last executing test programs: 5.319568602s ago: executing program 1 (id=74): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x1, 0x0, '\x00', 0x0, 0x0}, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_es_find_extent_range_enter\x00'}, 0x10) socket$vsock_stream(0x28, 0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r5, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) writev(r5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_es_find_extent_range_exit\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd, @generic, @initr0, @exit, @printk={@llu, {0x2, 0x3, 0x3, 0xa, 0x0}, {0x7, 0x1, 0xc, 0x1, 0x5}, {0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffe00}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, 0x0}, 0x90) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a9fde5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x0, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x64}}, 0x0) 4.353947085s ago: executing program 1 (id=92): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_journal_start\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_journal_start\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 4.342198876s ago: executing program 1 (id=93): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000080)=@v1={0x0, @aes256, 0x0, @desc1}) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc1}, &(0x7f0000000500)={0x0, "b7c913bb682eaddb954b9baa9e3beb3f62952860388464c531987523195928cd2bb67fb432881f0131abc85d7e683ac8222e8038d1cec8de23ca68d11b0e6b1e", 0x39}, 0x48, 0xffffffffffffffff) syz_mount_image$fuse(0x0, &(0x7f0000001040)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file2'}}], [], 0x2c}) r4 = syz_usb_connect(0x0, 0x24, &(0x7f00000007c0)=ANY=[@ANYBLOB="1201000064172f2057155081ed29010203010902120001000000000904"], 0x0) syz_usb_control_io(r4, 0x0, 0x0) syz_usb_control_io(r4, 0x0, &(0x7f0000000940)={0x84, &(0x7f0000000300)=ANY=[@ANYBLOB="000081000000c95a48b32c33408e20d4d1e8f54bcf9595f1b6bb4917ae440790a9bf9dff2a8a0d714742818c8e3b70fe282a0694809d8a7910387ffe2f717609fe3a212cd5b06b19b98a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x8}, 0x48) r6 = syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0xc0, 0x0, 0xfc, 0x0, 0x0) r7 = openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080), 0x18) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r7, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @adiantum, 0x0, @desc1}) r8 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000140)={'fscrypt:', @desc1}, &(0x7f00000001c0)={0x0, "28d7b07d54891881fe02c1203fe49696b9f26f2da4149683f065714f8a61d1f32c99064bbd27b2aa77459cff33a3a98350f1af9d51ed5bef3d63520d260804d0"}, 0x48, 0xfffffffffffffffd) keyctl$setperm(0x5, r8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000f600850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) getdents64(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = socket$pppl2tp(0x18, 0x1, 0x1) r11 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r10, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r11, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r12 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r12, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x3}}, 0x26) 3.81320933s ago: executing program 3 (id=104): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000240)='tlb_flush\x00', r0}, 0x10) 3.802373901s ago: executing program 3 (id=105): r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/devices.allow\x00', 0x1, 0x0) 3.729392683s ago: executing program 3 (id=107): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000000080), 0x18) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f0000000180)=@v1={0x0, @adiantum, 0x0, @desc1}) keyctl$setperm(0x5, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000180)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000140)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file2'}}], [], 0x2c}) 2.836287403s ago: executing program 3 (id=114): syz_emit_ethernet(0x376, &(0x7f00000003c0)={@broadcast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0200", 0x340, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xa, "a78ce54006598080a8030003004023493b87aafaffffffffffffff23732454eefa45ad96579269748e254c1e4a8a8b3d0aa2c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af0502"}, {0x18, 0x1, "000000050000000026000400"}, {0x1, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c61bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0dea07c9a1f643c822a18b79f7c5eba31fb68b2d734a6671e27182aee4df24a4a5cf390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5ac010000000000000090aa235a670670ffc5dc49dfb58d00000000000000"}, {0x0, 0xb, "17dcea46805d4809c20547406b18901b0aeff04c0300f3c75dc2d227a83b89483b1084743475671545e65eb2e9ac946a3f0e2bc4619f91394c02bcfbbb7d71138537d68e2d2c6393a9f3becd1a9f51a948b5b303f4f003"}, {0x19, 0x7, "b8a3e10000a3e1100000006f00ffc0ffff00000000600000ff0bc0fe000000000000000000000000d9a0274400"/55}, {0x0, 0x11, "3f14f0e74d2d42cfb3f27fafb60845f90b6dfc2e37bc87c6905bbc94d33e1ea71a28105f543e868a8a53b360a9d33e2b1e2eeb1d18065daa7628cf9ef083611c9f6ae2e1eb3d8bf9c6ab2642c4808288e62afbf03269f1f98aea6ab3beb5fdc5fdaabc2c676d8800871a6aa54155dea2d995cb22c9924e0ad38c6967052cc7786d779b8353aac33a57d79b05"}]}}}}}}, 0x0) 2.817496556s ago: executing program 3 (id=116): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000240)='tlb_flush\x00', r0}, 0x10) 2.800044899s ago: executing program 3 (id=118): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xe2, 0x54, 0x46, 0x10, 0x23a7, 0xfedc, 0xe00b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x3, 0x42}}]}}]}}, 0x0) syz_usb_control_io$printer(r0, &(0x7f0000000300)={0x14, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="000304000000040301"]}, 0x0) 2.552029318s ago: executing program 4 (id=130): syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file1\x00', 0x21000e, &(0x7f0000000380), 0xfe, 0x518, &(0x7f00000008c0)="$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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mounts\x00') r1 = open(&(0x7f0000000080)='./file1\x00', 0x10b942, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000400)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1217880, 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) sendfile(r1, r0, 0x0, 0x8000000d) 1.436368924s ago: executing program 4 (id=135): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0xe) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000740)=@framed={{}, [@snprintf={{0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x8, 0xfe00}, {0x7, 0x0, 0x8}, {}, {0x5}, {0x7, 0x0, 0x0, 0x0}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x1a}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.291817896s ago: executing program 4 (id=138): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xc4}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000000)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040), 0x8) shutdown(r1, 0x0) 1.223347437s ago: executing program 0 (id=143): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000040)='./file0\x00', 0x300001a, &(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES64], 0xd, 0x2a3, &(0x7f00000001c0)="$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") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000340), 0x208e24b) 1.107581616s ago: executing program 0 (id=144): mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x4d53}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000500)='9p_client_req\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = dup(r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000002240)='9p_client_req\x00', r5}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[], [], 0x6b}}) 984.525375ms ago: executing program 1 (id=145): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000d40)={{r0}, &(0x7f0000000cc0), &(0x7f0000000d00)='%-5lx \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = getpgid(0x0) kcmp(r2, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 938.413082ms ago: executing program 1 (id=146): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100003e4e00000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_alloc\x00', r2}, 0x10) fchmod(r3, 0x0) 907.719987ms ago: executing program 1 (id=147): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6}, 0x48) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000280)={0x18, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x18}}, 0x0) 876.305512ms ago: executing program 0 (id=148): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='vm_unmapped_area\x00', r1}, 0x10) io_setup(0x3, &(0x7f0000000340)) 770.552579ms ago: executing program 0 (id=149): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xc4}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000000)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040), 0x8) shutdown(r1, 0x0) 754.015301ms ago: executing program 0 (id=150): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000180)={0x1f, 0xffff, 0x3}, 0x6) write(r0, &(0x7f0000000000)="54000300010000", 0x7) 440.47552ms ago: executing program 0 (id=152): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window, @mss, @window, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0), 0xc7) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0x81}, {0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 431.235422ms ago: executing program 2 (id=154): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in=@remote, @in6=@local}}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x0, @in=@local}}, 0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in=@empty, @in6=@dev}}, {{@in=@local}, 0x0, @in=@broadcast}}, 0xe8) 422.211464ms ago: executing program 2 (id=155): mknodat(0xffffffffffffff9c, &(0x7f0000000180)='./file5\x00', 0x61c0, 0x700) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file5\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0x401070ca, 0x0) 412.258905ms ago: executing program 2 (id=156): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100003e4e00000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_alloc\x00', r2}, 0x10) fchmod(r3, 0x0) 390.248708ms ago: executing program 2 (id=157): syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000500)='./file1\x00', 0x21000e, &(0x7f0000000380), 0xfe, 0x518, &(0x7f00000008c0)="$eJzs3U1vI2cdAPD/TOIl201JChxKpb6IFu1WsPamoW3EoS0CcasEKvclSrxRtE4cxU67iSqUFR8ACSGoxIkTFyQ+ABLqR0BIlegdAQIh2MKBAzBoxuM0a8abrNYvafL7SY/9zGPP/P+Psx4/87IzAVxYz0XEGxExExEvRsRC2Z6WJQ57JX/fR/feXctL3vzW35JIyraIonrkSjnbXO+pUmf/4PZqq9XcLacb3a2dRmf/4Prm1upGc6O5vby89MrKqysvr9wYST/zfr32jT/9+Ac//+Zrv/7yO7+/+Zdr38uT/nr5er9fo1N8evFh8VjLP4sjsxGxO9pgUzNT9qc27UQAADiVfJT6mYj4QjH+X4iZYjRXGBzSzU0+OwAAAGAUstfn499JRAYAAACcW69HxHwkab08F2A+0rRe753D+7l4LG21O90v3Wrvba/nr0UsRi29tdlq3ijPqV2MWpJPLxX1j6dfGphejognIuJHC5eL6fpau7U+7Z0fAAAAcEFcGdj+/+dCb/sfAAAAOGcWp50AAAAAMHbDtv+TCecBAAAAjI/j/wAAAHCufevNN/OS9e9/vf72/t7t9tvX15ud2/WtvbX6Wnt3p77Rbm8U1+zbOml5rXZ75ysRe3ca3Wan2+jsH9zcau9td29uun8gAAAATMsTz77/YRIRh1+9XJTcpfxhZsgMzhWAcyN9mDf/cXx5AJM37Gf+FC6NMg9g8mannQAwPYfTTgCYtvsu9VExKDh+8s59+wx+M76cAACA0br6+erj//kmQG3ayQFj9VDH/4Fz5RGO/wOfcI7/w8VVe6gRwN0xZgJMy0m3+hh68Y6q4/+VZwZn2YnLAgAAxmq+KM+m9fJY4Hykab0e8XjxX/1rya3NVvNGRHw6In63UPtUPr1UzJm4PSAAAAAAAAAAAAAAAAAAAAAAAAAAnFKWJZEBAAAA51pE+uekvP/X1YUX5gf3D1xK/rUQ5S293vnpWz+5s9rt7i7l7X8/au++V7a/NI09GAAAAHARzT7w1f52en87HgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABG6aN77671yyTj/vVrEbFYFX825ornuahFxGP/SGL22HxJRMyMIP7h3Yh4sip+kqcVi2UWg/HTiLg8mfhPZ1lWGf/KCOLDRfZ+vv55o+r7l8ZzxXP193+2LI9q+PovPVr/zQxZ/z1+yhhPffDLxtD4dyOemq1e//TjJ0PiP1+1wIoP5bvfOTj4v8bewiP7WcTVyt+f5L5Yje7WTqOzf3B9c2t1o7nR3F5eXnpl5dWVl1duNG5ttprlY2Uff/j0r/470PSfrKfofwyJv3hC/1/IK7VjjdlgmDLYB3fufbZXrQ0sooh/7fnqv/+TD4if/5v4Yvk7kL9+tV8/7NWPe+YXv32mMrEy/vqQ/p/09782bKEDXvz29/9wyrcCABPQ2T+4vdpqNXfHXnkvy7JJxTp9JdIzkcYZqPRHd2MLMXdWeqpyUmUUe7YAAICz5uNB/7QzAQAAAAAAAAAAAAAAAAAAgIursx/puC8nNhjzcDpdBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4oP8FAAD//67x3Ks=") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mounts\x00') r1 = open(&(0x7f0000000080)='./file1\x00', 0x10b942, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000400)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1217880, 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) sendfile(r1, r0, 0x0, 0x8000000d) 240.952982ms ago: executing program 2 (id=158): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setresuid(0xee01, 0xee01, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) 232.190113ms ago: executing program 4 (id=139): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75"], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[], [], 0x6b}}) chdir(&(0x7f0000000040)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 204.996017ms ago: executing program 4 (id=159): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='vm_unmapped_area\x00', r1}, 0x10) io_setup(0x3, &(0x7f0000000340)) 72.854498ms ago: executing program 4 (id=160): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0xfff, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r1}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r6, 0x0, 0x8000f28, 0x0) splice(r5, 0x0, r2, 0x0, 0x7f, 0x0) write(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r2) syz_mount_image$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 0s ago: executing program 2 (id=161): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x141842, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) getpid() bpf$PROG_LOAD(0x5, 0x0, 0x0) inotify_init1(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) epoll_create1(0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = eventfd(0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000080)={0x1, 0x7f}) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000240)=r2) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000040)={0x1, r2}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/53, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, &(0x7f0000000380)=""/247, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=""/74}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000680)={0x1, 0x0, [{0x0, 0xfffffeac, &(0x7f00000001c0)=""/115}]}) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000000)=0x1) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000380)={0x0, 0x1fffe000000}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000001900)={0x2, {0x2, 0x0, 0x0, 0x101}}) kernel console output (not intermixed with test programs): [ 23.468327][ T24] audit: type=1400 audit(1719267065.640:62): avc: denied { noatsecure } for pid=271 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.471560][ T24] audit: type=1400 audit(1719267065.640:63): avc: denied { write } for pid=271 comm="sh" path="pipe:[13383]" dev="pipefs" ino=13383 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 23.475406][ T24] audit: type=1400 audit(1719267065.640:64): avc: denied { rlimitinh } for pid=271 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.479056][ T24] audit: type=1400 audit(1719267065.640:65): avc: denied { siginh } for pid=271 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.44' (ED25519) to the list of known hosts. [ 29.619935][ T24] audit: type=1400 audit(1719267071.800:66): avc: denied { mounton } for pid=283 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 29.621194][ T283] cgroup: Unknown subsys name 'net' [ 29.642521][ T24] audit: type=1400 audit(1719267071.800:67): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.669406][ T24] audit: type=1400 audit(1719267071.830:68): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.669531][ T283] cgroup: Unknown subsys name 'devices' [ 29.839264][ T283] cgroup: Unknown subsys name 'hugetlb' [ 29.844666][ T283] cgroup: Unknown subsys name 'rlimit' [ 30.037422][ T24] audit: type=1400 audit(1719267072.210:69): avc: denied { setattr } for pid=283 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.060494][ T24] audit: type=1400 audit(1719267072.220:70): avc: denied { mounton } for pid=283 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 30.085065][ T24] audit: type=1400 audit(1719267072.220:71): avc: denied { mount } for pid=283 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 30.091668][ T285] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 30.116723][ T24] audit: type=1400 audit(1719267072.290:72): avc: denied { relabelto } for pid=285 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 30.142014][ T24] audit: type=1400 audit(1719267072.290:73): avc: denied { write } for pid=285 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 30.176973][ T24] audit: type=1400 audit(1719267072.350:74): avc: denied { read } for pid=283 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 30.202274][ T24] audit: type=1400 audit(1719267072.350:75): avc: denied { open } for pid=283 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 30.228160][ T283] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 30.809240][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.816082][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.824081][ T292] device bridge_slave_0 entered promiscuous mode [ 30.830858][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.837703][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.844889][ T292] device bridge_slave_1 entered promiscuous mode [ 30.896126][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.903200][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.910453][ T294] device bridge_slave_0 entered promiscuous mode [ 30.918738][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.925654][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.932906][ T294] device bridge_slave_1 entered promiscuous mode [ 30.954978][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.961843][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.969048][ T291] device bridge_slave_0 entered promiscuous mode [ 30.990158][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.996981][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.004187][ T291] device bridge_slave_1 entered promiscuous mode [ 31.048083][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.054916][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.062234][ T293] device bridge_slave_0 entered promiscuous mode [ 31.080004][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.086954][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.094193][ T295] device bridge_slave_0 entered promiscuous mode [ 31.100833][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.107836][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.114947][ T295] device bridge_slave_1 entered promiscuous mode [ 31.125571][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.132428][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.139705][ T293] device bridge_slave_1 entered promiscuous mode [ 31.182808][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.189770][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.196931][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.203744][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.261246][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.268099][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.275180][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.282005][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.301336][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.308182][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.315253][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.322106][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.350068][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.358874][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.366923][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.374000][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.381656][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.388827][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.396553][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 31.403842][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.429683][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.437418][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.477731][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.485008][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.493208][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.502400][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.510368][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.517186][ T297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.524471][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.532422][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.539264][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.546389][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.554070][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.570876][ T291] device veth0_vlan entered promiscuous mode [ 31.578963][ T292] device veth0_vlan entered promiscuous mode [ 31.589856][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.597586][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.605682][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.613962][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.621386][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.628785][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.644475][ T291] device veth1_macvtap entered promiscuous mode [ 31.654549][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.663219][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.670502][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.677727][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.685613][ T53] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.692386][ T53] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.699506][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.707308][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.714082][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.721252][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.735683][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.743691][ T53] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.750540][ T53] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.758716][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.766415][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 31.775059][ T292] device veth1_macvtap entered promiscuous mode [ 31.798625][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.807043][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.814963][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.822852][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.829633][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.837197][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.845369][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.853432][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.860271][ T297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.867557][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.875445][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.882217][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.889556][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.897245][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.906286][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 31.913776][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.921978][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.947856][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.955606][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.964030][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.972106][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.979878][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.987973][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.995963][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.004086][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.012224][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.020176][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.028403][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.036021][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.044239][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.051503][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.064145][ T295] device veth0_vlan entered promiscuous mode [ 32.072879][ T294] device veth0_vlan entered promiscuous mode [ 32.078951][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 32.087049][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.095395][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.103723][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.111590][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.118944][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.132335][ T291] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 32.133187][ T295] device veth1_macvtap entered promiscuous mode [ 32.158953][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.166858][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.176129][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.194410][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.208604][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.216662][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.224958][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.242947][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.251164][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.278603][ T294] device veth1_macvtap entered promiscuous mode [ 32.291408][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.301103][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 32.309546][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.319803][ T293] device veth0_vlan entered promiscuous mode [ 32.327768][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.336679][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.354312][ T293] device veth1_macvtap entered promiscuous mode [ 32.371476][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.378934][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.386389][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.395145][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.403862][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.412074][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.420442][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.428128][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.436229][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.461874][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.467519][ T297] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 32.470121][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.488004][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.496557][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.536468][ T333] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 33.050104][ T297] usb 4-1: Using ep0 maxpacket: 32 [ 33.197547][ T297] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 33.217438][ T297] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 33.227007][ T297] usb 4-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 33.263028][ T297] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 33.568913][ T297] usb 4-1: config 0 descriptor?? [ 33.609567][ T297] hub 4-1:0.0: USB hub found [ 33.662568][ T361] F2FS-fs (loop0): invalid crc value [ 33.681450][ T361] F2FS-fs (loop0): Found nat_bits in checkpoint [ 33.724638][ T361] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5 [ 33.887572][ T297] hub 4-1:0.0: 1 port detected [ 33.911893][ T294] attempt to access beyond end of device [ 33.911893][ T294] loop0: rw=2049, want=45104, limit=40427 [ 34.053324][ T403] overlayfs: statfs failed on './file0' [ 34.717481][ T297] hub 4-1:0.0: activate --> -90 [ 34.796313][ T425] F2FS-fs (loop0): invalid crc value [ 34.803594][ T24] kauditd_printk_skb: 75 callbacks suppressed [ 34.803604][ T24] audit: type=1400 audit(1719267076.980:151): avc: denied { bind } for pid=429 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.830064][ T425] F2FS-fs (loop0): Found nat_bits in checkpoint [ 34.839395][ T431] tipc: Failed to remove local publication {66,1,1}/1405172924 [ 34.847167][ T431] tipc: Failed to remove local publication {66,1,1}/1405172924 [ 34.854896][ T431] tipc: Failed to remove local publication {66,1,1}/1405172924 [ 34.898255][ T425] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5 [ 34.958663][ T294] attempt to access beyond end of device [ 34.958663][ T294] loop0: rw=2049, want=45104, limit=40427 [ 35.143517][ T447] syz.4.49 (pid 447) is setting deprecated v1 encryption policy; recommend upgrading to v2. [ 35.186984][ T447] fscrypt: AES-256-CTS-CBC using implementation "cts(cbc-aes-aesni)" [ 35.197040][ T447] fscrypt: key with description 'fscrypt:0000111122223333' is too short (got 57 bytes, need 64+ bytes) [ 35.223207][ T447] overlayfs: upper fs does not support tmpfile. [ 35.236125][ T447] fscrypt: key with description 'fscrypt:0000111122223333' is too short (got 57 bytes, need 64+ bytes) [ 35.287560][ T15] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 35.319329][ T24] audit: type=1400 audit(1719267077.500:152): avc: denied { write } for pid=463 comm="syz.0.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 35.437872][ T464] ====================================================== [ 35.437872][ T464] WARNING: the mand mount option is being deprecated and [ 35.437872][ T464] will be removed in v5.15! [ 35.437872][ T464] ====================================================== [ 35.437987][ T24] audit: type=1400 audit(1719267077.620:153): avc: denied { mounton } for pid=463 comm="syz.0.54" path="/root/syzkaller.JLF1Ku/13/file1" dev="sda1" ino=1977 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 [ 35.497437][ T20] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 35.509599][ T24] audit: type=1400 audit(1719267077.670:154): avc: denied { setopt } for pid=468 comm="syz.2.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 35.536239][ T464] EXT4-fs (loop0): Ignoring removed bh option [ 35.558780][ T464] EXT4-fs error (device loop0): ext4_ext_check_inode:500: inode #11: comm syz.0.54: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 32512(32512) [ 35.589441][ T464] EXT4-fs error (device loop0): ext4_orphan_get:1396: comm syz.0.54: couldn't read orphan inode 11 (err -117) [ 35.611476][ T464] EXT4-fs (loop0): mounted filesystem without journal. Opts: sysvgroups,acl,auto_da_alloc,nojournal_checksum,journal_dev=0x0000000000000004,grpjquota=,auto_da_alloc=0x0000000000000040,bh,,errors=continue [ 35.631355][ T15] usb 2-1: Using ep0 maxpacket: 8 [ 35.747525][ T20] usb 5-1: Using ep0 maxpacket: 32 [ 35.755424][ T24] audit: type=1400 audit(1719267077.930:155): avc: denied { listen } for pid=473 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.774644][ T15] usb 2-1: config 135 has an invalid interface number: 230 but max is 0 [ 35.782890][ T15] usb 2-1: config 135 has an invalid descriptor of length 0, skipping remainder of the config [ 35.792935][ T15] usb 2-1: config 135 has no interface number 0 [ 35.799690][ T15] usb 2-1: config 135 interface 230 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 3 [ 35.802224][ T24] audit: type=1400 audit(1719267077.930:156): avc: denied { accept } for pid=473 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.870756][ T471] F2FS-fs (loop2): invalid crc value [ 35.879979][ T471] F2FS-fs (loop2): Found nat_bits in checkpoint [ 35.915935][ T24] audit: type=1326 audit(1719267078.090:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=479 comm="syz.0.60" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4b3bdd39 code=0x7ffc0000 [ 35.939051][ T24] audit: type=1326 audit(1719267078.090:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=479 comm="syz.0.60" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5b4b3bdd39 code=0x7ffc0000 [ 35.962867][ T24] audit: type=1326 audit(1719267078.090:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=479 comm="syz.0.60" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b4b3bdd39 code=0x7ffc0000 [ 35.986105][ T24] audit: type=1326 audit(1719267078.120:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=479 comm="syz.0.60" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5b4b3bdd39 code=0x7ffc0000 [ 36.009710][ T15] usb 2-1: New USB device found, idVendor=18ec, idProduct=3288, bcdDevice=3f.3a [ 36.018777][ T15] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 36.020783][ T471] F2FS-fs (loop2): Mounted with checkpoint version = 48b305e5 [ 36.026665][ T15] usb 2-1: Product: syz [ 36.037525][ T20] usb 5-1: New USB device found, idVendor=1557, idProduct=8150, bcdDevice=29.ed [ 36.038562][ T15] usb 2-1: Manufacturer: syz [ 36.051360][ T15] usb 2-1: SerialNumber: syz [ 36.058836][ T20] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 36.074227][ T20] usb 5-1: Product: syz [ 36.081654][ T20] usb 5-1: Manufacturer: syz [ 36.086465][ T20] usb 5-1: SerialNumber: syz [ 36.096283][ T295] attempt to access beyond end of device [ 36.096283][ T295] loop2: rw=2049, want=45104, limit=40427 [ 36.108784][ T15] uvcvideo: Found UVC 0.00 device syz (18ec:3288) [ 36.116421][ T15] uvcvideo: No valid video chain found. [ 36.162256][ T297] hub 4-1:0.0: hub_ext_port_status failed (err = -32) [ 36.171155][ T20] usb 5-1: config 0 descriptor?? [ 36.425837][ T296] usb 2-1: USB disconnect, device number 2 [ 36.817700][ T327] usb 4-1: USB disconnect, device number 2 [ 36.867507][ T20] (unnamed net_device) (uninitialized): Assigned a random MAC address: 16:72:e1:f2:7a:8f [ 36.879082][ T20] rtl8150 5-1:0.0: eth1: rtl8150 is detected [ 36.885609][ T20] usb 5-1: USB disconnect, device number 2 [ 37.030914][ T508] overlayfs: failed to create directory ./file0/work (errno: 126); mounting read-only [ 37.464146][ T530] device vlan2 entered promiscuous mode [ 37.469627][ T530] device vlan0 entered promiscuous mode [ 37.529245][ T530] device vlan0 left promiscuous mode [ 37.772822][ T540] IPv4: Oversized IP packet from 127.202.26.0 [ 37.822941][ T545] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 37.829273][ T558] fuse: Unknown parameter '0xffffffffffffffff000000000000000000031844674407370955161501777777777777777777777ÿÿÿÿ' [ 37.847256][ T545] ext4 filesystem being mounted at /root/syzkaller.JLF1Ku/28/file1 supports timestamps until 2038 (0x7fffffff) [ 37.863571][ T545] 9pnet: Insufficient options for proto=fd [ 37.870770][ T545] overlayfs: missing 'lowerdir' [ 38.049012][ T563] overlayfs: failed to create directory ./file0/work (errno: 126); mounting read-only [ 38.222470][ T15] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 38.271085][ T569] fscrypt: key with description 'fscrypt:0000111122223333' is too short (got 57 bytes, need 64+ bytes) [ 38.282451][ T569] overlayfs: upper fs does not support tmpfile. [ 38.289021][ T569] fscrypt: key with description 'fscrypt:0000111122223333' is too short (got 57 bytes, need 64+ bytes) [ 38.497543][ T15] usb 3-1: Using ep0 maxpacket: 8 [ 38.577485][ T53] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 38.617504][ T15] usb 3-1: config 135 has an invalid interface number: 230 but max is 0 [ 38.625895][ T15] usb 3-1: config 135 has an invalid descriptor of length 0, skipping remainder of the config [ 38.636002][ T15] usb 3-1: config 135 has no interface number 0 [ 38.642034][ T15] usb 3-1: config 135 interface 230 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 3 [ 38.741245][ T580] IPv4: Oversized IP packet from 127.202.26.0 [ 38.747335][ T580] IPv4: Oversized IP packet from 127.202.26.0 [ 38.817494][ T15] usb 3-1: New USB device found, idVendor=18ec, idProduct=3288, bcdDevice=3f.3a [ 38.827442][ T53] usb 2-1: Using ep0 maxpacket: 32 [ 38.852481][ T15] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 38.871264][ T15] usb 3-1: Product: syz [ 38.875244][ T15] usb 3-1: Manufacturer: syz [ 38.881989][ T15] usb 3-1: SerialNumber: syz [ 38.928240][ T15] uvcvideo: Found UVC 0.00 device syz (18ec:3288) [ 38.944065][ T15] uvcvideo: No valid video chain found. [ 39.004949][ T600] fuse: Unknown parameter '0xffffffffffffffff000000000000000000031844674407370955161501777777777777777777777ÿÿÿÿ' [ 39.095929][ T602] overlayfs: failed to create directory ./file0/work (errno: 126); mounting read-only [ 39.139136][ T593] F2FS-fs (loop0): invalid crc value [ 39.266096][ T15] usb 3-1: USB disconnect, device number 2 [ 39.276860][ T593] F2FS-fs (loop0): Found nat_bits in checkpoint [ 39.313663][ T593] F2FS-fs (loop0): Mounted with checkpoint version = 48b305e5 [ 39.337045][ T294] attempt to access beyond end of device [ 39.337045][ T294] loop0: rw=2049, want=45104, limit=40427 [ 39.357826][ T53] usb 2-1: New USB device found, idVendor=1557, idProduct=8150, bcdDevice=29.ed [ 39.366652][ T53] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 39.374514][ T53] usb 2-1: Product: syz [ 39.380215][ T53] usb 2-1: Manufacturer: syz [ 39.384618][ T53] usb 2-1: SerialNumber: syz [ 39.397669][ T53] usb 2-1: config 0 descriptor?? [ 39.671243][ T620] EXT4-fs (loop0): #blocks per group too big: 65536 [ 39.945733][ T24] kauditd_printk_skb: 34 callbacks suppressed [ 39.945744][ T24] audit: type=1400 audit(1719267082.120:195): avc: denied { create } for pid=645 comm="syz.4.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 39.977672][ T24] audit: type=1400 audit(1719267082.150:196): avc: denied { setopt } for pid=645 comm="syz.4.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 40.003151][ T24] audit: type=1400 audit(1719267082.150:197): avc: denied { shutdown } for pid=645 comm="syz.4.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 40.087580][ T53] (unnamed net_device) (uninitialized): Assigned a random MAC address: 9e:80:38:d6:20:49 [ 40.108341][ T655] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 40.116081][ T53] rtl8150 2-1:0.0: eth1: rtl8150 is detected [ 40.117946][ T655] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 40.134573][ T53] usb 2-1: USB disconnect, device number 3 [ 41.007696][ T24] audit: type=1400 audit(1719267082.520:198): avc: denied { create } for pid=651 comm="syz.2.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 41.013148][ T296] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 41.041037][ T655] EXT4-fs (loop4): warning: checktime reached, running e2fsck is recommended [ 41.053113][ T655] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 41.061790][ T24] audit: type=1400 audit(1719267083.250:199): avc: denied { write } for pid=666 comm="syz.2.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 41.064472][ T655] System zones: 0-2, 18-18, 34-34 [ 41.087667][ T655] EXT4-fs warning (device loop4): ext4_update_dynamic_rev:1047: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 41.102934][ T655] EXT4-fs (loop4): 1 truncate cleaned up [ 41.108773][ T655] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 41.157286][ T293] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 3: comm syz-executor: path /root/syzkaller.PuBf8y/23/file1: bad entry in directory: inode out of bounds - offset=0, inode=63, rec_len=12, size=4096 fake=1 [ 41.297441][ T296] usb 4-1: Using ep0 maxpacket: 16 [ 41.366948][ T683] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.379407][ T683] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.386586][ T683] device bridge_slave_0 entered promiscuous mode [ 41.395476][ T683] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.402530][ T683] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.409763][ T683] device bridge_slave_1 entered promiscuous mode [ 41.423857][ T24] audit: type=1400 audit(1719267083.600:200): avc: denied { mount } for pid=691 comm="syz.0.143" name="/" dev="loop0" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 41.465781][ T24] audit: type=1400 audit(1719267083.640:201): avc: denied { create } for pid=683 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.475540][ T683] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.486585][ T24] audit: type=1400 audit(1719267083.640:202): avc: denied { unmount } for pid=294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 41.492870][ T683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.492945][ T683] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.513076][ T24] audit: type=1400 audit(1719267083.640:203): avc: denied { write } for pid=683 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.519433][ T683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.545878][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.546782][ T24] audit: type=1400 audit(1719267083.640:204): avc: denied { read } for pid=683 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 41.589259][ T314] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.617503][ T296] usb 4-1: New USB device found, idVendor=23a7, idProduct=fedc, bcdDevice=e0.0b [ 41.619924][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.633358][ T296] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 41.641556][ T296] usb 4-1: Product: syz [ 41.645543][ T296] usb 4-1: Manufacturer: syz [ 41.650508][ T296] usb 4-1: SerialNumber: syz [ 41.661591][ T296] usb 4-1: config 0 descriptor?? [ 41.678672][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.686805][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.693667][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.702439][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.768993][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.775847][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.783073][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.796128][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.806408][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.827184][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.835314][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.138134][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 42.163547][ T683] device veth0_vlan entered promiscuous mode [ 42.195512][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.207341][ T683] device veth1_macvtap entered promiscuous mode [ 42.220495][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 42.228557][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.237751][ T296] usb 4-1: MIDIStreaming interface descriptor not found [ 42.240096][ T725] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 42.250669][ T296] usb 4-1: USB disconnect, device number 3 [ 42.264726][ T725] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 42.275445][ T725] EXT4-fs (loop2): warning: checktime reached, running e2fsck is recommended [ 42.284342][ T725] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 42.292310][ T725] System zones: 0-2, 18-18, 34-34 [ 42.297885][ T725] EXT4-fs warning (device loop2): ext4_update_dynamic_rev:1047: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 42.299726][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 42.312900][ T725] EXT4-fs (loop2): 1 truncate cleaned up [ 42.325659][ T725] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 42.326233][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.355170][ T295] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 3: comm syz-executor: path /root/syzkaller.Bs8uzm/30/file1: bad entry in directory: inode out of bounds - offset=0, inode=63, rec_len=12, size=4096 fake=1 [ 42.420274][ T110] device bridge_slave_1 left promiscuous mode [ 42.429052][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.436536][ T110] device bridge_slave_0 left promiscuous mode [ 42.442943][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.450780][ T110] device veth1_macvtap left promiscuous mode [ 42.456657][ T110] device veth0_vlan left promiscuous mode SYZFAIL: proc resp pipe read failed n=-1 (errno 11: Resource temporarily unavailable)