(0x1e, 0x4, 0x0) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000040)={0x42, 0x83f}, 0x10) bind$tipc(r6, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x42, 0x1}}}, 0x10) 0s ago: executing program 4 (id=201): sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000000) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs={0x0, 0x0, 0x40}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@ringbuf_query]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="51b2bdda7ea166076784ce2f0782079a9309f554caec6bf221a77f054d0a3ec9d3f12d041e043d18bcb637b89f7e4503916ad8b6d25b65abcfb96d2f3b07ac166d24994b0de81bf47cbe6b999338b00b8282e1784fbedb09fb23cc71d57805507f930cae720c83797bb2766dfb055433162d13823a1d29a63858ec7241bd5e500e08d3f0dcb9ba6ceccf1bb2f2c164286740d595658f4beb583c8b223801668b041ec0d554214ea4c4da42f19b53aa9802bd6f9cc48caab435f3f946e2c24c9be410402100b32452dc77075f226241923389048a9b1a5ddd44828928a21cb997381694b51cab3ea7acf81f66421b486f3a7872cd04af5d9b78", @ANYBLOB="00000000000000000000000000000000000000001a9ab316341b0e3ac651a0da9527df8d38fddaa0bb03a4", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x4, {{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x2, 0x200000000000}, 0x0, 0x0, 0x1}, [@tmpl={0x44, 0x5, [{{@in6=@rand_addr=' \x01\x00', 0x2, 0x2b}, 0xa, @in=@rand_addr=0x64010102, 0x0, 0x4}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) listen(0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) futex(&(0x7f000000cffc)=0x2, 0x5, 0x40000000, 0x0, &(0x7f0000000000), 0x2000000) r5 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000002c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', r6, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7800, 0x7800, 0xfffffffc, 0xdc64}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f00000000c0)={'ip6_vti0\x00', r7, 0x0, 0x0, 0x2, 0x1000, 0x44, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, 0x7, 0x0, 0xfffffffc}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.203' (ED25519) to the list of known hosts. [ 22.252871][ T28] audit: type=1400 audit(1758428688.188:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.254298][ T275] cgroup: Unknown subsys name 'net' [ 22.275777][ T28] audit: type=1400 audit(1758428688.188:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.303170][ T28] audit: type=1400 audit(1758428688.218:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.303360][ T275] cgroup: Unknown subsys name 'devices' [ 22.448006][ T275] cgroup: Unknown subsys name 'hugetlb' [ 22.453631][ T275] cgroup: Unknown subsys name 'rlimit' [ 22.559279][ T28] audit: type=1400 audit(1758428688.498:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.582833][ T28] audit: type=1400 audit(1758428688.498:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.608000][ T28] audit: type=1400 audit(1758428688.498:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.619608][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 22.640817][ T28] audit: type=1400 audit(1758428688.588:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.666368][ T28] audit: type=1400 audit(1758428688.588:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.702350][ T28] audit: type=1400 audit(1758428688.638:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.702898][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.728293][ T28] audit: type=1400 audit(1758428688.638:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.666074][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.673229][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.680935][ T287] device bridge_slave_0 entered promiscuous mode [ 24.688201][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.695255][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.702796][ T287] device bridge_slave_1 entered promiscuous mode [ 24.734975][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.742092][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.749554][ T283] device bridge_slave_0 entered promiscuous mode [ 24.757097][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.764164][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.771670][ T283] device bridge_slave_1 entered promiscuous mode [ 24.789314][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.796413][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.803865][ T286] device bridge_slave_0 entered promiscuous mode [ 24.823192][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.830442][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.838001][ T286] device bridge_slave_1 entered promiscuous mode [ 24.910151][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.917274][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.924699][ T284] device bridge_slave_0 entered promiscuous mode [ 24.942634][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.949731][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.957323][ T284] device bridge_slave_1 entered promiscuous mode [ 25.014115][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.021368][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.028877][ T285] device bridge_slave_0 entered promiscuous mode [ 25.050620][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.057783][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.065267][ T285] device bridge_slave_1 entered promiscuous mode [ 25.179212][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.186382][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.193771][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.200831][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.221215][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.228334][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.235636][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.242693][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.282269][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.289723][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.297119][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.304251][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.313760][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.321276][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.346770][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.355088][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.362147][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.369869][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.378312][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.385376][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.413829][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.429015][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.437338][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.444946][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.453455][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.460513][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.468171][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.476688][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.483885][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.510585][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.518292][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.527351][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.534396][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.541910][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.550491][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.557559][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.565006][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.590385][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.598387][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.605945][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.613995][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.622295][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.631032][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.638098][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.645908][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.654091][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.661174][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.668548][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.676776][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.684894][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.707064][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.715503][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.724078][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.732657][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.750942][ T286] device veth0_vlan entered promiscuous mode [ 25.766995][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 25.774564][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.782310][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.790398][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.798763][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.807083][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.814999][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.823587][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.832648][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.839716][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.847312][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.855603][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.863919][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.870982][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.878684][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.887274][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.895570][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.903839][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.912313][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.920128][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.927787][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.936385][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.944373][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.964758][ T284] device veth0_vlan entered promiscuous mode [ 25.975664][ T283] device veth0_vlan entered promiscuous mode [ 25.983790][ T286] device veth1_macvtap entered promiscuous mode [ 25.991342][ T287] device veth0_vlan entered promiscuous mode [ 25.998039][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.006550][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.014079][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.021751][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.030758][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.038829][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.046908][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.054845][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.063263][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.071818][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.079878][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.087961][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.096175][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.104203][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.112580][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.120729][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.128355][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.135895][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.143374][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.160915][ T284] device veth1_macvtap entered promiscuous mode [ 26.169030][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.183995][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.192619][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.203184][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.211586][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.231271][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.239698][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.248210][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.256710][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.265038][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.273780][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.282302][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.290780][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.299238][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.307621][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.319154][ T283] device veth1_macvtap entered promiscuous mode [ 26.329341][ T287] device veth1_macvtap entered promiscuous mode [ 26.339578][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.347535][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.355169][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.363574][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.372165][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.379713][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.391186][ T285] device veth0_vlan entered promiscuous mode [ 26.399885][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 26.412941][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.421461][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.430920][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.439428][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.475155][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.483823][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.492799][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.501543][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.513037][ T285] device veth1_macvtap entered promiscuous mode [ 26.526541][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.536696][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.622425][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.631080][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.140264][ T352] loop1: detected capacity change from 0 to 256 [ 28.147062][ T352] exfat: Unknown parameter 'ÿÿÿÿ18446744073709551615errors' [ 28.154547][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 28.154560][ T28] audit: type=1400 audit(1758428692.788:101): avc: denied { perfmon } for pid=343 comm="syz.0.1" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 28.545743][ C0] sched: RT throttling activated [ 29.127207][ T361] input: syz1 as /devices/virtual/input/input4 [ 29.960758][ T360] loop0: detected capacity change from 0 to 256 [ 29.967488][ T360] exfat: Unknown parameter 'ÿÿÿÿ18446744073709551615errors' [ 30.402277][ T370] input: syz1 as /devices/virtual/input/input5 [ 31.403314][ T376] loop2: detected capacity change from 0 to 1024 [ 31.412654][ T28] audit: type=1400 audit(1758428692.788:102): avc: denied { map_read map_write } for pid=343 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 31.439758][ T376] ======================================================= [ 31.439758][ T376] WARNING: The mand mount option has been deprecated and [ 31.439758][ T376] and is ignored by this kernel. Remove the mand [ 31.439758][ T376] option from the mount to silence this warning. [ 31.439758][ T376] ======================================================= [ 31.479804][ T28] audit: type=1400 audit(1758428692.888:103): avc: denied { prog_load } for pid=343 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 31.498943][ T28] audit: type=1400 audit(1758428694.998:104): avc: denied { read write } for pid=354 comm="syz.4.5" name="uinput" dev="devtmpfs" ino=262 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 31.523891][ T28] audit: type=1400 audit(1758428694.998:105): avc: denied { open } for pid=354 comm="syz.4.5" path="/dev/uinput" dev="devtmpfs" ino=262 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 31.547567][ T28] audit: type=1400 audit(1758428695.058:106): avc: denied { ioctl } for pid=354 comm="syz.4.5" path="/dev/uinput" dev="devtmpfs" ino=262 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 31.574419][ T376] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 31.583169][ T376] ext4 filesystem being mounted at /1/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 31.605494][ T28] audit: type=1400 audit(1758428695.498:107): avc: denied { create } for pid=354 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.645486][ T28] audit: type=1400 audit(1758428697.318:108): avc: denied { watch watch_reads } for pid=375 comm="syz.2.8" path="/1" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 31.695778][ T28] audit: type=1400 audit(1758428697.528:109): avc: denied { mount } for pid=375 comm="syz.2.8" name="/" dev="loop2" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 31.737258][ T28] audit: type=1400 audit(1758428697.568:110): avc: denied { prog_run } for pid=375 comm="syz.2.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 31.758052][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.767016][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.882985][ T386] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 32.107383][ T392] loop1: detected capacity change from 0 to 256 [ 32.116265][ T392] exfat: Unknown parameter 'ÿÿÿÿ18446744073709551615errors' [ 34.048908][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 34.048927][ T28] audit: type=1400 audit(1758428699.508:121): avc: denied { create } for pid=397 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 34.083877][ T28] audit: type=1400 audit(1758428699.538:122): avc: denied { write } for pid=397 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 34.084467][ T385] loop4: detected capacity change from 0 to 512 [ 34.107472][ T28] audit: type=1400 audit(1758428699.538:123): avc: denied { nlmsg_write } for pid=397 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 34.554308][ T385] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 35.302381][ T385] EXT4-fs warning (device loop4): ext4_multi_mount_protect:404: Unable to create kmmpd thread for loop4. [ 35.541141][ T28] audit: type=1400 audit(1758428701.338:124): avc: denied { setopt } for pid=407 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 35.655950][ T342] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 35.666903][ T28] audit: type=1400 audit(1758428701.348:125): avc: denied { write } for pid=407 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 35.795025][ T286] EXT4-fs (loop2): unmounting filesystem. [ 36.850489][ T28] audit: type=1400 audit(1758428702.788:126): avc: denied { read write } for pid=420 comm="syz.2.18" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.941677][ T423] loop0: detected capacity change from 0 to 256 [ 36.950245][ T423] exfat: Unknown parameter '' [ 37.306892][ T28] audit: type=1400 audit(1758428702.818:127): avc: denied { open } for pid=420 comm="syz.2.18" path="/dev/ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 37.359201][ T28] audit: type=1400 audit(1758428702.818:128): avc: denied { ioctl } for pid=420 comm="syz.2.18" path="/dev/ppp" dev="devtmpfs" ino=158 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 37.544935][ T28] audit: type=1400 audit(1758428702.818:129): avc: denied { create } for pid=420 comm="syz.2.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 37.566056][ T28] audit: type=1400 audit(1758428702.998:130): avc: denied { create } for pid=420 comm="syz.2.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 38.307618][ T432] loop3: detected capacity change from 0 to 256 [ 38.314234][ T432] exfat: Unknown parameter 'ÿÿÿÿ18446744073709551615errors' [ 41.930850][ T336] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 42.055688][ T436] loop2: detected capacity change from 0 to 2048 [ 42.096536][ T436] loop2: p1 < > p3 [ 42.852455][ T436] loop2: p3 size 134217728 extends beyond EOD, truncated [ 42.880346][ T103] loop2: p1 < > p3 [ 42.884711][ T103] loop2: p3 size 134217728 extends beyond EOD, truncated [ 42.995113][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 42.995128][ T28] audit: type=1400 audit(1758428708.928:135): avc: denied { write } for pid=435 comm="syz.2.23" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 43.188918][ T453] loop4: detected capacity change from 0 to 256 [ 43.199557][ T453] exfat: Unknown parameter '' [ 44.107729][ T443] loop2: detected capacity change from 0 to 8192 [ 44.688921][ T463] input: syz1 as /devices/virtual/input/input7 [ 44.796695][ T45] Bluetooth: hci0: sending frame failed (-49) [ 44.803007][ T365] Bluetooth: hci0: Opcode 0x1003 failed: -49 [ 44.892718][ T472] loop3: detected capacity change from 0 to 256 [ 44.899440][ T472] exfat: Unknown parameter 'ÿÿÿÿ18446744073709551615errors' [ 45.640790][ T475] loop2: detected capacity change from 0 to 256 [ 45.648315][ T475] exfat: Unknown parameter '' [ 48.884425][ T339] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 48.900478][ T336] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 48.957908][ T480] loop4: detected capacity change from 0 to 2048 [ 49.312588][ T480] loop4: p1 < > p3 [ 49.397954][ T480] loop4: p3 size 134217728 extends beyond EOD, truncated [ 50.180223][ T493] loop1: detected capacity change from 0 to 2048 [ 50.267067][ T493] loop1: p1 < > p3 [ 50.271946][ T493] loop1: p3 size 134217728 extends beyond EOD, truncated [ 50.314369][ T103] loop1: p1 < > p3 [ 50.319726][ T103] loop1: p3 size 134217728 extends beyond EOD, truncated [ 50.356817][ T491] kvm: emulating exchange as write [ 50.421898][ T510] loop0: detected capacity change from 0 to 2048 [ 50.450844][ T510] loop0: p1 < > p3 [ 50.457110][ T510] loop0: p3 size 134217728 extends beyond EOD, truncated [ 50.566020][ T512] input: syz1 as /devices/virtual/input/input8 [ 50.673992][ T338] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 50.843607][ T490] loop4: detected capacity change from 0 to 8192 [ 50.866690][ T493] loop1: detected capacity change from 0 to 8192 [ 50.991224][ T514] loop0: detected capacity change from 0 to 8192 [ 51.027977][ T338] usb 3-1: Using ep0 maxpacket: 16 [ 51.090127][ T336] I/O error, dev loop0, sector 8064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 51.101962][ T338] usb 3-1: New USB device found, idVendor=09e8, idProduct=0062, bcdDevice=80.f2 [ 51.114487][ T338] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 51.127252][ T338] usb 3-1: Product: syz [ 51.131533][ T338] usb 3-1: Manufacturer: syz [ 51.159973][ T338] usb 3-1: SerialNumber: syz [ 51.257218][ T521] input: syz1 as /devices/virtual/input/input9 [ 51.454522][ T524] loop4: detected capacity change from 0 to 256 [ 51.461128][ T524] exfat: Unknown parameter '' [ 51.675138][ T338] usb 3-1: config 0 descriptor?? [ 51.901032][ T529] loop3: detected capacity change from 0 to 2048 [ 52.067912][ T529] loop3: p1 < > p3 [ 52.073731][ T338] snd-usb-audio: probe of 3-1:0.0 failed with error -2 [ 52.082266][ T529] loop3: p3 size 134217728 extends beyond EOD, truncated [ 52.112261][ T336] udevd[336]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 52.810446][ T537] loop4: detected capacity change from 0 to 2048 [ 53.108812][ T539] loop3: detected capacity change from 0 to 8192 [ 53.169656][ T537] loop4: p1 < > p3 [ 53.180522][ T537] loop4: p3 size 134217728 extends beyond EOD, truncated [ 53.302484][ T525] usb 3-1: USB disconnect, device number 3 [ 53.398227][ T551] loop1: detected capacity change from 0 to 256 [ 53.406419][ T551] exfat: Unknown parameter '' [ 53.791688][ T555] input: syz1 as /devices/virtual/input/input10 [ 54.150140][ T365] Bluetooth: hci0: sending frame failed (-49) [ 54.157505][ T465] Bluetooth: hci0: Opcode 0x1003 failed: -49 [ 54.748024][ T28] audit: type=1326 audit(1758428720.618:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=564 comm="syz.4.51" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff038b8ec29 code=0x7ffc0000 [ 54.778524][ T28] audit: type=1326 audit(1758428720.618:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=564 comm="syz.4.51" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff038b8ec29 code=0x7ffc0000 [ 54.802107][ T28] audit: type=1326 audit(1758428720.618:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=564 comm="syz.4.51" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff038b8ec29 code=0x7ffc0000 [ 54.826356][ T28] audit: type=1326 audit(1758428720.618:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=564 comm="syz.4.51" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff038b8ec29 code=0x7ffc0000 [ 54.850009][ T566] netlink: 352 bytes leftover after parsing attributes in process `syz.4.51'. [ 54.860669][ T28] audit: type=1326 audit(1758428720.618:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=564 comm="syz.4.51" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff038b8ec29 code=0x7ffc0000 [ 54.884392][ T28] audit: type=1326 audit(1758428720.618:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=564 comm="syz.4.51" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff038b8ec29 code=0x7ffc0000 [ 54.907839][ T28] audit: type=1326 audit(1758428720.618:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=564 comm="syz.4.51" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff038b8ec29 code=0x7ffc0000 [ 54.931277][ T28] audit: type=1326 audit(1758428720.618:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=564 comm="syz.4.51" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7ff038b8ec29 code=0x7ffc0000 [ 54.958590][ T28] audit: type=1326 audit(1758428720.618:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=564 comm="syz.4.51" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff038b8ec29 code=0x7ffc0000 [ 54.983879][ T28] audit: type=1326 audit(1758428720.618:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=564 comm="syz.4.51" exe="/root/syz-executor" sig=0 arch=c000003e syscall=328 compat=0 ip=0x7ff038b8ec29 code=0x7ffc0000 [ 54.986963][ T574] loop2: detected capacity change from 0 to 2048 [ 55.571885][ T576] input: syz1 as /devices/virtual/input/input11 [ 55.793372][ T574] loop2: p1 < > p3 [ 55.803221][ T574] loop2: p3 size 134217728 extends beyond EOD, truncated [ 56.183128][ T583] input: syz1 as /devices/virtual/input/input12 [ 56.565946][ T570] loop2: detected capacity change from 0 to 8192 [ 56.638142][ T336] I/O error, dev loop2, sector 8064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 57.021007][ T597] loop2: detected capacity change from 0 to 2048 [ 57.056331][ T597] loop2: p1 < > p3 [ 57.060833][ T597] loop2: p3 size 134217728 extends beyond EOD, truncated [ 57.069680][ T599] input: syz1 as /devices/virtual/input/input13 [ 57.231018][ T601] loop2: detected capacity change from 0 to 8192 [ 57.286482][ T336] I/O error, dev loop2, sector 8064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 57.499982][ T605] loop3: detected capacity change from 0 to 2048 [ 57.517726][ T605] loop3: p1 < > p3 [ 57.524481][ T605] loop3: p3 size 134217728 extends beyond EOD, truncated [ 57.706030][ T465] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 57.706084][ T600] Bluetooth: hci0: command 0x1003 tx timeout [ 57.900278][ T609] loop3: detected capacity change from 0 to 8192 [ 58.361663][ T612] loop3: detected capacity change from 0 to 2048 [ 58.407084][ T612] loop3: p1 < > p3 [ 58.412057][ T612] loop3: p3 size 134217728 extends beyond EOD, truncated [ 58.851877][ T336] udevd[336]: inotify_add_watch(7, /dev/loop3p1, 10) failed: No such file or directory [ 58.864279][ T460] udevd[460]: inotify_add_watch(7, /dev/loop3p3, 10) failed: No such file or directory [ 60.008405][ T365] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 60.113411][ T634] loop1: detected capacity change from 0 to 256 [ 60.120107][ T634] exfat: Unknown parameter '' [ 60.623364][ T336] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 60.699773][ T630] loop2: detected capacity change from 0 to 2048 [ 61.161178][ T630] loop2: p1 < > p3 [ 61.169764][ T630] loop2: p3 size 134217728 extends beyond EOD, truncated [ 62.007736][ T610] Bluetooth: hci0: sending frame failed (-49) [ 62.013881][ T365] Bluetooth: hci0: Opcode 0x1003 failed: -49 [ 62.029405][ T649] loop3: detected capacity change from 0 to 2048 [ 62.117559][ T649] loop3: p1 < > p3 [ 62.122042][ T649] loop3: p3 size 134217728 extends beyond EOD, truncated [ 62.474048][ T639] loop0: detected capacity change from 0 to 512 [ 62.560748][ T639] EXT4-fs (loop0): 1 orphan inode deleted [ 62.568734][ T639] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 62.580501][ T393] __quota_error: 36 callbacks suppressed [ 62.580523][ T393] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 62.581315][ T637] loop2: detected capacity change from 0 to 8192 [ 62.595546][ T393] EXT4-fs error (device loop0): ext4_release_dquot:6837: comm kworker/u4:6: Failed to release dquot type 1 [ 62.622993][ T639] ext4 filesystem being mounted at /10/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 62.787743][ T649] loop3: detected capacity change from 0 to 8192 [ 62.836169][ T336] I/O error, dev loop3, sector 8064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 63.003183][ T658] loop2: detected capacity change from 0 to 40427 [ 63.023501][ T658] F2FS-fs (loop2): invalid crc value [ 63.153476][ T658] F2FS-fs (loop2): Found nat_bits in checkpoint [ 64.691814][ T658] F2FS-fs (loop2): Start checkpoint disabled! [ 64.775916][ T658] F2FS-fs (loop2): Mounted with checkpoint version = 48b305e6 [ 64.835205][ T284] EXT4-fs (loop0): unmounting filesystem. [ 64.875098][ T672] loop1: detected capacity change from 0 to 8192 [ 64.881619][ T28] audit: type=1400 audit(1758428730.818:182): avc: denied { write } for pid=657 comm="syz.2.72" name="/" dev="loop2" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 65.235426][ T684] loop3: detected capacity change from 0 to 256 [ 65.248071][ T684] exfat: Unknown parameter '' [ 66.647764][ T686] loop0: detected capacity change from 0 to 256 [ 66.660232][ T686] exfat: Unknown parameter '' [ 68.316021][ T350] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 68.840170][ T28] audit: type=1400 audit(1758428730.818:183): avc: denied { add_name } for pid=657 comm="syz.2.72" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 68.862576][ T28] audit: type=1400 audit(1758428730.818:184): avc: denied { create } for pid=657 comm="syz.2.72" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 68.882658][ T28] audit: type=1400 audit(1758428730.818:185): avc: denied { write open } for pid=657 comm="syz.2.72" path="/12/file0/file1" dev="loop2" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 68.905549][ T28] audit: type=1400 audit(1758428730.818:186): avc: denied { ioctl } for pid=657 comm="syz.2.72" path="/12/file0/file1" dev="loop2" ino=10 ioctlcmd=0xf502 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 68.929381][ T688] kworker/u4:7: attempt to access beyond end of device [ 68.929381][ T688] loop2: rw=2049, sector=40960, nr_sectors = 16 limit=40427 [ 69.502187][ T707] loop4: detected capacity change from 0 to 256 [ 69.515400][ T707] exfat: Unknown parameter '' [ 70.877520][ T709] loop2: detected capacity change from 0 to 256 [ 70.890957][ T709] exfat: Unknown parameter '' [ 72.363954][ T412] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 72.433192][ T712] loop1: detected capacity change from 0 to 2048 [ 72.534324][ T715] loop3: detected capacity change from 0 to 2048 [ 72.755908][ T336] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 72.782033][ T715] loop3: p1 < > p3 [ 72.794520][ T715] loop3: p3 size 134217728 extends beyond EOD, truncated [ 72.802019][ T712] loop1: p1 < > p3 [ 72.807186][ T712] loop1: p3 size 134217728 extends beyond EOD, truncated [ 72.946130][ T103] loop1: p1 < > p3 [ 72.954457][ T103] loop1: p3 size 134217728 extends beyond EOD, truncated [ 74.272184][ T733] loop0: detected capacity change from 0 to 256 [ 74.279285][ T733] exfat: Unknown parameter 'ÿÿÿÿ18446744073709551615errors' [ 75.746969][ T339] udevd[339]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 75.758078][ T336] udevd[336]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 76.053422][ T744] loop2: detected capacity change from 0 to 256 [ 76.060058][ T744] exfat: Unknown parameter '' [ 76.065510][ T350] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 76.345823][ T350] usb 5-1: Using ep0 maxpacket: 16 [ 76.355247][ T350] usb 5-1: New USB device found, idVendor=09e8, idProduct=0062, bcdDevice=80.f2 [ 76.366105][ T350] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 76.374264][ T350] usb 5-1: Product: syz [ 76.379785][ T350] usb 5-1: Manufacturer: syz [ 76.410269][ T350] usb 5-1: SerialNumber: syz [ 76.448347][ T350] usb 5-1: config 0 descriptor?? [ 76.493063][ T350] snd-usb-audio: probe of 5-1:0.0 failed with error -2 [ 76.514191][ T336] udevd[336]: error opening ATTR{/sys/devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 77.015764][ T412] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 77.182600][ T28] audit: type=1400 audit(1758428743.118:187): avc: denied { create } for pid=752 comm="syz.3.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 77.202587][ T28] audit: type=1400 audit(1758428743.118:188): avc: denied { bind } for pid=752 comm="syz.3.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 77.226241][ T412] usb 1-1: Using ep0 maxpacket: 16 [ 77.235531][ T412] usb 1-1: New USB device found, idVendor=09e8, idProduct=0062, bcdDevice=80.f2 [ 77.251146][ T412] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 77.293991][ T412] usb 1-1: Product: syz [ 77.300989][ T412] usb 1-1: Manufacturer: syz [ 77.311984][ T412] usb 1-1: SerialNumber: syz [ 77.364756][ T412] usb 1-1: config 0 descriptor?? [ 77.447392][ T412] snd-usb-audio: probe of 1-1:0.0 failed with error -2 [ 77.495075][ T336] udevd[336]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 77.510848][ T28] audit: type=1400 audit(1758428743.118:189): avc: denied { write } for pid=752 comm="syz.3.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 77.535796][ T528] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 77.670854][ T759] loop1: detected capacity change from 0 to 2048 [ 77.716233][ T759] loop1: p1 < > p3 [ 77.717001][ T528] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 77.721464][ T759] loop1: p3 size 134217728 extends beyond EOD, [ 77.730302][ T528] usb 4-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 18 [ 77.730531][ T759] truncated [ 77.737552][ T528] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 77.763705][ T528] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 77.773827][ T528] usb 4-1: SerialNumber: syz [ 77.796878][ T528] cdc_mbim 4-1:1.0: MBIM functional descriptor missing [ 77.805939][ T528] cdc_mbim 4-1:1.0: bind() failure [ 77.863078][ T759] loop1: detected capacity change from 0 to 8192 [ 77.917705][ T336] I/O error, dev loop1, sector 8064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 77.993762][ T763] loop1: detected capacity change from 0 to 512 [ 78.018128][ T28] audit: type=1400 audit(1758428743.948:190): avc: denied { remount } for pid=762 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 78.039146][ T341] usb 4-1: USB disconnect, device number 2 [ 78.066447][ T28] audit: type=1400 audit(1758428743.988:191): avc: denied { ioctl } for pid=752 comm="syz.3.96" path="socket:[18707]" dev="sockfs" ino=18707 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 78.184425][ T766] loop2: detected capacity change from 0 to 256 [ 78.198041][ T766] exfat: Unknown parameter '' [ 79.306508][ T28] audit: type=1400 audit(1758428744.228:192): avc: denied { write } for pid=762 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.465013][ T39] usb 5-1: USB disconnect, device number 3 [ 79.509383][ T769] loop1: detected capacity change from 0 to 2048 [ 79.566683][ T769] loop1: p1 < > p3 [ 79.571668][ T769] loop1: p3 size 134217728 extends beyond EOD, truncated [ 79.815178][ T636] usb 1-1: USB disconnect, device number 4 [ 79.845892][ T777] loop1: detected capacity change from 0 to 8192 [ 80.287074][ T28] audit: type=1400 audit(1758428746.228:193): avc: denied { create } for pid=790 comm="syz.1.107" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 80.310830][ T28] audit: type=1400 audit(1758428746.258:194): avc: denied { map } for pid=790 comm="syz.1.107" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 80.335033][ T28] audit: type=1400 audit(1758428746.258:195): avc: denied { read write } for pid=790 comm="syz.1.107" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 80.337016][ T792] input: syz1 as /devices/virtual/input/input15 [ 80.359962][ T28] audit: type=1400 audit(1758428746.258:196): avc: denied { ioctl } for pid=790 comm="syz.1.107" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17878 ioctlcmd=0xf509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 80.475379][ T341] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 80.872331][ T636] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 80.905843][ T341] usb 4-1: Using ep0 maxpacket: 16 [ 80.913776][ T341] usb 4-1: New USB device found, idVendor=09e8, idProduct=0062, bcdDevice=80.f2 [ 80.922937][ T341] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 80.931019][ T341] usb 4-1: Product: syz [ 81.148665][ T341] usb 4-1: Manufacturer: syz [ 81.153359][ T341] usb 4-1: SerialNumber: syz [ 81.174558][ T341] usb 4-1: config 0 descriptor?? [ 81.182050][ T341] snd-usb-audio: probe of 4-1:0.0 failed with error -2 [ 81.194927][ T336] udevd[336]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 81.260631][ T636] usb 1-1: Using ep0 maxpacket: 32 [ 81.368051][ T804] loop1: detected capacity change from 0 to 512 [ 81.377452][ T804] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 81.386823][ T804] EXT4-fs (loop1): unmounting filesystem. [ 81.564463][ T810] loop1: detected capacity change from 0 to 2048 [ 81.628010][ T810] loop1: p1 < > p3 [ 81.734092][ T810] loop1: p3 size 134217728 extends beyond EOD, truncated [ 81.788837][ T813] FAULT_INJECTION: forcing a failure. [ 81.788837][ T813] name failslab, interval 1, probability 0, space 0, times 1 [ 81.803183][ T813] CPU: 1 PID: 813 Comm: syz.2.112 Not tainted syzkaller #0 [ 81.810423][ T813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 81.820617][ T813] Call Trace: [ 81.823914][ T813] [ 81.826852][ T813] __dump_stack+0x21/0x24 [ 81.831201][ T813] dump_stack_lvl+0xee/0x150 [ 81.836582][ T813] ? __cfi_dump_stack_lvl+0x8/0x8 [ 81.841651][ T813] ? __kasan_check_write+0x14/0x20 [ 81.846768][ T813] ? _raw_spin_lock+0x8e/0xe0 [ 81.851454][ T813] ? __cfi__raw_spin_lock+0x10/0x10 [ 81.856657][ T813] dump_stack+0x15/0x24 [ 81.860844][ T813] should_fail_ex+0x3d4/0x520 [ 81.865534][ T813] ? __alloc_file+0x28/0x2a0 [ 81.870128][ T813] __should_failslab+0xac/0xf0 [ 81.874899][ T813] should_failslab+0x9/0x20 [ 81.879410][ T813] kmem_cache_alloc+0x3b/0x330 [ 81.884189][ T813] ? __cfi__raw_spin_lock+0x10/0x10 [ 81.889396][ T813] __alloc_file+0x28/0x2a0 [ 81.893916][ T813] alloc_empty_file+0x97/0x180 [ 81.898684][ T813] alloc_file+0x59/0x640 [ 81.902960][ T813] alloc_file_pseudo+0x17a/0x1f0 [ 81.907939][ T813] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 81.913421][ T813] ? __kasan_check_write+0x14/0x20 [ 81.918595][ T813] ? clear_nlink+0x8a/0xe0 [ 81.923022][ T813] __shmem_file_setup+0x1df/0x2b0 [ 81.928060][ T813] shmem_file_setup+0x2f/0x40 [ 81.932744][ T813] __se_sys_memfd_create+0x1e6/0x3b0 [ 81.938027][ T813] __x64_sys_memfd_create+0x5b/0x70 [ 81.943234][ T813] x64_sys_call+0x235/0x9a0 [ 81.947748][ T813] do_syscall_64+0x4c/0xa0 [ 81.952171][ T813] ? clear_bhb_loop+0x30/0x80 [ 81.956855][ T813] ? clear_bhb_loop+0x30/0x80 [ 81.961545][ T813] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 81.967452][ T813] RIP: 0033:0x7f50a0f8ec29 [ 81.971873][ T813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.991498][ T813] RSP: 002b:00007f50a1d3ed68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 81.999933][ T813] RAX: ffffffffffffffda RBX: 0000000000000593 RCX: 00007f50a0f8ec29 [ 82.007994][ T813] RDX: 00007f50a1d3edec RSI: 0000000000000000 RDI: 00007f50a1012810 [ 82.016150][ T813] RBP: 00002000000005c0 R08: 00007f50a1d3eb07 R09: 0000000000000000 [ 82.024309][ T813] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 [ 82.032295][ T813] R13: 00007f50a1d3edec R14: 00007f50a1d3edf0 R15: 00007ffff2310fc8 [ 82.040286][ T813] [ 82.235625][ T819] loop2: detected capacity change from 0 to 256 [ 82.243399][ T819] exfat: Unknown parameter '' [ 82.425924][ T365] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 82.425967][ T610] Bluetooth: hci0: command 0x1003 tx timeout [ 82.541044][ T810] loop1: detected capacity change from 0 to 8192 [ 82.751540][ T412] usb 4-1: USB disconnect, device number 3 [ 83.068182][ T822] loop3: detected capacity change from 0 to 2048 [ 83.106184][ T822] loop3: p1 < > p3 [ 83.111732][ T822] loop3: p3 size 134217728 extends beyond EOD, truncated [ 83.269136][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 83.269150][ T28] audit: type=1400 audit(1758428749.208:202): avc: denied { connect } for pid=826 comm="syz.2.116" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 83.308446][ T28] audit: type=1400 audit(1758428749.238:203): avc: denied { write } for pid=826 comm="syz.2.116" path="socket:[17922]" dev="sockfs" ino=17922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 83.370116][ T832] FAULT_INJECTION: forcing a failure. [ 83.370116][ T832] name failslab, interval 1, probability 0, space 0, times 0 [ 83.374012][ T636] usb 1-1: unable to get BOS descriptor or descriptor too short [ 83.387357][ T28] audit: type=1400 audit(1758428749.308:204): avc: denied { read } for pid=831 comm="syz.2.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.412231][ T636] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 83.556328][ T832] CPU: 1 PID: 832 Comm: syz.2.117 Not tainted syzkaller #0 [ 83.563592][ T832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 83.573674][ T832] Call Trace: [ 83.576978][ T832] [ 83.579921][ T832] __dump_stack+0x21/0x24 [ 83.584268][ T832] dump_stack_lvl+0xee/0x150 [ 83.588875][ T832] ? __cfi_dump_stack_lvl+0x8/0x8 [ 83.593919][ T832] dump_stack+0x15/0x24 [ 83.598086][ T832] should_fail_ex+0x3d4/0x520 [ 83.602791][ T832] __should_failslab+0xac/0xf0 [ 83.607569][ T832] ? genl_family_rcv_msg_attrs_parse+0xac/0x2a0 [ 83.613825][ T832] should_failslab+0x9/0x20 [ 83.618351][ T832] __kmem_cache_alloc_node+0x3d/0x2c0 [ 83.624180][ T832] ? genl_family_rcv_msg_attrs_parse+0xac/0x2a0 [ 83.630455][ T832] __kmalloc+0xa1/0x1e0 [ 83.634631][ T832] ? is_bpf_text_address+0x177/0x190 [ 83.639939][ T832] genl_family_rcv_msg_attrs_parse+0xac/0x2a0 [ 83.646115][ T832] ? __kernel_text_address+0xd/0x30 [ 83.651346][ T832] genl_family_rcv_msg_doit+0xd1/0x350 [ 83.656828][ T832] ? arch_stack_walk+0xfc/0x150 [ 83.661713][ T832] ? genl_family_rcv_msg_dumpit+0x340/0x340 [ 83.667622][ T832] ? memcpy+0x56/0x70 [ 83.671619][ T832] genl_rcv_msg+0x5ea/0x770 [ 83.676147][ T832] ? kasan_set_track+0x4b/0x70 [ 83.680923][ T832] ? kasan_save_alloc_info+0x25/0x30 [ 83.686227][ T832] ? __kasan_kmalloc+0x95/0xb0 [ 83.691154][ T832] ? __cfi_genl_rcv_msg+0x10/0x10 [ 83.696198][ T832] ? __cfi_tipc_nl_bearer_get+0x10/0x10 [ 83.702029][ T832] ? __cfi_tipc_nl_bearer_dump+0x10/0x10 [ 83.707687][ T832] ? selinux_nlmsg_lookup+0x33c/0x4c0 [ 83.713092][ T832] netlink_rcv_skb+0x1f2/0x440 [ 83.717884][ T832] ? __cfi_genl_rcv_msg+0x10/0x10 [ 83.723036][ T832] ? __cfi_netlink_rcv_skb+0x10/0x10 [ 83.728348][ T832] ? down_read+0xa0/0xf0 [ 83.732846][ T832] ? __cfi_down_read+0x10/0x10 [ 83.737627][ T832] ? __netlink_lookup+0x387/0x3b0 [ 83.742663][ T832] genl_rcv+0x28/0x40 [ 83.746661][ T832] netlink_unicast+0x8ab/0xa30 [ 83.751457][ T832] netlink_sendmsg+0x8aa/0xbc0 [ 83.756248][ T832] ? __cfi_netlink_sendmsg+0x10/0x10 [ 83.761561][ T832] ? security_socket_sendmsg+0x93/0xb0 [ 83.767050][ T832] ? __cfi_netlink_sendmsg+0x10/0x10 [ 83.772357][ T832] ____sys_sendmsg+0x5a9/0x990 [ 83.777239][ T832] ? __sys_sendmsg_sock+0x40/0x40 [ 83.782294][ T832] ? import_iovec+0x7c/0xb0 [ 83.786825][ T832] ___sys_sendmsg+0x21c/0x290 [ 83.791526][ T832] ? __sys_sendmsg+0x270/0x270 [ 83.796306][ T832] ? __kasan_check_write+0x14/0x20 [ 83.801435][ T832] ? proc_fail_nth_write+0x17a/0x1f0 [ 83.806741][ T832] ? vfs_write+0x9d6/0xca0 [ 83.811197][ T832] ? __fdget+0x19c/0x220 [ 83.815450][ T832] __x64_sys_sendmsg+0x1f0/0x2c0 [ 83.820577][ T832] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 83.826098][ T832] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 83.832187][ T832] x64_sys_call+0x171/0x9a0 [ 83.836711][ T832] do_syscall_64+0x4c/0xa0 [ 83.841155][ T832] ? clear_bhb_loop+0x30/0x80 [ 83.846116][ T832] ? clear_bhb_loop+0x30/0x80 [ 83.850811][ T832] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 83.856810][ T832] RIP: 0033:0x7f50a0f8ec29 [ 83.861238][ T832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.880861][ T832] RSP: 002b:00007f50a1d3f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 83.889295][ T832] RAX: ffffffffffffffda RBX: 00007f50a11d5fa0 RCX: 00007f50a0f8ec29 [ 83.897300][ T832] RDX: 0000000000004040 RSI: 00002000000000c0 RDI: 0000000000000003 [ 83.905383][ T832] RBP: 00007f50a1d3f090 R08: 0000000000000000 R09: 0000000000000000 [ 83.913375][ T832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.921446][ T832] R13: 00007f50a11d6038 R14: 00007f50a11d5fa0 R15: 00007ffff2310fc8 [ 83.929443][ T832] [ 84.244731][ T636] usb 1-1: can't read configurations, error -71 [ 85.626313][ T822] loop3: detected capacity change from 0 to 8192 [ 86.371822][ T336] I/O error, dev loop3, sector 8064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 86.783223][ T856] input: syz1 as /devices/virtual/input/input16 [ 86.929373][ T852] loop1: detected capacity change from 0 to 32768 [ 87.044861][ T859] bridge0: port 3(ip6erspan0) entered blocking state [ 87.051783][ T859] bridge0: port 3(ip6erspan0) entered disabled state [ 87.059213][ T859] device ip6erspan0 entered promiscuous mode [ 87.111344][ T852] loop1: p1 p3 < p5 p6 > [ 87.126865][ T28] audit: type=1400 audit(1758428753.068:205): avc: denied { map } for pid=858 comm="syz.3.125" path="socket:[19142]" dev="sockfs" ino=19142 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 87.213135][ T28] audit: type=1400 audit(1758428753.088:206): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 87.344997][ T865] loop1: detected capacity change from 0 to 256 [ 87.351726][ T865] exfat: Unknown parameter '' [ 87.480761][ T28] audit: type=1400 audit(1758428753.098:207): avc: denied { read } for pid=858 comm="syz.3.125" path="socket:[19142]" dev="sockfs" ino=19142 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 87.754331][ T622] udevd[622]: inotify_add_watch(7, /dev/loop1p5, 10) failed: No such file or directory [ 87.770783][ T460] udevd[460]: inotify_add_watch(7, /dev/loop1p6, 10) failed: No such file or directory [ 87.787246][ T339] udevd[339]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 87.800240][ T336] udevd[336]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 88.344023][ T871] netlink: 388 bytes leftover after parsing attributes in process `syz.0.128'. [ 88.570545][ T871] netlink: 20 bytes leftover after parsing attributes in process `syz.0.128'. [ 90.177305][ T28] audit: type=1400 audit(1758428756.008:208): avc: denied { read write } for pid=883 comm="syz.3.132" name="vhost-vsock" dev="devtmpfs" ino=268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 90.252177][ T28] audit: type=1400 audit(1758428756.008:209): avc: denied { open } for pid=883 comm="syz.3.132" path="/dev/vhost-vsock" dev="devtmpfs" ino=268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 90.350003][ T28] audit: type=1400 audit(1758428756.008:210): avc: denied { ioctl } for pid=883 comm="syz.3.132" path="/dev/vhost-vsock" dev="devtmpfs" ino=268 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 90.429295][ T28] audit: type=1400 audit(1758428756.158:211): avc: denied { read } for pid=883 comm="syz.3.132" dev="nsfs" ino=4026532555 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 90.493558][ T28] audit: type=1400 audit(1758428756.158:212): avc: denied { open } for pid=883 comm="syz.3.132" path="net:[4026532555]" dev="nsfs" ino=4026532555 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 90.545770][ T525] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 90.582048][ T28] audit: type=1400 audit(1758428756.158:213): avc: denied { write } for pid=883 comm="syz.3.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 90.735770][ T525] usb 3-1: Using ep0 maxpacket: 16 [ 90.743422][ T525] usb 3-1: New USB device found, idVendor=09e8, idProduct=0062, bcdDevice=80.f2 [ 91.068018][ T525] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 91.076375][ T525] usb 3-1: Product: syz [ 91.080617][ T525] usb 3-1: Manufacturer: syz [ 91.085256][ T525] usb 3-1: SerialNumber: syz [ 91.109181][ T525] usb 3-1: config 0 descriptor?? [ 91.110682][ T897] loop0: detected capacity change from 0 to 40427 [ 91.128696][ T897] F2FS-fs (loop0): Invalid log_blocksize (268), supports only 12 [ 91.143746][ T897] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 91.146903][ T525] snd-usb-audio: probe of 3-1:0.0 failed with error -2 [ 91.187498][ T897] F2FS-fs (loop0): invalid crc value [ 91.218338][ T905] input: syz1 as /devices/virtual/input/input17 [ 91.317467][ T365] Bluetooth: hci0: sending frame failed (-49) [ 91.324126][ T610] Bluetooth: hci0: Opcode 0x1003 failed: -49 [ 91.449900][ T897] F2FS-fs (loop0): Found nat_bits in checkpoint [ 91.462803][ T339] udevd[339]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 91.559911][ T897] F2FS-fs (loop0): Try to recover 1th superblock, ret: 0 [ 91.571424][ T897] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5 [ 91.672643][ T28] audit: type=1400 audit(1758428757.608:214): avc: denied { read } for pid=896 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 91.722896][ T915] FAULT_INJECTION: forcing a failure. [ 91.722896][ T915] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 91.736315][ T915] CPU: 0 PID: 915 Comm: syz.0.133 Not tainted syzkaller #0 [ 91.743543][ T915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 91.753617][ T915] Call Trace: [ 91.756916][ T915] [ 91.759109][ T913] input: syz1 as /devices/virtual/input/input18 [ 91.759860][ T915] __dump_stack+0x21/0x24 [ 91.770425][ T915] dump_stack_lvl+0xee/0x150 [ 91.775039][ T915] ? __cfi_dump_stack_lvl+0x8/0x8 [ 91.780090][ T915] dump_stack+0x15/0x24 [ 91.784284][ T915] should_fail_ex+0x3d4/0x520 [ 91.788989][ T915] should_fail+0xb/0x10 [ 91.793150][ T915] should_fail_usercopy+0x1a/0x20 [ 91.798174][ T915] _copy_from_user+0x1e/0xc0 [ 91.802764][ T915] iovec_from_user+0x1aa/0x2e0 [ 91.807529][ T915] ? _parse_integer+0x2a/0x40 [ 91.812228][ T915] __import_iovec+0x71/0x470 [ 91.817014][ T915] import_iovec+0x7c/0xb0 [ 91.821345][ T915] ___sys_sendmsg+0x1e4/0x290 [ 91.826109][ T915] ? __sys_sendmsg+0x270/0x270 [ 91.830869][ T915] ? __kasan_check_write+0x14/0x20 [ 91.835976][ T915] ? proc_fail_nth_write+0x17a/0x1f0 [ 91.841260][ T915] ? vfs_write+0x9d6/0xca0 [ 91.845745][ T915] ? __fdget+0x19c/0x220 [ 91.849992][ T915] __x64_sys_sendmsg+0x1f0/0x2c0 [ 91.854952][ T915] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 91.860673][ T915] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 91.866854][ T915] x64_sys_call+0x171/0x9a0 [ 91.871365][ T915] do_syscall_64+0x4c/0xa0 [ 91.875777][ T915] ? clear_bhb_loop+0x30/0x80 [ 91.880737][ T915] ? clear_bhb_loop+0x30/0x80 [ 91.885449][ T915] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 91.891350][ T915] RIP: 0033:0x7f3a4738ec29 [ 91.895768][ T915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.915390][ T915] RSP: 002b:00007f3a481b5038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 91.924674][ T915] RAX: ffffffffffffffda RBX: 00007f3a475d6090 RCX: 00007f3a4738ec29 [ 91.932639][ T915] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 000000000000000e [ 91.940608][ T915] RBP: 00007f3a481b5090 R08: 0000000000000000 R09: 0000000000000000 [ 91.948576][ T915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.956555][ T915] R13: 00007f3a475d6128 R14: 00007f3a475d6090 R15: 00007ffd536db7c8 [ 91.964654][ T915] [ 92.109154][ T924] input: syz1 as /devices/virtual/input/input19 [ 92.780895][ T6] usb 3-1: USB disconnect, device number 4 [ 92.838902][ T931] loop2: detected capacity change from 0 to 1024 [ 92.846193][ T931] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 92.856048][ T931] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 92.867149][ T931] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (52321!=20869) [ 92.876956][ T931] EXT4-fs (loop2): filesystem has both journal inode and journal device! [ 93.114590][ T936] loop2: detected capacity change from 0 to 256 [ 93.122776][ T936] exfat: Unknown parameter '' [ 93.433725][ T28] audit: type=1326 audit(1758428759.368:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=937 comm="syz.0.142" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a4738ec29 code=0x7ffc0000 [ 93.461567][ T28] audit: type=1326 audit(1758428759.398:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=937 comm="syz.0.142" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f3a4738d590 code=0x7ffc0000 [ 93.497008][ T28] audit: type=1326 audit(1758428759.428:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=937 comm="syz.0.142" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f3a4738d6df code=0x7ffc0000 [ 93.501342][ T938] capability: warning: `syz.0.142' uses deprecated v2 capabilities in a way that may be insecure [ 93.534871][ T938] FAULT_INJECTION: forcing a failure. [ 93.534871][ T938] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 93.556046][ T938] CPU: 1 PID: 938 Comm: syz.0.142 Not tainted syzkaller #0 [ 93.563292][ T938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 93.573455][ T938] Call Trace: [ 93.576753][ T938] [ 93.579700][ T938] __dump_stack+0x21/0x24 [ 93.584047][ T938] dump_stack_lvl+0xee/0x150 [ 93.588652][ T938] ? __cfi_dump_stack_lvl+0x8/0x8 [ 93.593698][ T938] ? dump_stack+0x9/0x24 [ 93.597965][ T938] dump_stack+0x15/0x24 [ 93.602136][ T938] should_fail_ex+0x3d4/0x520 [ 93.606833][ T938] should_fail+0xb/0x10 [ 93.611008][ T938] should_fail_usercopy+0x1a/0x20 [ 93.616052][ T938] _copy_from_user+0x1e/0xc0 [ 93.620671][ T938] __se_sys_capset+0x240/0x730 [ 93.625451][ T938] ? __x64_sys_capset+0x70/0x70 [ 93.630314][ T938] ? __this_cpu_preempt_check+0x13/0x20 [ 93.635886][ T938] ? xfd_validate_state+0x70/0x150 [ 93.641017][ T938] ? __secure_computing+0xea/0x290 [ 93.646145][ T938] __x64_sys_capset+0x5b/0x70 [ 93.650839][ T938] x64_sys_call+0x48f/0x9a0 [ 93.655357][ T938] do_syscall_64+0x4c/0xa0 [ 93.659802][ T938] ? clear_bhb_loop+0x30/0x80 [ 93.664502][ T938] ? clear_bhb_loop+0x30/0x80 [ 93.669203][ T938] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 93.675112][ T938] RIP: 0033:0x7f3a4738ec29 [ 93.679539][ T938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.699159][ T938] RSP: 002b:00007f3a481d6038 EFLAGS: 00000246 ORIG_RAX: 000000000000007e [ 93.707597][ T938] RAX: ffffffffffffffda RBX: 00007f3a475d5fa0 RCX: 00007f3a4738ec29 [ 93.716024][ T938] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000200000000040 [ 93.724449][ T938] RBP: 00007f3a481d6090 R08: 0000000000000000 R09: 0000000000000000 [ 93.732441][ T938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.740435][ T938] R13: 00007f3a475d6038 R14: 00007f3a475d5fa0 R15: 00007ffd536db7c8 [ 93.748429][ T938] [ 93.839616][ T365] Bluetooth: hci0: command 0x1003 tx timeout [ 93.840891][ T45] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 94.084759][ T945] input: syz1 as /devices/virtual/input/input20 [ 94.414673][ T949] input: syz1 as /devices/virtual/input/input21 [ 94.537685][ T365] Bluetooth: hci0: sending frame failed (-49) [ 94.544601][ T45] Bluetooth: hci0: Opcode 0x1003 failed: -49 [ 94.609518][ T950] input: syz1 as /devices/virtual/input/input22 [ 96.677646][ T45] Bluetooth: hci0: command 0x1003 tx timeout [ 96.683798][ T365] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 96.771998][ T972] input: syz1 as /devices/virtual/input/input23 [ 96.799857][ T971] netlink: 4 bytes leftover after parsing attributes in process `syz.4.151'. [ 96.810081][ T971] device gretap0 entered promiscuous mode [ 96.815886][ T971] device macsec1 entered promiscuous mode [ 96.822638][ T971] device gretap0 left promiscuous mode [ 96.868388][ T975] loop1: detected capacity change from 0 to 2048 [ 96.875812][ T975] EXT4-fs: Ignoring removed orlov option [ 96.907757][ T975] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 96.920205][ T980] FAULT_INJECTION: forcing a failure. [ 96.920205][ T980] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 96.921607][ T975] ext4 filesystem being mounted at /38/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 96.933668][ T980] CPU: 0 PID: 980 Comm: syz.0.153 Not tainted syzkaller #0 [ 96.950929][ T980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 96.961013][ T980] Call Trace: [ 96.964307][ T980] [ 96.967263][ T980] __dump_stack+0x21/0x24 [ 96.971618][ T980] dump_stack_lvl+0xee/0x150 [ 96.976243][ T980] ? __cfi_dump_stack_lvl+0x8/0x8 [ 96.981381][ T980] dump_stack+0x15/0x24 [ 96.985560][ T980] should_fail_ex+0x3d4/0x520 [ 96.990273][ T980] should_fail+0xb/0x10 [ 96.994437][ T980] should_fail_usercopy+0x1a/0x20 [ 96.999477][ T980] _copy_to_user+0x1e/0x90 [ 97.004079][ T980] simple_read_from_buffer+0xe9/0x160 [ 97.009459][ T980] proc_fail_nth_read+0x19a/0x210 [ 97.014578][ T980] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 97.020139][ T980] ? security_file_permission+0x94/0xb0 [ 97.025737][ T980] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 97.031387][ T980] vfs_read+0x26e/0x8c0 [ 97.035559][ T980] ? __cfi_vfs_read+0x10/0x10 [ 97.040258][ T980] ? __kasan_check_write+0x14/0x20 [ 97.045382][ T980] ? mutex_lock+0x8d/0x1a0 [ 97.049805][ T980] ? __cfi_mutex_lock+0x10/0x10 [ 97.054788][ T980] ? __fdget_pos+0x2cd/0x380 [ 97.059388][ T980] ? ksys_read+0x71/0x240 [ 97.063746][ T980] ksys_read+0x140/0x240 [ 97.068007][ T980] ? fput+0x154/0x1a0 [ 97.072002][ T980] ? __cfi_ksys_read+0x10/0x10 [ 97.076780][ T980] ? debug_smp_processor_id+0x17/0x20 [ 97.082164][ T980] __x64_sys_read+0x7b/0x90 [ 97.086683][ T980] x64_sys_call+0x2f/0x9a0 [ 97.091107][ T980] do_syscall_64+0x4c/0xa0 [ 97.095520][ T980] ? clear_bhb_loop+0x30/0x80 [ 97.100198][ T980] ? clear_bhb_loop+0x30/0x80 [ 97.104882][ T980] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 97.110831][ T980] RIP: 0033:0x7f3a4738d63c [ 97.115247][ T980] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 97.134956][ T980] RSP: 002b:00007f3a481d6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 97.143482][ T980] RAX: ffffffffffffffda RBX: 00007f3a475d5fa0 RCX: 00007f3a4738d63c [ 97.151462][ T980] RDX: 000000000000000f RSI: 00007f3a481d60a0 RDI: 0000000000000003 [ 97.159440][ T980] RBP: 00007f3a481d6090 R08: 0000000000000000 R09: 0000000000000000 [ 97.167424][ T980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 97.175409][ T980] R13: 00007f3a475d6038 R14: 00007f3a475d5fa0 R15: 00007ffd536db7c8 [ 97.183384][ T980] [ 97.189519][ T283] EXT4-fs (loop1): unmounting filesystem. [ 97.402071][ T987] input: syz1 as /devices/virtual/input/input24 [ 97.606576][ T990] loop1: detected capacity change from 0 to 256 [ 97.689212][ T990] exfat: Unknown parameter '' [ 97.708936][ T6] usb 5-1: new full-speed USB device number 4 using dummy_hcd [ 98.004890][ T6] usb 5-1: unable to get BOS descriptor or descriptor too short [ 98.044658][ T6] usb 5-1: not running at top speed; connect to a high speed hub [ 98.144551][ T6] usb 5-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 98.176782][ T6] usb 5-1: New USB device found, idVendor=04b8, idProduct=0202, bcdDevice= 0.40 [ 98.197319][ T6] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 98.211030][ T992] loop3: detected capacity change from 0 to 2048 [ 98.217582][ T6] usb 5-1: Product: syz [ 98.223527][ T6] usb 5-1: Manufacturer: syz [ 98.228605][ T6] usb 5-1: SerialNumber: syz [ 98.266584][ T992] loop3: p1 < > p3 [ 98.271685][ T992] loop3: p3 size 134217728 extends beyond EOD, truncated [ 98.282656][ T103] loop3: p1 < > p3 [ 98.287412][ T103] loop3: p3 size 134217728 extends beyond EOD, truncated [ 98.450398][ T6] usb 5-1: USB disconnect, device number 4 [ 98.531344][ T994] loop3: detected capacity change from 0 to 8192 [ 98.652620][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 98.652634][ T28] audit: type=1400 audit(1758428764.588:224): avc: denied { sqpoll } for pid=1000 comm="syz.3.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 98.855890][ T365] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 98.924785][ T1003] x_tables: ip6_tables: NETMAP.0 target: invalid size 40 (kernel) != (user) 0 [ 99.375759][ T350] usb 5-1: new high-speed USB device number 5 using dummy_hcd [ 99.430925][ T1011] loop1: detected capacity change from 0 to 512 [ 99.440821][ T1011] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (17031!=33349) [ 99.451064][ T1011] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a802e12c, mo2=0002] [ 99.459218][ T1011] System zones: 1-12 [ 99.463607][ T1011] EXT4-fs (loop1): orphan cleanup on readonly fs [ 99.470530][ T1011] EXT4-fs error (device loop1): ext4_validate_block_bitmap:438: comm syz.1.161: bg 0: block 361: padding at end of block bitmap is not set [ 99.485169][ T1011] EXT4-fs (loop1): Remounting filesystem read-only [ 99.491928][ T1011] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6170: Corrupt filesystem [ 99.501086][ T1011] EXT4-fs (loop1): Remounting filesystem read-only [ 99.507839][ T1011] EXT4-fs error (device loop1): ext4_free_branches:1030: inode #11: comm syz.1.161: invalid indirect mapped block 12 (level 1) [ 99.521572][ T1011] EXT4-fs (loop1): Remounting filesystem read-only [ 99.528277][ T1011] EXT4-fs error (device loop1): ext4_free_branches:1030: inode #11: comm syz.1.161: invalid indirect mapped block 2 (level 2) [ 99.541771][ T1011] EXT4-fs (loop1): Remounting filesystem read-only [ 99.548532][ T1011] EXT4-fs (loop1): 1 truncate cleaned up [ 99.554401][ T1011] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 99.555803][ T350] usb 5-1: Using ep0 maxpacket: 16 [ 99.582742][ T283] EXT4-fs (loop1): unmounting filesystem. [ 99.591330][ T350] usb 5-1: New USB device found, idVendor=09e8, idProduct=0062, bcdDevice=80.f2 [ 99.599675][ T1014] loop3: detected capacity change from 0 to 512 [ 99.609937][ T350] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 99.619218][ T1014] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (17031!=33349) [ 99.629244][ T350] usb 5-1: Product: syz [ 99.633577][ T1014] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a802e12c, mo2=0002] [ 99.647239][ T1014] System zones: 1-12 [ 99.651728][ T1014] EXT4-fs (loop3): orphan cleanup on readonly fs [ 99.659979][ T1014] EXT4-fs error (device loop3): ext4_validate_block_bitmap:438: comm syz.3.163: bg 0: block 361: padding at end of block bitmap is not set [ 99.674789][ T1014] EXT4-fs (loop3): Remounting filesystem read-only [ 99.681938][ T1014] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6170: Corrupt filesystem [ 99.691132][ T1014] EXT4-fs (loop3): Remounting filesystem read-only [ 99.697661][ T350] usb 5-1: Manufacturer: syz [ 99.702352][ T350] usb 5-1: SerialNumber: syz [ 99.706998][ T1014] EXT4-fs error (device loop3): ext4_free_branches:1030: inode #11: comm syz.3.163: invalid indirect mapped block 12 (level 1) [ 99.707253][ T1014] EXT4-fs (loop3): Remounting filesystem read-only [ 99.721312][ T350] usb 5-1: config 0 descriptor?? [ 99.727957][ T1014] EXT4-fs error (device loop3): ext4_free_branches:1030: inode #11: comm syz.3.163: invalid indirect mapped block 2 (level 2) [ 99.735448][ T350] snd-usb-audio: probe of 5-1:0.0 failed with error -2 [ 99.746067][ T1014] EXT4-fs (loop3): Remounting filesystem read-only [ 99.758473][ T1014] EXT4-fs (loop3): 1 truncate cleaned up [ 99.763298][ T336] udevd[336]: error opening ATTR{/sys/devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 99.764179][ T1014] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 99.873874][ T1014] FAULT_INJECTION: forcing a failure. [ 99.873874][ T1014] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 99.920719][ T1014] CPU: 1 PID: 1014 Comm: syz.3.163 Not tainted syzkaller #0 [ 99.928081][ T1014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 99.938161][ T1014] Call Trace: [ 99.941456][ T1014] [ 99.944394][ T1014] __dump_stack+0x21/0x24 [ 99.948830][ T1014] dump_stack_lvl+0xee/0x150 [ 99.953431][ T1014] ? __cfi_dump_stack_lvl+0x8/0x8 [ 99.958470][ T1014] ? dump_stack+0x9/0x24 [ 99.962734][ T1014] dump_stack+0x15/0x24 [ 99.966934][ T1014] should_fail_ex+0x3d4/0x520 [ 99.971641][ T1014] should_fail+0xb/0x10 [ 99.975823][ T1014] should_fail_usercopy+0x1a/0x20 [ 99.980873][ T1014] _copy_from_user+0x1e/0xc0 [ 99.985487][ T1014] __se_sys_rt_tgsigqueueinfo+0xb0/0x490 [ 99.991142][ T1014] ? __x64_sys_rt_tgsigqueueinfo+0xb0/0xb0 [ 99.996967][ T1014] ? release_firmware_map_entry+0x194/0x194 [ 100.002879][ T1014] ? ksys_write+0x1eb/0x240 [ 100.007397][ T1014] ? fpregs_restore_userregs+0x128/0x260 [ 100.013026][ T1014] __x64_sys_rt_tgsigqueueinfo+0x9b/0xb0 [ 100.018680][ T1014] x64_sys_call+0x51b/0x9a0 [ 100.023188][ T1014] do_syscall_64+0x4c/0xa0 [ 100.027600][ T1014] ? clear_bhb_loop+0x30/0x80 [ 100.032275][ T1014] ? clear_bhb_loop+0x30/0x80 [ 100.036966][ T1014] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 100.042859][ T1014] RIP: 0033:0x7fe63298ec29 [ 100.047287][ T1014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.066890][ T1014] RSP: 002b:00007fe6338c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000129 [ 100.075305][ T1014] RAX: ffffffffffffffda RBX: 00007fe632bd5fa0 RCX: 00007fe63298ec29 [ 100.083271][ T1014] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000000 [ 100.091241][ T1014] RBP: 00007fe6338c6090 R08: 0000000000000000 R09: 0000000000000000 [ 100.099206][ T1014] R10: 0000200000000300 R11: 0000000000000246 R12: 0000000000000001 [ 100.107183][ T1014] R13: 00007fe632bd6038 R14: 00007fe632bd5fa0 R15: 00007fff23bb06d8 [ 100.115150][ T1014] [ 100.130998][ T285] EXT4-fs (loop3): unmounting filesystem. [ 100.146568][ T1021] loop3: detected capacity change from 0 to 256 [ 100.153408][ T1021] exfat: Deprecated parameter 'namecase' [ 100.159834][ T1021] exfat: Deprecated parameter 'utf8' [ 100.168601][ T1021] exFAT-fs (loop3): failed to load upcase table (idx : 0x00010000, chksum : 0x22785e93, utbl_chksum : 0xe619d30d) [ 100.185095][ T28] audit: type=1400 audit(1758428766.128:225): avc: denied { watch watch_reads } for pid=1020 comm="syz.3.164" path=2F33332F131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D3382F66696C6530 dev="loop3" ino=1048600 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 100.223578][ T28] audit: type=1400 audit(1758428766.128:226): avc: denied { unmount } for pid=285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 100.263528][ T1023] loop3: detected capacity change from 0 to 2048 [ 100.288388][ T1023] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 100.297127][ T1023] ext4 filesystem being mounted at /34/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 100.381870][ T28] audit: type=1400 audit(1758428766.318:227): avc: denied { accept } for pid=1022 comm="syz.3.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 100.753649][ T1033] netlink: 8 bytes leftover after parsing attributes in process `syz.1.167'. [ 100.781354][ T28] audit: type=1400 audit(1758428766.718:228): avc: denied { read write } for pid=1022 comm="syz.3.165" name="file1" dev="loop3" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 100.813467][ T28] audit: type=1400 audit(1758428766.718:229): avc: denied { open } for pid=1022 comm="syz.3.165" path="/34/file1/file1" dev="loop3" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 101.025880][ T1040] loop1: detected capacity change from 0 to 256 [ 101.033934][ T1040] exfat: Unknown parameter '' [ 101.171220][ T336] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 101.217120][ T688] EXT4-fs error (device loop3): ext4_validate_block_bitmap:438: comm kworker/u4:7: bg 0: block 345: padding at end of block bitmap is not set [ 101.497692][ T688] EXT4-fs (loop3): Delayed block allocation failed for inode 15 at logical offset 79 with max blocks 1 with error 117 [ 102.610325][ T688] EXT4-fs (loop3): This should not happen!! Data will be lost [ 102.610325][ T688] [ 102.634610][ T285] EXT4-fs (loop3): unmounting filesystem. [ 102.991834][ T350] usb 5-1: USB disconnect, device number 5 [ 103.175813][ T28] audit: type=1400 audit(1758428769.098:230): avc: denied { write } for pid=1061 comm="syz.4.175" name="route" dev="proc" ino=4026532482 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 103.212033][ T1063] input: syz1 as /devices/virtual/input/input25 [ 103.454744][ T28] audit: type=1400 audit(1758428769.108:231): avc: denied { create } for pid=1061 comm="syz.4.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 103.476940][ T1066] FAULT_INJECTION: forcing a failure. [ 103.476940][ T1066] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 103.496949][ T1066] CPU: 0 PID: 1066 Comm: syz.4.175 Not tainted syzkaller #0 [ 103.504283][ T1066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 103.514369][ T1066] Call Trace: [ 103.517669][ T1066] [ 103.520611][ T1066] __dump_stack+0x21/0x24 [ 103.524950][ T1066] dump_stack_lvl+0xee/0x150 [ 103.529542][ T1066] ? __cfi_dump_stack_lvl+0x8/0x8 [ 103.534568][ T1066] ? kstrtoull+0x137/0x1d0 [ 103.538998][ T1066] dump_stack+0x15/0x24 [ 103.543172][ T1066] should_fail_ex+0x3d4/0x520 [ 103.547872][ T1066] should_fail+0xb/0x10 [ 103.552036][ T1066] should_fail_usercopy+0x1a/0x20 [ 103.557067][ T1066] _copy_from_user+0x1e/0xc0 [ 103.561663][ T1066] core_sys_select+0x2d1/0x650 [ 103.566434][ T1066] ? __cfi_core_sys_select+0x10/0x10 [ 103.571760][ T1066] ? __cfi_set_user_sigmask+0x10/0x10 [ 103.577146][ T1066] ? __kasan_check_write+0x14/0x20 [ 103.582261][ T1066] ? mutex_unlock+0x89/0x220 [ 103.586864][ T1066] __se_sys_pselect6+0x287/0x310 [ 103.591822][ T1066] ? __x64_sys_pselect6+0x100/0x100 [ 103.597027][ T1066] ? ksys_write+0x1eb/0x240 [ 103.601634][ T1066] ? __cfi_ksys_write+0x10/0x10 [ 103.606500][ T1066] __x64_sys_pselect6+0xe5/0x100 [ 103.611449][ T1066] x64_sys_call+0x1b0/0x9a0 [ 103.615959][ T1066] do_syscall_64+0x4c/0xa0 [ 103.620637][ T1066] ? clear_bhb_loop+0x30/0x80 [ 103.625321][ T1066] ? clear_bhb_loop+0x30/0x80 [ 103.630009][ T1066] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 103.635909][ T1066] RIP: 0033:0x7ff038b8ec29 [ 103.640327][ T1066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.660032][ T1066] RSP: 002b:00007ff039a2e038 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 103.668449][ T1066] RAX: ffffffffffffffda RBX: 00007ff038dd6180 RCX: 00007ff038b8ec29 [ 103.676425][ T1066] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000040 [ 103.684402][ T1066] RBP: 00007ff039a2e090 R08: 0000000000000000 R09: 0000000000000000 [ 103.692372][ T1066] R10: 00002000000002c0 R11: 0000000000000246 R12: 0000000000000001 [ 103.700354][ T1066] R13: 00007ff038dd6218 R14: 00007ff038dd6180 R15: 00007ffcf338a108 [ 103.708419][ T1066] [ 103.711810][ T39] usb 3-1: new high-speed USB device number 5 using dummy_hcd [ 103.722067][ T1068] loop0: detected capacity change from 0 to 512 [ 103.798280][ T1062] Zero length message leads to an empty skb [ 103.834438][ T1062] loop4: detected capacity change from 0 to 256 [ 103.846932][ T28] audit: type=1400 audit(1758428769.788:232): avc: denied { mount } for pid=1061 comm="syz.4.175" name="/" dev="loop4" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 103.875969][ T39] usb 3-1: device descriptor read/64, error -71 [ 104.119778][ T28] audit: type=1400 audit(1758428770.058:233): avc: denied { unmount } for pid=287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 104.145792][ T39] usb 3-1: device descriptor read/64, error -71 [ 104.176219][ T28] audit: type=1400 audit(1758428770.108:234): avc: denied { mount } for pid=1069 comm="syz.1.177" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 104.205543][ T1076] device bridge0 entered promiscuous mode [ 104.208303][ T28] audit: type=1326 audit(1758428770.138:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1069 comm="syz.1.177" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f19f1b8ec29 code=0x0 [ 104.211710][ T1076] device macsec1 entered promiscuous mode [ 104.240548][ T1076] bridge0: port 3(macsec1) entered blocking state [ 104.247187][ T1076] bridge0: port 3(macsec1) entered disabled state [ 104.254856][ T1076] device bridge0 left promiscuous mode [ 104.315028][ T1078] device bridge0 entered promiscuous mode [ 104.321161][ T1078] device macsec1 entered promiscuous mode [ 104.327423][ T1078] bridge0: port 3(macsec1) entered blocking state [ 104.337392][ T1078] bridge0: port 3(macsec1) entered disabled state [ 104.365028][ T1078] device bridge0 left promiscuous mode [ 104.384230][ T1080] FAULT_INJECTION: forcing a failure. [ 104.384230][ T1080] name failslab, interval 1, probability 0, space 0, times 0 [ 104.385837][ T28] audit: type=1326 audit(1758428770.318:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1079 comm="syz.0.181" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a4738ec29 code=0x7ffc0000 [ 104.417779][ T1080] CPU: 0 PID: 1080 Comm: syz.0.181 Not tainted syzkaller #0 [ 104.421515][ T28] audit: type=1326 audit(1758428770.318:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1079 comm="syz.0.181" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3a4738ec29 code=0x7ffc0000 [ 104.428465][ T1080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 104.428479][ T1080] Call Trace: [ 104.428485][ T1080] [ 104.428493][ T1080] __dump_stack+0x21/0x24 [ 104.428517][ T1080] dump_stack_lvl+0xee/0x150 [ 104.451813][ T39] usb 3-1: new high-speed USB device number 6 using dummy_hcd [ 104.461725][ T1080] ? __cfi_dump_stack_lvl+0x8/0x8 [ 104.461756][ T1080] dump_stack+0x15/0x24 [ 104.465899][ T28] audit: type=1326 audit(1758428770.318:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1079 comm="syz.0.181" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f3a4738d590 code=0x7ffc0000 [ 104.467980][ T1080] should_fail_ex+0x3d4/0x520 [ 104.472313][ T28] audit: type=1326 audit(1758428770.318:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1079 comm="syz.0.181" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f3a4738d6df code=0x7ffc0000 [ 104.476887][ T1080] ? audit_log_start+0x3a4/0x8b0 [ 104.476916][ T1080] __should_failslab+0xac/0xf0 [ 104.476939][ T1080] should_failslab+0x9/0x20 [ 104.559344][ T1080] kmem_cache_alloc+0x3b/0x330 [ 104.564124][ T1080] audit_log_start+0x3a4/0x8b0 [ 104.568989][ T1080] ? __cfi_audit_log_start+0x10/0x10 [ 104.574283][ T1080] ? audit_log_end+0x1eb/0x240 [ 104.579150][ T1080] ? kmem_cache_free+0x12d/0x300 [ 104.584101][ T1080] ? migrate_enable+0x19c/0x280 [ 104.588956][ T1080] ? __cfi_migrate_enable+0x10/0x10 [ 104.594170][ T1080] audit_seccomp+0x62/0x160 [ 104.598685][ T1080] ? migrate_disable+0xd6/0x180 [ 104.603565][ T1080] __seccomp_filter+0xacd/0x19d0 [ 104.608773][ T1080] ? __secure_computing+0x290/0x290 [ 104.613981][ T1080] ? __kasan_check_write+0x14/0x20 [ 104.619545][ T1080] ? mutex_unlock+0x89/0x220 [ 104.624138][ T1080] ? __cfi_mutex_unlock+0x10/0x10 [ 104.629172][ T1080] ? ksys_write+0x1eb/0x240 [ 104.633687][ T1080] ? __cfi_ksys_write+0x10/0x10 [ 104.638550][ T1080] __secure_computing+0xea/0x290 [ 104.643494][ T1080] syscall_trace_enter+0xaa/0x150 [ 104.648521][ T1080] syscall_enter_from_user_mode+0x1f/0x30 [ 104.654246][ T1080] do_syscall_64+0x24/0xa0 [ 104.658662][ T1080] ? clear_bhb_loop+0x30/0x80 [ 104.663346][ T1080] ? clear_bhb_loop+0x30/0x80 [ 104.668029][ T1080] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 104.674019][ T1080] RIP: 0033:0x7f3a4738ec29 [ 104.678458][ T1080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 104.698067][ T1080] RSP: 002b:00007f3a481d6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 104.706481][ T1080] RAX: ffffffffffffffda RBX: 00007f3a475d5fa0 RCX: 00007f3a4738ec29 [ 104.714475][ T1080] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 104.722449][ T1080] RBP: 00007f3a481d6090 R08: 0000000000000000 R09: 0000000000000000 [ 104.730429][ T1080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 104.738404][ T1080] R13: 00007f3a475d6038 R14: 00007f3a475d5fa0 R15: 00007ffd536db7c8 [ 104.746386][ T1080] [ 104.752293][ T1080] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 104.760203][ T1080] audit: out of memory in audit_log_start [ 104.924330][ T39] usb 3-1: device descriptor read/64, error -71 [ 105.174391][ T1091] loop4: detected capacity change from 0 to 256 [ 105.181116][ T1091] exfat: Unknown parameter '' [ 105.245007][ T336] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 105.415829][ T39] usb 3-1: device descriptor read/64, error -71 [ 105.465938][ T365] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 105.536092][ T39] usb usb3-port1: attempt power cycle [ 105.790046][ T1094] FAULT_INJECTION: forcing a failure. [ 105.790046][ T1094] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 105.811433][ T1096] loop0: detected capacity change from 0 to 512 [ 105.829461][ T1094] CPU: 0 PID: 1094 Comm: syz.3.184 Not tainted syzkaller #0 [ 105.836805][ T1094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 105.846879][ T1094] Call Trace: [ 105.850171][ T1094] [ 105.853197][ T1094] __dump_stack+0x21/0x24 [ 105.857547][ T1094] dump_stack_lvl+0xee/0x150 [ 105.862152][ T1094] ? __cfi_dump_stack_lvl+0x8/0x8 [ 105.867189][ T1094] dump_stack+0x15/0x24 [ 105.871361][ T1094] should_fail_ex+0x3d4/0x520 [ 105.876061][ T1094] should_fail+0xb/0x10 [ 105.880242][ T1094] should_fail_usercopy+0x1a/0x20 [ 105.885284][ T1094] _copy_from_user+0x1e/0xc0 [ 105.889889][ T1094] __sys_bpf+0x277/0x780 [ 105.894142][ T1094] ? bpf_link_show_fdinfo+0x320/0x320 [ 105.899530][ T1094] ? __cfi_ksys_write+0x10/0x10 [ 105.904406][ T1094] ? debug_smp_processor_id+0x17/0x20 [ 105.909803][ T1094] __x64_sys_bpf+0x7c/0x90 [ 105.914241][ T1094] x64_sys_call+0x488/0x9a0 [ 105.918757][ T1094] do_syscall_64+0x4c/0xa0 [ 105.923185][ T1094] ? clear_bhb_loop+0x30/0x80 [ 105.927881][ T1094] ? clear_bhb_loop+0x30/0x80 [ 105.932575][ T1094] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 105.938481][ T1094] RIP: 0033:0x7fe63298ec29 [ 105.942906][ T1094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 105.962698][ T1094] RSP: 002b:00007fe6338c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 105.971134][ T1094] RAX: ffffffffffffffda RBX: 00007fe632bd5fa0 RCX: 00007fe63298ec29 [ 105.979134][ T1094] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 0000000000000000 [ 105.987130][ T1094] RBP: 00007fe6338c6090 R08: 0000000000000000 R09: 0000000000000000 [ 105.995129][ T1094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.003116][ T1094] R13: 00007fe632bd6038 R14: 00007fe632bd5fa0 R15: 00007fff23bb06d8 [ 106.011122][ T1094] [ 106.045637][ T1096] EXT4-fs (loop0): orphan cleanup on readonly fs [ 106.062961][ T1096] EXT4-fs error (device loop0): ext4_validate_block_bitmap:438: comm syz.0.185: bg 0: block 248: padding at end of block bitmap is not set [ 106.086969][ T1096] EXT4-fs error (device loop0): ext4_acquire_dquot:6801: comm syz.0.185: Failed to acquire dquot type 1 [ 106.103945][ T1096] EXT4-fs (loop0): 1 truncate cleaned up [ 106.110066][ T1096] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 107.965863][ T1112] EXT4-fs error (device loop0): ext4_lookup:1862: inode #2: comm syz.0.185: deleted inode referenced: 12 [ 108.163006][ T1120] loop4: detected capacity change from 0 to 1024 [ 108.176100][ T1120] EXT4-fs: Ignoring removed orlov option [ 108.202212][ T1126] netlink: 8 bytes leftover after parsing attributes in process `syz.3.193'. [ 108.207446][ T1120] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 108.215041][ T1126] loop3: detected capacity change from 0 to 512 [ 108.237587][ T1126] EXT4-fs: Ignoring removed mblk_io_submit option [ 108.244135][ T1126] EXT4-fs: Ignoring removed mblk_io_submit option [ 108.256706][ T1126] EXT4-fs (loop3): Test dummy encryption mode enabled [ 108.263690][ T1126] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 108.306633][ T1096] syz.0.185 (1096) used greatest stack depth: 21504 bytes left [ 108.353212][ T284] EXT4-fs (loop0): unmounting filesystem. [ 108.359235][ T1126] EXT4-fs error (device loop3): ext4_orphan_get:1400: inode #15: comm syz.3.193: iget: bad extended attribute block 12124160 [ 108.418494][ T1126] EXT4-fs (loop3): Remounting filesystem read-only [ 108.426997][ T1126] EXT4-fs error (device loop3): ext4_orphan_get:1405: comm syz.3.193: couldn't read orphan inode 15 (err -117) [ 108.449335][ T1126] EXT4-fs (loop3): Remounting filesystem read-only [ 108.461471][ T1126] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 108.547905][ T285] EXT4-fs (loop3): unmounting filesystem. [ 108.821301][ T1136] incfs: Backing dir is not set, filesystem can't be mounted. [ 108.845885][ T1136] incfs: mount failed -2 [ 108.887096][ T1129] loop1: detected capacity change from 0 to 256 [ 109.047720][ T1141] loop3: detected capacity change from 0 to 256 [ 109.057202][ T1141] exfat: Unknown parameter '' [ 109.124675][ T336] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 110.181281][ T1153] loop2: detected capacity change from 0 to 1024 [ 110.192371][ T1153] EXT4-fs: Ignoring removed nomblk_io_submit option [ 110.202352][ T287] EXT4-fs (loop4): unmounting filesystem. [ 110.386958][ T1150] input: syz1 as /devices/virtual/input/input26 [ 110.402045][ T39] ================================================================== [ 110.410154][ T39] BUG: KASAN: use-after-free in hci_uart_write_work+0x4ad/0x7b0 [ 110.417815][ T39] Read of size 8 at addr ffff8881360ae4a8 by task kworker/1:1/39 [ 110.425544][ T39] [ 110.427889][ T39] CPU: 1 PID: 39 Comm: kworker/1:1 Not tainted syzkaller #0 [ 110.435190][ T39] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 110.445259][ T39] Workqueue: events hci_uart_write_work [ 110.450832][ T39] Call Trace: [ 110.454121][ T39] [ 110.457154][ T39] __dump_stack+0x21/0x24 [ 110.461505][ T39] dump_stack_lvl+0xee/0x150 [ 110.466118][ T39] ? __cfi_dump_stack_lvl+0x8/0x8 [ 110.471165][ T39] ? hci_uart_write_work+0x4ad/0x7b0 [ 110.476527][ T39] ? hci_uart_write_work+0x4ad/0x7b0 [ 110.481858][ T39] print_address_description+0x71/0x1e0 [ 110.487467][ T39] print_report+0x4a/0x60 [ 110.491834][ T39] kasan_report+0x122/0x150 [ 110.492838][ T1153] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 110.496374][ T39] ? hci_uart_write_work+0x4ad/0x7b0 [ 110.496407][ T39] ? __cfi_pty_write+0x10/0x10 [ 110.514909][ T39] __asan_report_load8_noabort+0x14/0x20 [ 110.520759][ T39] hci_uart_write_work+0x4ad/0x7b0 [ 110.525939][ T39] process_one_work+0x71f/0xc40 [ 110.530822][ T39] worker_thread+0xa29/0x11f0 [ 110.535545][ T39] kthread+0x281/0x320 [ 110.539661][ T39] ? __cfi_worker_thread+0x10/0x10 [ 110.544800][ T39] ? __cfi_kthread+0x10/0x10 [ 110.549440][ T39] ret_from_fork+0x1f/0x30 [ 110.553908][ T39] [ 110.556956][ T39] [ 110.559316][ T39] Allocated by task 365: [ 110.563574][ T39] kasan_set_track+0x4b/0x70 [ 110.567534][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 110.567585][ T28] audit: type=1400 audit(1758428776.498:250): avc: denied { shutdown } for pid=1152 comm="syz.2.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 110.568192][ T39] kasan_save_alloc_info+0x25/0x30 [ 110.577979][ T28] audit: type=1400 audit(1758428776.498:251): avc: denied { read } for pid=1152 comm="syz.2.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 110.594140][ T39] __kasan_slab_alloc+0x72/0x80 [ 110.594170][ T39] slab_post_alloc_hook+0x4f/0x2d0 [ 110.594195][ T39] kmem_cache_alloc_node+0x181/0x340 [ 110.634589][ T39] __alloc_skb+0xea/0x4b0 [ 110.638955][ T39] __hci_cmd_sync_sk+0x1d1/0xcf0 [ 110.643931][ T39] hci_dev_open_sync+0x13a7/0x3260 [ 110.649075][ T39] hci_power_on+0x195/0x5c0 [ 110.653608][ T39] process_one_work+0x71f/0xc40 [ 110.658510][ T39] worker_thread+0xa29/0x11f0 [ 110.663265][ T39] kthread+0x281/0x320 [ 110.667365][ T39] ret_from_fork+0x1f/0x30 [ 110.671814][ T39] [ 110.674153][ T39] Freed by task 1150: [ 110.678149][ T39] kasan_set_track+0x4b/0x70 [ 110.682766][ T39] kasan_save_free_info+0x31/0x50 [ 110.687826][ T39] ____kasan_slab_free+0x132/0x180 [ 110.692961][ T39] __kasan_slab_free+0x11/0x20 [ 110.697753][ T39] slab_free_freelist_hook+0xc2/0x190 [ 110.703158][ T39] kmem_cache_free+0x12d/0x300 [ 110.707954][ T39] kfree_skbmem+0x10c/0x180 [ 110.712486][ T39] kfree_skb_reason+0xdc/0x230 [ 110.717287][ T39] hci_uart_flush+0x90/0x3f0 [ 110.721912][ T39] hci_uart_tty_close+0x7a/0x230 [ 110.726874][ T39] tty_ldisc_kill+0x10f/0x1f0 [ 110.731579][ T39] tty_ldisc_hangup+0x409/0x520 [ 110.736451][ T39] __tty_hangup+0x58b/0x7c0 [ 110.741496][ T39] tty_ioctl+0x49a/0xc60 [ 110.745765][ T39] __se_sys_ioctl+0x12f/0x1b0 [ 110.750460][ T39] __x64_sys_ioctl+0x7b/0x90 [ 110.755069][ T39] x64_sys_call+0x58b/0x9a0 [ 110.759602][ T39] do_syscall_64+0x4c/0xa0 [ 110.764033][ T39] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 110.769949][ T39] [ 110.772289][ T39] The buggy address belongs to the object at ffff8881360ae3c0 [ 110.772289][ T39] which belongs to the cache skbuff_head_cache of size 256 [ 110.786899][ T39] The buggy address is located 232 bytes inside of [ 110.786899][ T39] 256-byte region [ffff8881360ae3c0, ffff8881360ae4c0) [ 110.800197][ T39] [ 110.802540][ T39] The buggy address belongs to the physical page: [ 110.808970][ T39] page:ffffea0004d82b80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1360ae [ 110.820020][ T39] flags: 0x4000000000000200(slab|zone=1) [ 110.825693][ T39] raw: 4000000000000200 0000000000000000 dead000000000122 ffff888100ba5200 [ 110.834314][ T39] raw: 0000000000000000 00000000800c000c 00000001ffffffff 0000000000000000 [ 110.843006][ T39] page dumped because: kasan: bad access detected [ 110.849430][ T39] page_owner tracks the page as allocated [ 110.855252][ T39] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 287, tgid 287 (syz-executor), ts 110401302143, free_ts 110401183430 [ 110.873747][ T39] post_alloc_hook+0x1f5/0x210 [ 110.878550][ T39] prep_new_page+0x1c/0x110 [ 110.883086][ T39] get_page_from_freelist+0x2c7b/0x2cf0 [ 110.888754][ T39] __alloc_pages+0x1c3/0x450 [ 110.893374][ T39] alloc_slab_page+0x6e/0xf0 [ 110.898090][ T39] new_slab+0x98/0x3d0 [ 110.902188][ T39] ___slab_alloc+0x6f6/0xb50 [ 110.906803][ T39] __slab_alloc+0x5e/0xa0 [ 110.911165][ T39] kmem_cache_alloc_node+0x1c2/0x340 [ 110.916483][ T39] __alloc_skb+0xea/0x4b0 [ 110.920847][ T39] alloc_uevent_skb+0x85/0x240 [ 110.925635][ T39] kobject_uevent_net_broadcast+0x343/0x5b0 [ 110.931570][ T39] kobject_uevent_env+0x54f/0x730 [ 110.936646][ T39] kobject_uevent+0x1d/0x30 [ 110.941186][ T39] __loop_clr_fd+0x2ea/0x690 [ 110.945813][ T39] lo_release+0x14c/0x1e0 [ 110.950189][ T39] page last free stack trace: [ 110.954875][ T39] free_unref_page_prepare+0x742/0x750 [ 110.960378][ T39] free_unref_page_list+0x112/0x8b0 [ 110.965621][ T39] release_pages+0xad1/0xb20 [ 110.970259][ T39] __pagevec_release+0x71/0xe0 [ 110.975079][ T39] truncate_inode_pages_range+0x309/0xcc0 [ 110.980819][ T39] truncate_inode_pages+0x24/0x30 [ 110.985869][ T39] blkdev_flush_mapping+0x158/0x2c0 [ 110.991105][ T39] blkdev_put+0x478/0x710 [ 110.995504][ T39] kill_block_super+0xb8/0xf0 [ 111.000244][ T39] deactivate_locked_super+0xb5/0x120 [ 111.005727][ T39] deactivate_super+0xaf/0xe0 [ 111.010551][ T39] cleanup_mnt+0x45f/0x4e0 [ 111.015104][ T39] __cleanup_mnt+0x19/0x20 [ 111.019738][ T39] task_work_run+0x1db/0x240 [ 111.024348][ T39] exit_to_user_mode_loop+0x9b/0xb0 [ 111.029560][ T39] exit_to_user_mode_prepare+0x5a/0xa0 [ 111.035041][ T39] [ 111.037386][ T39] Memory state around the buggy address: [ 111.043030][ T39] ffff8881360ae380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 111.051195][ T39] ffff8881360ae400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 111.059285][ T39] >ffff8881360ae480: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 111.067350][ T39] ^ [ 111.072723][ T39] ffff8881360ae500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 111.080785][ T39] ffff8881360ae580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 111.088849][ T39] ================================================================== [ 111.117176][ T28] audit: type=1400 audit(1758428777.058:252): avc: denied { setopt } for pid=1152 comm="syz.2.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 111.144856][ T28] audit: type=1400 audit(1758428777.088:253): avc: denied { read } for pid=85 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 111.155823][ T39] Disabling lock debugging due to kernel taint [ 111.260443][ T28] audit: type=1400 audit(1758428777.088:254): avc: denied { search } for pid=85 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 111.303655][ T28] audit: type=1400 audit(1758428777.088:255): avc: denied { write } for pid=85 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 111.365752][ T28] audit: type=1400 audit(1758428777.088:256): avc: denied { add_name } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 111.436728][ T28] audit: type=1400 audit(1758428777.088:257): avc: denied { create } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 111.479713][ T28] audit: type=1400 audit(1758428777.088:258): avc: denied { append open } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 111.527821][ T28] audit: type=1400 audit(1758428777.088:259): avc: denied { getattr } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 111.972999][ T286] EXT4-fs (loop2): unmounting filesystem. [ 112.425773][ T365] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 112.425800][ T610] Bluetooth: hci0: command 0x1003 tx timeout