last executing test programs: 2.336600952s ago: executing program 4: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="12010000000000106d049cc200000000000109022400010000000009040000010300000009210000000122050009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000001440)={0x24, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x4, "d7487795"}]}}, 0x0}, 0x0) 2.160311579s ago: executing program 3: r0 = syz_usb_connect(0x0, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="1a0100005c6b4408070a64006e40010203030902240001a82300000904000002ca744d00090503034d00ff99090805", @ANYRES32], &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, &(0x7f0000000200)=""/128, 0x80) read$char_usb(r1, 0x0, 0x0) syz_usb_disconnect(r0) 2.009719592s ago: executing program 1: r0 = add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$packet(0x11, 0x2, 0x300) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x910912f7b142b1b6) mknod(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000002780)='./file0\x00', 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0xffff, 0x3}, 0x6) recvmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xd) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040), 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x2000}, 0x4) add_key$keyring(&(0x7f0000000280), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r0) 1.989381375s ago: executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x22}, 0x48) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0xe5, 0x4) listen(r0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = eventfd(0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000240)=r2) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000c00)={0x1, 0x0, [{0x0, 0xaf, &(0x7f00000007c0)=""/175}]}) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x1, r2}) socket$inet(0x2, 0xa, 0x5) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/53, 0x0}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000680)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000200)={r4}) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4040, 0x40) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f0000000300)=@v1={0x0, @aes128, 0x2, @desc4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000180)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000240)={r6, 0x1, r3, 0x6, 0x80000}) r7 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000340)=0x1c, 0x80800) r8 = accept4$inet6(r7, &(0x7f0000000500)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000540)=0x1c, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@private2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x40082102, &(0x7f0000000080)=r6) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000280)={r6}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="b40000004900d96d28bd7000fedbdf250a003800", @ANYRES32, @ANYBLOB="0100000014000100fcf8000000000000000000000000000014000100fe8000000000000000000000000000aa080002"], 0xb4}}, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 1.939033973s ago: executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x22}, 0x48) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0xe5, 0x4) listen(r0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = eventfd(0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000240)=r2) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000c00)={0x1, 0x0, [{0x0, 0xaf, &(0x7f00000007c0)=""/175}]}) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000005c0)={0x1, r2}) socket$inet(0x2, 0xa, 0x5) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/53, 0x0}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000680)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000200)={r4}) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x4040, 0x40) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f0000000300)=@v1={0x0, @aes128, 0x2, @desc4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000180)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000240)={r6, 0x1, r3, 0x6, 0x80000}) r7 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000340)=0x1c, 0x80800) r8 = accept4$inet6(r7, &(0x7f0000000500)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000540)=0x1c, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@private2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x40082102, &(0x7f0000000080)=r6) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000280)={r6}) socket$nl_route(0x10, 0x3, 0x0) 1.919441446s ago: executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) memfd_create(&(0x7f0000000780)='\x103q}2\x9a\xce\xaf\x03\xdfy[\xd9\xffR8\xf4\x1c\bi\xe4^\xd5\xfd\x11\xf5g\x05\xafM\x84p([\xa9\r\xac7A\x94\xa0\x00\x00\x00\x90+\xd6\x05\r\x84\x87\x1c\b\xdb\xe2\x00\x00A\x90m\xb6&\xd0\x9ds\xb2\x99/\xc0\x9a8\xfc:\xdf\xb3!\x9c,<\x00\x00\x00\x00\x00\r\x1b\xd3\xff<\x83z\x80\x8fQ|\xf5d\x10\x10\xd7\x01M\x7fML\x18\'\x1a<\xfee7{l\x16}\xa0I\x7f\xb5)l\xbb\x02\xfa\xb7\xb6\xa0]\xda8\xe0~\x1c \x91\t\x8b\xbd\x1f\xb3834d1i\x9b\x94\xa6\\\x0e\xfb\xfa\xe5!\xd3\xcf\xfc\xce\xba\xe2\x9f\x05xgL5\xb3\x1axi)<\xf7\x98\t\xba\xf4|\xe7|\xc4\xd7\x03\x00\x00\x00\x04D\x15E^7%8\x94y\x98\xf0l\xf7\xa0\'Q%\xd4\xda\xee\x81}\xcc\xfd\xa2\xc3\xcd~x\x96\xe3]\xd70\xa2\x17\xca\xde\x1b\xaa\xe0l\xfc\x85\x8fc\x1c{|e\x8bs\xb0\x85E\xce;p)\xf8\xa6\xaa&QC4V\x81\x04\xcf\xd2\x81\xdc\xdf\xd7<\x9f\x93\x8bX\xd4\xea\xb2\xff\b\x92\xc7\x00\xef\xff\x00\x93\x1f\x92\xa7dcY\x9c\x9e9O-\xfcF\xbb\xbd{:IR\xea\xd8$\xe2\xa0\xc2\x8b\x1a\xead\xb8\xe1:6\x04\x9c\xc2\x06|\xf0\x0f\xa6Y&r\x9b\xc5\x1d\xe7jDf\x87@\x8fg\x00\x10\x00\x00\x00\x00\x00\x00nu\xff`\xa40\xce\xffB%\xe4k\xff\x8d\x06\x0e\x89\xd9DC\x9fF\x9c[M=\xe0^\xa8\xed)\xe8Z\xe8\x99&\x87\x04\xa4\t\xaa\xd8\xd6\xd5pG\xcb\xc4\x8b\xf7\xb8#\xcb\xd8|\xa5\xa6S\x8b\x8cv\xb7)\x02k\xf3L\x03\xbb\xfa\xe1\\\xf1\x8cUj\xd5\xa5\x88GL\xe7g\xfex\xcd\xaa\xad\x906\xd0sy\xc6T\x93\xae\xd5r\xc8G\xc5\xfdS\xff\x04:`\x1e\xe3;l\xcd:K\x16i\xbc6}\xed\x02\x12\xb0\xa7\x8a\x00p\xa6\x12\x1b@\b4$\x00'/492, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000000c000000080003"], 0x34}}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_usb_connect$uac1(0x0, 0xa4, &(0x7f0000000040)=ANY=[@ANYBLOB="2a01000020000040b708000000000000030109029200030172e5000904000000010100000a24010000000201020c0d2407000005000000000000000c240000e9fffff5ffffffff092403f3ff000005024524", @ANYRES8=r0, @ANYBLOB="05"], 0x0) 1.818583881s ago: executing program 2: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000300)=ANY=[@ANYBLOB="1201000003005740ed0b0011c3ec000000010902120001000000000904"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f00000010c0)={0x84, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000100000005"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f00000006c0)={0x44, &(0x7f0000000100)=ANY=[@ANYBLOB="1f00020000009a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000600)={0x2c, &(0x7f0000000340)={0x0, 0x0, 0xf, "fb23382500b80253046fd0c913022e"}, 0x0, 0x0, 0x0, 0x0}) 1.10763022s ago: executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0xa4, 0x28, 0x87, 0x40, 0x46d, 0xa0e, 0x9475, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3}}]}}]}}, 0x0) syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) 436.478643ms ago: executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000200)='./file0\x00') ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)=@v1={0x0, @aes256, 0x0, @desc1}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 417.201436ms ago: executing program 4: socket(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/block/loop0', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$tty1(0xc, 0x4, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socket(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000ff0000000000004b64ffec1500000000000000270000000f00040095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x10002}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000080)=ANY=[@ANYRES16, @ANYRES32=r1, @ANYRES16=r0], 0x20}, 0x1, 0xc00000000000000}, 0x0) bind$bt_hci(r2, &(0x7f0000000100)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="4c00030007"], 0xd) 392.11598ms ago: executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x1008}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r2}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0, 0x9b, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x23, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='xen_mc_callback\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0xf, 0x2c}]}, &(0x7f0000000000)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000300)={[{@grpquota}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x84}}, {@resuid}, {@max_batch_time={'max_batch_time', 0x3d, 0x9}}, {@lazytime}, {@jqfmt_vfsold}, {@usrquota}, {@noload}]}, 0x1, 0x5e2, &(0x7f0000001200)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents64(r7, 0xfffffffffffffffe, 0x3c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000900)={'bridge0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000000), 0x4) close(0xffffffffffffffff) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0x0, 0x0, 0x0}, 0x90) 369.273043ms ago: executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000000000406c256d0000000000000109022400010000000009040000010300000009210000000122050009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000540)={0x2c, &(0x7f0000000200)={0x0, 0x0, 0x5, {0x5, 0x0, "a8c6df"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000002c0)={0x24, 0x0, &(0x7f0000000380)={0x0, 0x3, 0x2, @string={0x2}}, 0x0, 0x0}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_usb_control_io$hid(r0, &(0x7f00000003c0)={0x24, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4}}, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) syz_usb_control_io$hid(r0, &(0x7f0000000280)={0x24, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0003"], 0x0, 0x0}, 0x0) 157.516896ms ago: executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x2000040, &(0x7f00000007c0)={[{@errors_remount}, {@nodiscard}, {@noquota}, {@init_itable}, {@stripe={'stripe', 0x3d, 0x79}}, {@resgid}, {@sysvgroups}, {@delalloc}, {@usrquota}]}, 0x10, 0x4d2, &(0x7f00000002c0)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000005b00)) r2 = open(&(0x7f0000000000)='./bus\x00', 0x60342, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2007ffd) sendfile(r2, r3, 0x0, 0x1000000201005) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f00000001c0), 0x81, 0x79e, &(0x7f00000018c0)="$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") mount(&(0x7f0000000440)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x14113e, 0x0) write$binfmt_script(r4, &(0x7f0000000080), 0x208e24b) fallocate(r0, 0x3, 0x0, 0x1a00) 0s ago: executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000004c0)={'sit0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) kernel console output (not intermixed with test programs): sysadm_r:sysadm_t tclass=process permissive=1 [ 20.656932][ T23] audit: type=1400 audit(1718093165.270:62): avc: denied { noatsecure } for pid=335 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.662734][ T23] audit: type=1400 audit(1718093165.270:63): avc: denied { write } for pid=335 comm="sh" path="pipe:[10513]" dev="pipefs" ino=10513 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 20.669645][ T23] audit: type=1400 audit(1718093165.270:64): avc: denied { rlimitinh } for pid=335 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.681060][ T23] audit: type=1400 audit(1718093165.270:65): avc: denied { siginh } for pid=335 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 22.349938][ T336] sshd (336) used greatest stack depth: 21400 bytes left Warning: Permanently added '10.128.1.3' (ED25519) to the list of known hosts. 2024/06/11 08:06:12 fuzzer started 2024/06/11 08:06:13 dialing manager at 10.128.0.163:30000 [ 28.413977][ T23] audit: type=1400 audit(1718093173.020:66): avc: denied { node_bind } for pid=351 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 28.434290][ T23] audit: type=1400 audit(1718093173.020:67): avc: denied { name_bind } for pid=351 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 28.490351][ T23] audit: type=1400 audit(1718093173.100:68): avc: denied { mounton } for pid=364 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.517668][ T23] audit: type=1400 audit(1718093173.100:69): avc: denied { mount } for pid=364 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 28.518224][ T360] cgroup1: Unknown subsys name 'net' [ 28.541849][ T23] audit: type=1400 audit(1718093173.100:70): avc: denied { setattr } for pid=365 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=870 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.558209][ T360] cgroup1: Unknown subsys name 'net_prio' [ 28.568813][ T23] audit: type=1400 audit(1718093173.130:71): avc: denied { mounton } for pid=360 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.574578][ T360] cgroup1: Unknown subsys name 'devices' [ 28.596965][ T23] audit: type=1400 audit(1718093173.130:72): avc: denied { mount } for pid=360 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.609331][ T366] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.632957][ T23] audit: type=1400 audit(1718093173.240:73): avc: denied { unmount } for pid=360 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.652544][ T23] audit: type=1400 audit(1718093173.240:74): avc: denied { relabelto } for pid=366 comm="mkswap" name="swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.677836][ T23] audit: type=1400 audit(1718093173.240:75): avc: denied { write } for pid=366 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.729938][ T361] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.780602][ T360] cgroup1: Unknown subsys name 'hugetlb' [ 28.786252][ T360] cgroup1: Unknown subsys name 'rlimit' 2024/06/11 08:06:13 starting 5 executor processes [ 29.486596][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.493782][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.502021][ T378] device bridge_slave_0 entered promiscuous mode [ 29.510586][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.517437][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.524700][ T378] device bridge_slave_1 entered promiscuous mode [ 29.697526][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.704354][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.711917][ T385] device bridge_slave_0 entered promiscuous mode [ 29.718848][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.725666][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.733035][ T385] device bridge_slave_1 entered promiscuous mode [ 29.743425][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.750269][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.757697][ T379] device bridge_slave_0 entered promiscuous mode [ 29.767717][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.774536][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.781945][ T379] device bridge_slave_1 entered promiscuous mode [ 29.813528][ T383] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.820399][ T383] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.827650][ T383] device bridge_slave_0 entered promiscuous mode [ 29.858079][ T383] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.865059][ T383] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.872461][ T383] device bridge_slave_1 entered promiscuous mode [ 29.888783][ T386] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.895604][ T386] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.902976][ T386] device bridge_slave_0 entered promiscuous mode [ 29.937335][ T386] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.944167][ T386] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.951888][ T386] device bridge_slave_1 entered promiscuous mode [ 30.000952][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.007792][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.014986][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.021855][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.132392][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.139251][ T379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.146324][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.153135][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.173049][ T383] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.179898][ T383] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.186990][ T383] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.193786][ T383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.203193][ T385] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.210035][ T385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.217131][ T385] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.223928][ T385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.237750][ T386] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.244579][ T386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.251805][ T386] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.258567][ T386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.269951][ T124] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.277080][ T124] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.284708][ T124] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.291668][ T124] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.298854][ T124] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.305795][ T124] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.312726][ T124] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.319773][ T124] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.326707][ T124] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.333641][ T124] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.341287][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.348630][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.378397][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.386378][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.393223][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.400396][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.408586][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.415395][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.422742][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.430553][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.484835][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.492278][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.510753][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.518998][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.526959][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.533789][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.541325][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.548872][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.556086][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.564311][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.572320][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.579162][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.586535][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.595008][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.603082][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.609910][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.617120][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.624838][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.648465][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.656637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.665003][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.671858][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.680174][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.688468][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.696396][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.703228][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.710403][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.718776][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.726699][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.733528][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.740665][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.748715][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.756757][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.764581][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.789073][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.796967][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.804966][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.813678][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.821786][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.829723][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.847375][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.855278][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.864267][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.872969][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.902269][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.911403][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.920327][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.927634][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.934859][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.943164][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.951193][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.958024][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.965403][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.973853][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.982064][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 30.990316][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.998460][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.006334][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.028249][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.036443][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.044960][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.051897][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.060320][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.068399][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.076132][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.084138][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.091988][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.099914][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.138834][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.146912][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.155641][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.177431][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.185642][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.196091][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.204192][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.222061][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.230430][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.238841][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.246914][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.255548][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.267488][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.275367][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.304564][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.312832][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.339963][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.348169][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.356098][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.364332][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.372410][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.380533][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.388686][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.396773][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.404987][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.413326][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.421657][ T13] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 31.429405][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.461263][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.470862][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.479940][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.489200][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.508600][ T412] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) [ 31.577545][ T124] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 31.677337][ T13] usb 5-1: Using ep0 maxpacket: 16 [ 31.797493][ T13] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 31.808388][ T13] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 31.817349][ T416] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 31.818296][ T13] usb 5-1: New USB device found, idVendor=046d, idProduct=c29c, bcdDevice= 0.00 [ 31.825359][ T124] usb 4-1: Using ep0 maxpacket: 8 [ 31.834366][ T13] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 31.849797][ T13] usb 5-1: config 0 descriptor?? [ 31.917380][ T18] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 31.957437][ T124] usb 4-1: config 168 descriptor has 1 excess byte, ignoring [ 31.964660][ T124] usb 4-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 31.976181][ T124] usb 4-1: config 168 interface 0 altsetting 0 has an invalid endpoint with address 0xFF, skipping [ 32.057315][ T124] usb 4-1: config 168 descriptor has 1 excess byte, ignoring [ 32.064514][ T124] usb 4-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 32.075738][ T124] usb 4-1: config 168 interface 0 altsetting 0 has an invalid endpoint with address 0xFF, skipping [ 32.157369][ T124] usb 4-1: config 168 descriptor has 1 excess byte, ignoring [ 32.164576][ T124] usb 4-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 32.175747][ T124] usb 4-1: config 168 interface 0 altsetting 0 has an invalid endpoint with address 0xFF, skipping [ 32.212439][ T416] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 32.223057][ T416] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 32.297314][ T18] usb 3-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 32.306431][ T18] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 32.314229][ T416] usb 1-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 32.317092][ T13] logitech 0003:046D:C29C.0001: hidraw0: USB HID v0.00 Device [HID 046d:c29c] on usb-dummy_hcd.4-1/input0 [ 32.323997][ T416] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 32.342404][ T18] usb 3-1: config 0 descriptor?? [ 32.347332][ T416] usb 1-1: SerialNumber: syz [ 32.417449][ T124] usb 4-1: string descriptor 0 read error: -22 [ 32.423639][ T124] usb 4-1: New USB device found, idVendor=0a07, idProduct=0064, bcdDevice=40.6e [ 32.432599][ T124] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 32.528605][ T13] logitech 0003:046D:C29C.0001: no inputs found [ 32.537061][ T13] usb 5-1: USB disconnect, device number 2 [ 32.628083][ T416] usb 1-1: 0:2 : does not exist [ 32.635964][ T416] usb 1-1: USB disconnect, device number 2 [ 32.647290][ T401] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 32.676012][ T426] udevd[426]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 32.701542][ T124] usb 4-1: USB disconnect, device number 2 [ 33.007440][ T401] usb 2-1: New USB device found, idVendor=046d, idProduct=0a0e, bcdDevice=94.75 [ 33.016410][ T401] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 33.026692][ T431] syz-executor.4 (pid 431) is setting deprecated v1 encryption policy; recommend upgrading to v2. [ 33.033337][ T401] usb 2-1: config 0 descriptor?? [ 33.078755][ T401] usbhid 2-1:0.0: couldn't find an input interrupt endpoint [ 33.134246][ T435] EXT4-fs (loop4): Quota format mount options ignored when QUOTA feature is enabled [ 33.143626][ T435] EXT4-fs (loop4): Unsupported blocksize for fs encryption [ 33.244963][ T435] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.251993][ T435] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.261979][ T435] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.268868][ T435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.275952][ T435] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.281293][ T416] usb 2-1: USB disconnect, device number 2 [ 33.282922][ T435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.295801][ T435] device bridge0 entered promiscuous mode [ 33.339549][ T441] ====================================================== [ 33.339549][ T441] WARNING: the mand mount option is being deprecated and [ 33.339549][ T441] will be removed in v5.15! [ 33.339549][ T441] ====================================================== [ 33.389951][ T441] EXT4-fs (loop4): 1 orphan inode deleted [ 33.395486][ T441] EXT4-fs (loop4): mounted filesystem without journal. Opts: errors=remount-ro,nodiscard,noquota,init_itable,stripe=0x0000000000000079,resgid=0x0000000000000000,sysvgroups,delalloc,usrquota, [ 33.407285][ T401] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 33.415212][ T441] ext4 filesystem being mounted at /root/syzkaller-testdir3861907668/syzkaller.DZY1wo/4/file1 supports timestamps until 2038 (0x7fffffff) [ 33.421541][ T23] kauditd_printk_skb: 41 callbacks suppressed [ 33.421552][ T23] audit: type=1400 audit(1718093178.020:117): avc: denied { mount } for pid=440 comm="syz-executor.4" name="/" dev="loop4" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 33.461198][ T448] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 33.464808][ T23] audit: type=1400 audit(1718093178.050:118): avc: denied { write } for pid=440 comm="syz-executor.4" name="/" dev="loop4" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 33.501622][ T23] audit: type=1400 audit(1718093178.050:119): avc: denied { add_name } for pid=440 comm="syz-executor.4" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 33.520437][ T441] ------------[ cut here ]------------ [ 33.522987][ T23] audit: type=1400 audit(1718093178.050:120): avc: denied { create } for pid=440 comm="syz-executor.4" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 33.527370][ T441] kernel BUG at fs/ext4/ext4.h:2984! [ 33.548082][ T441] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 33.552782][ T23] audit: type=1400 audit(1718093178.050:121): avc: denied { write open } for pid=440 comm="syz-executor.4" path="/root/syzkaller-testdir3861907668/syzkaller.DZY1wo/4/file1/bus" dev="loop4" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 2024/06/11 08:06:18 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 33.558445][ T441] CPU: 1 PID: 441 Comm: syz-executor.4 Not tainted 5.4.274-syzkaller-00016-gdd432c37afcd #0 [ 33.558450][ T441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 33.558475][ T441] RIP: 0010:ext4_mb_load_buddy_gfp+0xf29/0xf40 [ 33.558491][ T441] Code: ff e8 ab af c9 ff e9 0a f3 ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 52 f3 ff ff e8 b1 af c9 ff e9 48 f3 ff ff e8 57 ca 99 ff <0f> 0b e8 50 ca 99 ff 0f 0b e8 49 ca 99 ff 0f 0b e8 42 ca 99 ff 0f [ 33.587401][ T23] audit: type=1400 audit(1718093178.050:122): avc: denied { read } for pid=440 comm="syz-executor.4" name="bus" dev="loop4" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 33.595501][ T441] RSP: 0018:ffff8881ecaafbc8 EFLAGS: 00010287 [ 33.595510][ T441] RAX: ffffffff81ca71c9 RBX: 0000000000000001 RCX: 0000000000040000 [ 33.595516][ T441] RDX: ffffc90000540000 RSI: 00000000000006d6 RDI: 00000000000006d7 [ 33.595524][ T441] RBP: ffff8881eca5e000 R08: ffffffff81ca6372 R09: ffffed103b2a8e31 [ 33.595530][ T441] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff1103d94b87e [ 33.595537][ T441] R13: dffffc0000000000 R14: 000000001f337701 R15: ffff8881eca5c3f0 [ 33.595545][ T441] FS: 00007f0f273126c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 33.595551][ T441] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.595557][ T441] CR2: 0000001b33032000 CR3: 00000001ecda3000 CR4: 00000000003426a0 [ 33.595565][ T441] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 33.595570][ T441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 33.595572][ T441] Call Trace: [ 33.595588][ T441] ? __die+0xb4/0x100 [ 33.595603][ T441] ? die+0x26/0x50 [ 33.746538][ T441] ? do_trap+0x1e7/0x340 [ 33.750610][ T441] ? ext4_mb_load_buddy_gfp+0xf29/0xf40 [ 33.755988][ T441] ? ext4_mb_load_buddy_gfp+0xf29/0xf40 [ 33.761383][ T441] ? do_invalid_op+0xfb/0x110 [ 33.765884][ T441] ? ext4_mb_load_buddy_gfp+0xf29/0xf40 [ 33.771267][ T441] ? invalid_op+0x1e/0x30 [ 33.775432][ T441] ? ext4_mb_load_buddy_gfp+0xd2/0xf40 [ 33.780725][ T441] ? ext4_mb_load_buddy_gfp+0xf29/0xf40 [ 33.786108][ T441] ? ext4_mb_load_buddy_gfp+0xf29/0xf40 [ 33.791489][ T441] ? ext4_mb_load_buddy_gfp+0xf29/0xf40 [ 33.796870][ T441] ? ext4_get_group_number+0xad/0x190 [ 33.802082][ T441] ext4_discard_preallocations+0x603/0xb90 [ 33.807729][ T441] ? ext4_exit_mballoc+0xf0/0xf0 [ 33.812496][ T441] ? ext4_zero_partial_blocks+0x1e0/0x220 [ 33.818050][ T441] ext4_punch_hole+0x5f0/0xad0 [ 33.822655][ T441] ext4_fallocate+0x265/0x570 [ 33.827260][ T441] vfs_fallocate+0x551/0x6b0 [ 33.831705][ T441] __x64_sys_fallocate+0xb9/0x100 [ 33.836552][ T441] do_syscall_64+0xca/0x1c0 [ 33.840885][ T441] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 33.846659][ T441] RIP: 0033:0x7f0f27f97f69 [ 33.850864][ T441] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 33.870302][ T441] RSP: 002b:00007f0f273120c8 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 33.878551][ T441] RAX: ffffffffffffffda RBX: 00007f0f280cef80 RCX: 00007f0f27f97f69 [ 33.886357][ T441] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 33.894179][ T441] RBP: 00007f0f27ff56fe R08: 0000000000000000 R09: 0000000000000000 [ 33.901984][ T441] R10: 0000000000001a00 R11: 0000000000000246 R12: 0000000000000000 [ 33.909795][ T441] R13: 000000000000000b R14: 00007f0f280cef80 R15: 00007ffc72829888 [ 33.917606][ T441] Modules linked in: [ 33.945053][ T23] audit: type=1400 audit(1718093178.050:123): avc: denied { setattr } for pid=440 comm="syz-executor.4" path="/root/syzkaller-testdir3861907668/syzkaller.DZY1wo/4/file1/bus" dev="loop4" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 33.956043][ T441] ---[ end trace 244e4552f56a0181 ]--- [ 33.997978][ T441] RIP: 0010:ext4_mb_load_buddy_gfp+0xf29/0xf40 [ 34.003943][ T441] Code: ff e8 ab af c9 ff e9 0a f3 ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 52 f3 ff ff e8 b1 af c9 ff e9 48 f3 ff ff e8 57 ca 99 ff <0f> 0b e8 50 ca 99 ff 0f 0b e8 49 ca 99 ff 0f 0b e8 42 ca 99 ff 0f [ 34.007261][ T23] audit: type=1400 audit(1718093178.060:124): avc: denied { ioctl } for pid=447 comm="syz-executor.3" path="/dev/kvm" dev="devtmpfs" ino=101 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 34.067242][ T441] RSP: 0018:ffff8881ecaafbc8 EFLAGS: 00010287 [ 34.073137][ T441] RAX: ffffffff81ca71c9 RBX: 0000000000000001 RCX: 0000000000040000 [ 34.082158][ T386] syz-executor.0 (386) used greatest stack depth: 20760 bytes left [ 34.087398][ T23] audit: type=1400 audit(1718093178.120:125): avc: denied { mounton } for pid=440 comm="syz-executor.4" path="/root/syzkaller-testdir3861907668/syzkaller.DZY1wo/4/file1/bus" dev="loop4" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 34.117341][ T441] RDX: ffffc90000540000 RSI: 00000000000006d6 RDI: 00000000000006d7 [ 34.125139][ T441] RBP: ffff8881eca5e000 R08: ffffffff81ca6372 R09: ffffed103b2a8e31 [ 34.133158][ T401] usb 1-1: device descriptor read/all, error -71 [ 34.139341][ T441] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff1103d94b87e [ 34.147380][ T441] R13: dffffc0000000000 R14: 000000001f337701 R15: ffff8881eca5c3f0 [ 34.155183][ T441] FS: 00007f0f273126c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 34.163981][ T441] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 34.170488][ T441] CR2: 00007f0f280d0988 CR3: 00000001ecda3000 CR4: 00000000003426b0 [ 34.178310][ T441] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 34.186084][ T441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 34.186385][ T379] syz-executor.1 (379) used greatest stack depth: 20600 bytes left [ 34.193930][ T441] Kernel panic - not syncing: Fatal exception [ 34.194183][ T441] Kernel Offset: disabled [ 34.211934][ T441] Rebooting in 86400 seconds..