last executing test programs: 9.513675817s ago: executing program 1 (id=2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x0, @empty}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @empty}, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x18, 0x3f9, 0x20, 0x70bd25, 0x25dfdbfd, {0x1, 0x1}, ["", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x800}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}, @ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r2}, 0xc) 9.404395637s ago: executing program 1 (id=7): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x2048c5, &(0x7f0000000b00)={[{@fat=@flush}, {@shortname_winnt}, {@rodir}, {@fat=@nfs_nostale_ro}, {@uni_xlate}, {@uni_xlateno}, {@fat=@showexec}, {@fat=@nfs_stale_rw}, {@fat=@debug}, {@shortname_mixed}, {@fat=@quiet}, {@utf8no}]}, 0x0, 0x29f, &(0x7f0000000580)="$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") r0 = syz_open_procfs(0x0, &(0x7f0000000540)='mounts\x00') mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000500)='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1333404, 0x0) mount$bind(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x11080, 0x0) mount$bind(&(0x7f0000000240)='.\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1005848, 0x0) read$FUSE(r0, &(0x7f0000002c00)={0x2020}, 0x2020) 8.388456287s ago: executing program 1 (id=12): r0 = syz_usb_connect(0x0, 0x6b, &(0x7f0000000240)=ANY=[@ANYBLOB="1201000385352608f20446b76e8e01020301090259000104e900"], &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$lan78xx(r0, &(0x7f00000022c0)={0x14, 0x0, &(0x7f0000002200)={0x0, 0x3, 0xae, @string={0xae, 0x3, "7af0a5371b23c82e0f09cbddd6f28ec64f5e2818a150c8bb4aa7a696c1e8340000fe965c72ac08a0cab5bbfe690c5b497ff971214fc623875b85d16c34b92a320413b886b159625219a41960842ef2f21ab3692bda9dade10afbf89ac7174c75c8ef0d9035f0cdd379e1f16a23ec85bb53f3873fa63d5f6a3e55536a3a34e583ed196ab0e6d1b1acdb91cd2aa1b899d9b28431f63b98574b16ee62fc40fa22798918dde99f74b148316606da"}}}, 0x0) 8.238228681s ago: executing program 1 (id=14): syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000600)='ns/mnt\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/cgroup\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000780)='ns/cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 8.205176384s ago: executing program 32 (id=14): syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000600)='ns/mnt\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/cgroup\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000780)='ns/cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 6.396035473s ago: executing program 3 (id=23): syz_mount_image$ext4(&(0x7f0000000900)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f0000000240)={[{@nouid32}, {@nodioread_nolock}, {@noquota}, {@jqfmt_vfsv1}, {@journal_dev={'journal_dev', 0x3d, 0x9}}, {@commit}]}, 0x1, 0x5a3, &(0x7f00000002c0)="$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") ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl2\x00', &(0x7f0000000280)={'sit0\x00', 0x0, 0x8b, 0x8, 0x7f, 0x3, {{0xf, 0x4, 0x2, 0x10, 0x3c, 0x67, 0x0, 0x6, 0x2f, 0x0, @local, @remote, {[@timestamp={0x44, 0x8, 0x19, 0x0, 0x2, [0xbfb8]}, @ra={0x94, 0x4, 0x1}, @end, @timestamp_addr={0x44, 0x14, 0xd6, 0x1, 0xf, [{@dev={0xac, 0x14, 0x14, 0x41}, 0x7}, {@broadcast, 0xe}]}, @timestamp_addr={0x44, 0x4, 0xcd, 0x1, 0x6}]}}}}}) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x207, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendto$packet(r0, &(0x7f00000002c0)="05031600d3fc140000004788031c09102c28", 0xfce0, 0x4, &(0x7f0000000140)={0x11, 0x86dd, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) 6.395881483s ago: executing program 4 (id=24): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[], 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) memfd_create(&(0x7f0000000300)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac\x06\x9c&\xf5\xe3j\xfa\tcqM\xb8R\x86\xd9\xd2.\x9f\x12\xed\x10\f\xbd\x1a|\x8a\xbb\xda\xcfY\x98gU@\xf2M\xc0\xb5\xdf\x9a\x8d\xdb,n\xae\x0eT\x80\x8c\xfd\xd7\xb0\x94\x82t\x96\rKx\xc5\x9b\x8c\x87\x96\x8bc\xbc\xee\xcc\x9f\xe3F\x99V4\x8e;M\xa9\x823\xe3\xb3mG\x8f\xdb\xed\x1b\x05\xec\xfc\xd1\xb5\xfd\xec@\xdeU\xdd\xa4\xc1\xe4L)\x8e\xe5\x91\x8e\xd4\x89\xef\x95T\x05G\xac\xb8\xc1: )mh\xc7\xf1?\xbb\x13;\xad\x95\xd70\xb6\x0e\x7f\x84r\x0e\xbf\xc5\xf6\xd4\xdd\t\x14\x18\xf7\xefi\x93\x03\xd2\xf2\bK\"\xd2\xb5\xaa\xb8\xc8\xe0\xac\x99\xe8su\xcd\xc3E\x12\xd7\xdd\x96!\x16Tu\xe3\xf0\x84#R\xd9\xe3~Wj\xb0r\x87\'\xea\a\xcfOeK\x9daW\xf4\x87@\x9c\xf3\xf1K\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x91\xe6\xdb\xc2\xa5h\'\xdfIn\x97\x0263~\xeb\xbe(i\n\xc2k4\x7f\x12\xa9e`SOs\x8c\xb4\xe7FeQ\xc6$\x92j_U\xfa\b\xea\xb0bYkW\xc0\x05\aC{\xcc\x03T\x17\xa5Sk\x87P\xc2\x97D\xb2\xfa\x1b\x9fe\xf4\x10\x1a\xad\x92\xce\x88\x1b\xbc\xe14\x19\xaa\xd3\r\xf4\xa2\xc3\x9e=\xa0 \xe6j\xe5\x85\xf8\x97\x03\x15\xaa\x920\xdcrI\xd8\b\xfb\xc7\xe7xX\x00>d\xbb\xa71\xad\x9a\xfb\xe6\x13\x87\x93\\\xe5W-\xfc\xfd\xb8O\xb9j\xb8\xf2\x9dx\xb2\x86\xad\x92', 0x3) sendmmsg$inet6(r0, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="82", 0x1}, {&(0x7f0000000140)="11", 0x1}], 0x2}}], 0x1, 0x4404c880) sendto$inet6(r0, &(0x7f0000000300), 0x16, 0x3b00, 0x0, 0xfffffffffffffdfd) 6.289032713s ago: executing program 4 (id=25): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x82000100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r1, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) read$FUSE(r3, 0x0, 0x0) r4 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x40, 0x4d9, 0xa055, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, {0x9, 0x21, 0x1000, 0x1, 0x1, {0x22, 0x7}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0xd, 0x3}}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r4, 0x0, 0x0) syz_usb_control_io$hid(r4, &(0x7f00000000c0)={0x24, 0x0, 0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000000000), 0x4) 5.576027776s ago: executing program 3 (id=26): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000440)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}, {@grpquota}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@errors_remount}, {@errors_continue}, {@nogrpid}]}, 0x3, 0x448, &(0x7f0000000780)="$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") ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x3000490, &(0x7f00000002c0), 0x45, 0x7bc, &(0x7f0000000300)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x280000b, 0x28011, r0, 0x0) unshare(0x2040400) 5.169113882s ago: executing program 3 (id=27): syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f00000000c0), 0x2, 0xbc6, &(0x7f00000027c0)="$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") r0 = open(&(0x7f0000000000)='./file1\x00', 0x8000, 0x50) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x8004587d, &(0x7f0000000080)={@desc={0x1, 0x0, @auto="62ed992ee70e419c"}}) quotactl$Q_SETINFO(0xffffffff80000601, &(0x7f00000001c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000002780)={0x1ff, 0x7f, 0x0, 0x1}) mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) 4.900234266s ago: executing program 3 (id=30): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x7ff}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000000104010400000000398f0000000000000500010001"], 0x1c}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)={0x1c, 0x1, 0x4, 0x3, 0x0, 0x0, {0xa}, [@NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x200c8016}, 0x94) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xb4e02000) r2 = syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r2, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000003c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000000c0)=0x20007, 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20000010, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f0000000000)='-\f-]\xa7}\\+(\x00', &(0x7f0000000240), 0x0) fcntl$setflags(r5, 0x2, 0x1) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x900, 0x4064}, [@IFLA_GROUP={0x8}, @IFLA_OPERSTATE={0x5, 0x10, 0x4}]}, 0x30}}, 0x0) sendmsg$nl_route(r6, 0x0, 0x20004882) 4.054801241s ago: executing program 3 (id=32): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="12013f00000000407f04ffff00000000000109022d000100000000090400001503000000092140000001220f00090581", @ANYRES8], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_connect(0x2, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x73, 0x9e, 0x61, 0x8, 0xfd9, 0x2c, 0x66b, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x7, 0xd4, 0x40, 0x0, [{{0x9, 0x4, 0x65, 0x0, 0x0, 0xbe, 0x86, 0x6d, 0x1}}]}}]}}, 0x0) syz_usb_control_io(r0, &(0x7f0000000b00)={0x2c, &(0x7f0000000040)=ANY=[@ANYBLOB="00000f00000009003d140f3c369197d09647190890"], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000080), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0x501c4814, &(0x7f0000000000)={0x2, 0x100, 0x0, 0x8, 0x0, 0xfffffffc}) 3.548866446s ago: executing program 4 (id=35): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581d7"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000840)={0x24, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00220f000000540b4550182195f51584b3"], 0x0}, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000580)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x20, 0x1, 0x1e, "ed4c7a33eec14d3207dd441ca228804116201dcbd7b0c412cd2087c33af7"}, 0x0}) syz_open_dev$hiddev(&(0x7f0000000540), 0x0, 0x0) r1 = syz_open_dev$hiddev(&(0x7f00000000c0), 0x0, 0x0) ioctl$HIDIOCGUSAGES(r1, 0xd01c4813, 0x0) 1.718821238s ago: executing program 2 (id=57): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0xd0f, 0x3, 0x0, {0x60, 0x0, 0x0, r1, {0x0, 0x3}, {0xffff, 0xffff}, {0x4}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}, @TCA_STAB={0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x1d4}, 0x8840) 1.718491188s ago: executing program 2 (id=58): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000340)='./file1\x00', 0x200000, &(0x7f00000005c0)={[{@block_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@norecovery}]}, 0x3, 0x566, &(0x7f00000015c0)="$eJzs3V9rW+UfAPDvSdv9//3WwRjqhRR24WQuXVv/TBA2L0WHA72foc3KaLqMJh1rHWy7cDfeyBBEHIgvwHsvh2/AVyHoYMgoeuFN5aQnW9YkTZtlNvN8PnC25znnpN/z5DnPk+/JSUgAuTWR/lOIeDkivkoiDrdsG41s48TGfmuPbsymSxLr65/8kUSSrWvun2T/H8wqL0XEz19EnCy0x62trC6UKpXyUlafrC9enaytrJ66vFiaL8+Xr0zPzJx5a2b63XfeHlhbX7/w17cf3//gzJfH17758cGRu0mci0PZttZ2PINbrZWJmMiek7E4t2nHqQEEGyZJrx06nAPsvpFsnI9FOgccjpFs1AP/fTcjYh3IqcT4h5xq5gHNa/sBXQe/MB6+v3EB1N7+0Y33RmJf49rowFry1JVRer07PoD4aYyffr93N12ix/sQNwcQD6Dp1u2IOD062j7/Jdn817/T23jXb3OMvL3+wG66n+Y/b3TKfwqP85/okP8c7DB2+9F7/BceDCBMV2n+917H/Pfx1DU+ktX+18j5xpJLlyvl0xHx/4g4EWN703q/93Na8790SeM3c8HsOB6M7n36MXOleqnPcG0e3o545Un+m0Tb/L+vketu7v/0+biwzRjHyvde7batd/tbDT4DXv8h4rWO/f/kjlay9f3Jycb5MNk8K9r9eefYL93i76z9g5f2/4Gt2z+etN6vre08xvf7/i5329bv+b8n+bRR3pOtu16q15emIvYkH7Wvn37y2Ga9uX/a/hPHt57/Op3/+yPis222/87R7mnQMPT/3I76f+eFXz/8/Ltu8bfX/282SieyNduZ/7Z7gM/y3AEAAAAAAMCwKUTEoUgKxcflQqFY3Ph8x9E4UKhUa/WTl6rLV+ai8V3Z8RgrNO90H275PMRU9nnYZn16U30mIo5ExNcj+xv14my1MrfbjQcAAAAAAAAAAAAAAAAAAIAhcbDL9/9Tv43s9tEBz52f/Ib86jn+B/FLT8BQ8voP+WX8Q34Z/5Bfxj/kl/EP+WX8Q34Z/5Bfxj8AAAAAAAAAAAAAAAAAAAAAAAAAAAAM1IXz59Nlfe3Rjdm0PndtZXmheu3UXLm2UFxcni3OVpeuFuer1flKuThbXez19yrV6tWp6Vi+Plkv1+qTtZXVi4vV5Sv1i5cXS/Pli+Wxf6VVAAAAAAAAAAAAAAAAAAAA8GKprawulCqV8pJC18LZGIrD6LuQ9Orls9nJ0FeI0d1voMJzKOzyxAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALf4JAAD//5CPL9Y=") mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) lremovexattr(&(0x7f0000000a40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000180)=@known='user.syz\x00') 1.538227434s ago: executing program 2 (id=59): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000680)={0x18, 0x2, 0x9, 0x801, 0x0, 0x0, {0xa}, [@NFCTH_TUPLE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x2400c050}, 0x40800) 1.522601305s ago: executing program 2 (id=62): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000d4e97f49b5b754baebaea54b76", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xb, 0x5, 0x3fd, 0x9, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f00000001c0), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r3, r1, 0x25, 0x0, @void}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) socket(0x400000000010, 0x3, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000240)=ANY=[], 0x0) 1.35954641s ago: executing program 2 (id=69): move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x80000100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x600, 0x0, 0x33, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r1, 0x0, 0x0) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x400000bce) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000000ac0)=""/102392, 0x18ff8) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x1, 0x3}, 0x4) 1.073199215s ago: executing program 2 (id=72): r0 = syz_usb_connect(0x0, 0x1cb, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000122f0d4071040403dfe4000000010902b901010000003f0904"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$rtl8150(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$sierra_net(r0, 0x0, 0x0) syz_usb_control_io$rtl8150(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$lan78xx(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$rtl8150(r0, 0x0, 0x0) syz_usb_control_io$lan78xx(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000c00)={0x44, &(0x7f0000000980)={0x40, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 737.944595ms ago: executing program 5 (id=79): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x42000, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000002c0)=0xfffffffe) ioctl$PPPIOCSMAXCID(r0, 0x40047451, 0x0) poll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x8}, {r0, 0x220}], 0x2, 0x8) 726.541676ms ago: executing program 5 (id=80): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./bus\x00', 0x2000884, &(0x7f0000000600)={[{@shortname_winnt}, {@iocharset={'iocharset', 0x3d, 'cp850'}}, {@shortname_win95}, {@shortname_mixed}, {@fat=@sys_immutable}, {@numtail}, {@shortname_winnt}, {@shortname_win95}, {@fat=@check_normal}, {@fat=@codepage={'codepage', 0x3d, '950'}}, {@numtail}, {@numtail}, {@rodir}, {@uni_xlateno}, {@utf8no}, {@utf8no}]}, 0x1, 0x289, &(0x7f00000001c0)="$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") r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x101000, 0x108) getdents64(r0, &(0x7f0000000f80)=""/4096, 0x1000) 702.802557ms ago: executing program 3 (id=81): socket$packet(0x11, 0x2, 0x300) socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x4) socket$nl_route(0x10, 0x3, 0x0) openat$binfmt_register(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4048aec9, &(0x7f0000000080)={0x1, 0x0, @ioapic={0x4, 0x1, 0x3, 0x2, 0x0, [{0xf, 0x0, 0x0, '\x00', 0xe}, {0x5, 0x0, 0x0, '\x00', 0xfc}, {0x1, 0x1, 0x7, '\x00', 0x3}, {0xfa, 0x8, 0x1, '\x00', 0xa0}, {0x1, 0x9}, {0xa, 0x3, 0x5}, {0xb8, 0xda, 0xd, '\x00', 0x59}, {0xb, 0x1, 0xc, '\x00', 0x3}, {0x9, 0x7, 0x81, '\x00', 0x9}, {0x4, 0x6, 0x4, '\x00', 0x9}, {0x7, 0x5, 0xd, '\x00', 0xa}, {0x0, 0x4b, 0x45, '\x00', 0xc2}, {0x8, 0xab, 0x8, '\x00', 0x3}, {0x1, 0x3, 0xfe, '\x00', 0x81}, {0x5, 0xfb, 0x1, '\x00', 0x2}, {0xfe, 0x4, 0x6, '\x00', 0x9}, {0xc2, 0x9, 0x7, '\x00', 0x4}, {0x4, 0x7, 0x4, '\x00', 0x9}, {0xab, 0xef, 0x40, '\x00', 0x6}, {0x8, 0x10, 0x80, '\x00', 0x10}, {0x3, 0x3, 0x2, '\x00', 0x86}, {0x9, 0xb, 0xa, '\x00', 0x8}, {0x86, 0x0, 0x5, '\x00', 0x9}, {0x56, 0x3, 0x4, '\x00', 0x7f}]}}) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89101) syz_usb_connect$uac1(0x3, 0xa4, &(0x7f0000000200)=ANY=[@ANYBLOB="2a01000020000040b708000000000000030109029200030172e5000904000000010100000a24010000000201020c0d2406000005000000000000000c240000e9fffff5ffffffff092403f3ff000005024524", @ANYRES8=r2, @ANYBLOB="05", @ANYRES16=r2], 0x0) 628.826284ms ago: executing program 5 (id=82): move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x80000100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x600, 0x0, 0x33, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r1, 0x0, 0x0) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x400000bce) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000000ac0)=""/102392, 0x18ff8) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x1, 0x3}, 0x4) 338.72355ms ago: executing program 5 (id=84): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40428d0}, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}}, 0x0, 0x0, 0x4e, 0x0, "e83ae75240c2d658ec87bb53679fd0000078548ceb6c4414fab0919616e19aecedec1b76aea5922406b64cddaeb9d339ba3c01c2c7b8df8e61740b9af2d4d58654a4af0fa0ce1f830cc1eaf991fd00"}, 0xd8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={@private2={0xfc, 0x2, '\x00', 0x1}, @empty, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80000, 0x6, 0x0, 0x0, 0x6, 0x900066}) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendto$packet(r0, &(0x7f00000002c0)="14042bfdd3fc03fc01004788031c09100628", 0xfd35, 0x4, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) syz_mount_image$erofs(&(0x7f0000000180), &(0x7f0000000c40)='./file1\x00', 0x810410, &(0x7f00000059c0)=ANY=[], 0x5, 0x1e5, &(0x7f00000001c0)="$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") 337.97277ms ago: executing program 4 (id=85): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040), 0x208e24b) fallocate(0xffffffffffffffff, 0x20, 0x0, 0xfeffffff000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) ftruncate(r0, 0xa75) 274.308396ms ago: executing program 0 (id=86): socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x8040, 0x0) unshare(0x24020400) r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000200)='.\x00', 0x44000160) r2 = dup(r0) inotify_rm_watch(r2, r1) 217.47492ms ago: executing program 0 (id=87): r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp6\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x6) read$FUSE(r0, &(0x7f00000045c0)={0x2020}, 0x2020) 209.771411ms ago: executing program 5 (id=88): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_X86_SET_MSR_FILTER(r1, 0x4104aec6, 0x0) 158.316386ms ago: executing program 0 (id=89): r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000180)={0x11, @loopback, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0xfffffffc}, 0x2c) 158.200196ms ago: executing program 0 (id=90): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a300000000070000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021340011800a0001006c696d6974000000240002800c00024000000000000000030c0001400000000000000101080004"], 0x100}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0) 158.127216ms ago: executing program 0 (id=91): syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000240), 0x1, 0x1b9, &(0x7f0000000280)="$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") 118.988719ms ago: executing program 0 (id=92): socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) close(0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x403, 0x6030, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) r0 = socket(0x14, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x6180, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0xc055}, 0x8010) 82.199692ms ago: executing program 4 (id=93): setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xfffffffffffffffb, 0x48b01) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000280)=@urb_type_control={0x2, {}, 0xfffffff8, 0x1, &(0x7f0000000000)={0x4b5a9da54893e123, 0x1, 0x2}, 0x8, 0x20400000, 0xe, 0x0, 0x0, 0x20000, 0x0}) 10.245069ms ago: executing program 5 (id=94): move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x80000100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f00000000c0)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x600, 0x0, 0x33, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r1, 0x0, 0x0) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x400000bce) syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x1, 0x3}, 0x4) 0s ago: executing program 4 (id=95): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x4f}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x404d3, 0x2b}, 0x0, @in=@empty}}, 0xe8) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020b000102"], 0x10}}, 0x4000000) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x0) close(r0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="b80000001300e9990000000000000000fc000000000000000100000000000000ac1e000100000000000000000000000000000000000000000a0060"], 0xb8}}, 0x20040014) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300000200000000fbdbdf257f000001000000000000000000000000fe8000000000000000000000100000aa00000004000000000a006080"], 0xb8}, 0x1, 0x0, 0x0, 0x80}, 0x50) sendmsg$nl_xfrm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000020000000000fc0000000000"], 0xb8}, 0x1, 0x0, 0x0, 0x80c0}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="b80000001300e9990500000000000000fc000000000000000000000000000000fc00000000000000000000000000000000000000000000000a0030"], 0xb8}}, 0x4000) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.41' (ED25519) to the list of known hosts. [ 18.586122][ T24] audit: type=1400 audit(1771392269.680:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 18.587091][ T267] cgroup: Unknown subsys name 'net' [ 18.589988][ T24] audit: type=1400 audit(1771392269.680:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.594084][ T24] audit: type=1400 audit(1771392269.690:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.594249][ T267] cgroup: Unknown subsys name 'devices' [ 18.800553][ T267] cgroup: Unknown subsys name 'hugetlb' [ 18.806150][ T267] cgroup: Unknown subsys name 'rlimit' [ 19.002141][ T24] audit: type=1400 audit(1771392270.100:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.013552][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 19.025295][ T24] audit: type=1400 audit(1771392270.100:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.058489][ T24] audit: type=1400 audit(1771392270.100:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.081691][ T24] audit: type=1400 audit(1771392270.140:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.081700][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.115764][ T24] audit: type=1400 audit(1771392270.140:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.141320][ T24] audit: type=1400 audit(1771392270.160:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.166773][ T24] audit: type=1400 audit(1771392270.160:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.541529][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.548568][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.556027][ T275] device bridge_slave_0 entered promiscuous mode [ 19.562891][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.569921][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.577225][ T275] device bridge_slave_1 entered promiscuous mode [ 19.690069][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.697102][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.704442][ T279] device bridge_slave_0 entered promiscuous mode [ 19.713249][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.720399][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.727597][ T279] device bridge_slave_1 entered promiscuous mode [ 19.736287][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.743315][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.750609][ T276] device bridge_slave_0 entered promiscuous mode [ 19.772096][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.779109][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.786374][ T276] device bridge_slave_1 entered promiscuous mode [ 19.802194][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.809259][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.816544][ T278] device bridge_slave_0 entered promiscuous mode [ 19.825466][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.832562][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.839835][ T278] device bridge_slave_1 entered promiscuous mode [ 19.872078][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.879097][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.886431][ T277] device bridge_slave_0 entered promiscuous mode [ 19.893554][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.900602][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.907796][ T277] device bridge_slave_1 entered promiscuous mode [ 19.948223][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.955267][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.962519][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.969528][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.047204][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.054243][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.061479][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.068474][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.079336][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.086351][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.093589][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.100602][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.115594][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.122624][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.129864][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.136865][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.148471][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.155499][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.162741][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.169748][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.188973][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.197298][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.205879][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.214156][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.222062][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.229134][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.236229][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.244057][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.251240][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.258313][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.265448][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.272554][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.280738][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.289223][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.296561][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.321854][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.329734][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.352069][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.359626][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.367824][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.375259][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.383628][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.390649][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.418604][ T277] device veth0_vlan entered promiscuous mode [ 20.425430][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.433637][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.442271][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.450198][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.457485][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.465046][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.473157][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.480162][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.487429][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.495562][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.502717][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.510153][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.517958][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.525936][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.534070][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.541080][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.548497][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.556633][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.563651][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.570919][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.578954][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.585969][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.593243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.602912][ T275] device veth0_vlan entered promiscuous mode [ 20.609468][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.617253][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.630804][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.638202][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.645658][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.654413][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.666850][ T277] device veth1_macvtap entered promiscuous mode [ 20.677162][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.685255][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.693570][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.701547][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.709537][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.717337][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.725575][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.736548][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.744868][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.754348][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.762452][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.774017][ T279] device veth0_vlan entered promiscuous mode [ 20.781943][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.790465][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.798720][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.806707][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.814658][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.822963][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.831292][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.838671][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.851240][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.859528][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.872566][ T279] device veth1_macvtap entered promiscuous mode [ 20.880473][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.888630][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.896872][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.904654][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.912745][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.921652][ T276] device veth0_vlan entered promiscuous mode [ 20.928100][ T277] request_module fs-gadgetfs succeeded, but still no fs? [ 20.933313][ T276] device veth1_macvtap entered promiscuous mode [ 20.947696][ T278] device veth0_vlan entered promiscuous mode [ 20.954174][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.961838][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.969272][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.977260][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.985527][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.993143][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.001522][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.009783][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.017847][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.026139][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.034334][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.042648][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.050425][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.058245][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.065686][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.073390][ T275] device veth1_macvtap entered promiscuous mode [ 21.085402][ T277] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 21.104569][ T278] device veth1_macvtap entered promiscuous mode [ 21.120436][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.128172][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.137134][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.138338][ T300] SELinux: failed to load policy [ 21.145328][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.157876][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.166509][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.174943][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.183236][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.192524][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.193090][ T302] erofs: (device loop0): mounted with root inode @ nid 36. [ 21.201181][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.220110][ T42] erofs: (device loop0): z_erofs_lz4_decompress_mem: failed to decompress 4876 in[4096, 0] out[9000] [ 21.224007][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.248276][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.248677][ T302] erofs: (device loop0): z_erofs_lz4_decompress_mem: failed to decompress 4876 in[4096, 0] out[8192] [ 21.286646][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.297308][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.324199][ T302] erofs: (device loop0): z_erofs_lz4_decompress_mem: failed to decompress 4876 in[4096, 0] out[8192] [ 21.325272][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.352651][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.361260][ T302] erofs: (device loop0): z_erofs_lz4_decompress_mem: failed to decompress 4876 in[4096, 0] out[8192] [ 21.426358][ T310] netlink: 44 bytes leftover after parsing attributes in process `syz.4.5'. [ 21.431937][ T302] erofs: (device loop0): z_erofs_lz4_decompress_mem: failed to decompress 4876 in[4096, 0] out[8192] [ 21.452785][ T307] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 21.466180][ T302] erofs: (device loop0): z_erofs_lz4_decompress_mem: failed to decompress 4876 in[4096, 0] out[8192] [ 21.469645][ T307] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 21.501749][ T320] binder: 313:320 ioctl c018620c 200000000240 returned -1 [ 21.539705][ T302] erofs: (device loop0): z_erofs_lz4_decompress_mem: failed to decompress 4876 in[4096, 0] out[8192] [ 21.549660][ T307] EXT4-fs warning (device loop3): ext4_expand_extra_isize_ea:2797: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 21.564254][ T307] EXT4-fs (loop3): 1 truncate cleaned up [ 21.570069][ T307] EXT4-fs (loop3): mounted filesystem without journal. Opts: journal_ioprio=0x0000000000000001,auto_da_alloc=0x0000000000000001,debug_want_extra_isize=0x0000000000000068,lazytime,nombcache,inode_readahead_blks=0x0000000004000000,noquota,,errors=continue [ 21.665273][ T318] ====================================================== [ 21.665273][ T318] WARNING: the mand mount option is being deprecated and [ 21.665273][ T318] will be removed in v5.15! [ 21.665273][ T318] ====================================================== [ 21.782197][ T322] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 21.792382][ T322] ext4 filesystem being mounted at /1/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 23.246488][ T344] netlink: 'syz.2.13': attribute type 4 has an invalid length. [ 23.254117][ T344] netlink: 17 bytes leftover after parsing attributes in process `syz.2.13'. [ 23.430370][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.477237][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.485226][ T347] device bridge_slave_0 entered promiscuous mode [ 23.492251][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.499316][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.506649][ T347] device bridge_slave_1 entered promiscuous mode [ 23.541589][ T359] netlink: 24 bytes leftover after parsing attributes in process `syz.4.17'. [ 23.929088][ T24] kauditd_printk_skb: 63 callbacks suppressed [ 23.929100][ T24] audit: type=1400 audit(1771392274.770:137): avc: denied { connect } for pid=352 comm="syz.2.19" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 24.558514][ T24] audit: type=1400 audit(1771392274.770:138): avc: denied { write } for pid=352 comm="syz.2.19" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 24.744818][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.753127][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.868264][ T372] EXT4-fs (loop3): mounted filesystem without journal. Opts: nouid32,nodioread_nolock,noquota,jqfmt=vfsv1,journal_dev=0x0000000000000009,commit=0x0000000000000000,,errors=continue [ 25.121882][ T24] audit: type=1400 audit(1771392275.070:139): avc: denied { setopt } for pid=362 comm="syz.4.20" lport=136 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 25.147139][ T372] ext4 filesystem being mounted at /2/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 25.169224][ T24] audit: type=1400 audit(1771392275.070:140): avc: denied { map_create } for pid=364 comm="syz.2.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 25.194511][ T24] audit: type=1400 audit(1771392275.520:141): avc: denied { create } for pid=347 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.215347][ T311] device bridge_slave_1 left promiscuous mode [ 25.224157][ T24] audit: type=1400 audit(1771392275.520:142): avc: denied { write } for pid=347 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.234934][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.248214][ T24] audit: type=1400 audit(1771392275.520:143): avc: denied { read } for pid=347 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.272154][ T24] audit: type=1400 audit(1771392275.530:144): avc: denied { create } for pid=367 comm="syz.2.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 25.273017][ T311] device bridge_slave_0 left promiscuous mode [ 25.299480][ T24] audit: type=1400 audit(1771392275.530:145): avc: denied { write } for pid=367 comm="syz.2.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 25.319163][ T24] audit: type=1400 audit(1771392275.840:146): avc: denied { read write } for pid=374 comm="syz.4.25" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.319323][ T296] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 25.351796][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.362690][ T311] device veth1_macvtap left promiscuous mode [ 25.368850][ T311] device veth0_vlan left promiscuous mode [ 25.490671][ T389] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 25.525002][ T389] EXT4-fs error (device loop3): ext4_xattr_inode_iget:401: inode #2: comm syz.3.26: missing EA_INODE flag [ 25.549665][ T389] EXT4-fs error (device loop3): ext4_xattr_inode_iget:406: comm syz.3.26: error while reading EA inode 2 err=-117 [ 25.562402][ T389] EXT4-fs (loop3): 1 truncate cleaned up [ 25.568041][ T389] EXT4-fs (loop3): mounted filesystem without journal. Opts: journal_ioprio=0x0000000000000005,grpquota,debug_want_extra_isize=0x0000000000000068,errors=remount-ro,errors=continue,nogrpid, [ 25.626505][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.635136][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.643620][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.650666][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.658260][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.666775][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.674988][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.682022][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.689379][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 25.706756][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.716896][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.725244][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.734549][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.747983][ T347] device veth0_vlan entered promiscuous mode [ 25.755133][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.763493][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.771747][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.789712][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.798372][ T396] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 25.803045][ T347] device veth1_macvtap entered promiscuous mode [ 25.816840][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.824540][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.829226][ T396] EXT4-fs (loop3): shut down requested (1) [ 25.831923][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.839327][ T296] usb 5-1: New USB device found, idVendor=04d9, idProduct=a055, bcdDevice= 0.00 [ 25.845968][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.867233][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.871131][ T296] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 25.876164][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.884909][ T396] EXT4-fs (loop3): re-mounted. Opts: (null) [ 25.890773][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.909835][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.921280][ T296] usb 5-1: config 0 descriptor?? [ 25.927121][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.965211][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 25.973408][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 26.461253][ T414] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.470786][ T414] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.699374][ T296] usbhid 5-1:0.0: can't add hid device: -71 [ 26.706354][ T296] usbhid: probe of 5-1:0.0 failed with error -71 [ 26.800145][ T296] usb 5-1: USB disconnect, device number 2 [ 27.447550][ T426] exFAT-fs (loop2): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 27.500675][ T426] exFAT-fs (loop2): Medium has reported failures. Some data may be lost. [ 27.552008][ T426] exFAT-fs (loop2): failed to load upcase table (idx : 0x00010000, chksum : 0xe62de5da, utbl_chksum : 0xe619d30d) [ 27.772203][ T433] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 27.781200][ T433] ext4 filesystem being mounted at /8/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 27.810895][ T433] EXT4-fs (loop2): shut down requested (2) [ 27.849150][ T433] fscrypt (loop2, inode 12): Error -5 getting encryption context [ 27.930915][ T296] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 27.942730][ T440] exFAT-fs (loop5): failed to load upcase table (idx : 0x00011a39, chksum : 0xd7c18d7b, utbl_chksum : 0xe619d30d) [ 27.969897][ T440] exFAT-fs (loop5): failed to exfat_utf8_to_utf16 (estr:ENAMETOOLONG) nls len : 519, unilen : 257 > 255 [ 28.239307][ T5] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 28.370703][ T468] netlink: 20 bytes leftover after parsing attributes in process `syz.0.48'. [ 28.619310][ T5] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 28.630330][ T5] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 28.643541][ T5] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 28.656442][ T5] usb 5-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 28.665487][ T5] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 28.673997][ T5] usb 5-1: config 0 descriptor?? [ 28.679273][ T296] usb 4-1: config index 0 descriptor too short (expected 45, got 36) [ 28.687426][ T296] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 28.698457][ T296] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 28.708231][ T296] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 28.721154][ T296] usb 4-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 28.730333][ T296] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 28.738854][ T296] usb 4-1: config 0 descriptor?? [ 28.867348][ T476] EXT4-fs (loop2): Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 28.883961][ T476] EXT4-fs error (device loop2): ext4_free_branches:1026: inode #11: comm syz.2.51: invalid indirect mapped block 4294967295 (level 1) [ 28.897991][ T476] EXT4-fs (loop2): Remounting filesystem read-only [ 28.904607][ T476] EXT4-fs error (device loop2): ext4_free_branches:1026: inode #11: comm syz.2.51: invalid indirect mapped block 4294967295 (level 1) [ 28.918682][ T476] EXT4-fs (loop2): 2 truncates cleaned up [ 28.924772][ T476] EXT4-fs (loop2): mounted filesystem without journal. Opts: errors=remount-ro,init_itable=0x0000000000000005,dioread_nolock,auto_da_alloc=0x000000007fffffff, [ 28.959385][ T24] kauditd_printk_skb: 36 callbacks suppressed [ 28.959396][ T24] audit: type=1400 audit(2000000003.800:183): avc: denied { setattr } for pid=475 comm="syz.2.51" name="file1" dev="loop2" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 28.969354][ T476] EXT4-fs error (device loop2): ext4_validate_block_bitmap:429: comm syz.2.51: bg 0: block 5: invalid block bitmap [ 28.999840][ T476] EXT4-fs (loop2): Remounting filesystem read-only [ 29.006437][ T476] EXT4-fs error (device loop2) in ext4_evict_inode:258: Readonly filesystem [ 29.066903][ T482] netlink: 36 bytes leftover after parsing attributes in process `syz.2.53'. [ 29.104249][ T24] audit: type=1400 audit(2000000003.950:184): avc: denied { read write } for pid=489 comm="syz.5.56" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.127284][ T24] audit: type=1400 audit(2000000003.950:185): avc: denied { open } for pid=489 comm="syz.5.56" path="/dev/ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.150263][ T24] audit: type=1400 audit(2000000003.950:186): avc: denied { write } for pid=489 comm="syz.5.56" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 29.151865][ T493] EXT4-fs (loop2): Ignoring removed orlov option [ 29.181078][ T5] plantronics 0003:047F:FFFF.0001: No inputs registered, leaving [ 29.183755][ T493] EXT4-fs (loop2): mounted filesystem without journal. Opts: block_validity,bsddf,sysvgroups,norecovery,debug_want_extra_isize=0x0000000000000080,orlov,nogrpid,noauto_da_alloc,norecovery,,errors=continue [ 29.191213][ T5] plantronics 0003:047F:FFFF.0001: hiddev96,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.4-1/input0 [ 29.219556][ T429] udc-core: couldn't find an available UDC or it's busy [ 29.227820][ T429] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 29.260209][ T296] plantronics 0003:047F:FFFF.0002: unknown main item tag 0xd [ 29.278126][ T296] plantronics 0003:047F:FFFF.0002: No inputs registered, leaving [ 29.321669][ T296] plantronics 0003:047F:FFFF.0002: hiddev97,hidraw1: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.3-1/input0 [ 29.325898][ T24] audit: type=1400 audit(2000000004.170:187): avc: denied { map_read map_write } for pid=506 comm="syz.2.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 29.336016][ T508] netlink: 8 bytes leftover after parsing attributes in process `syz.0.63'. [ 29.353902][ T24] audit: type=1400 audit(2000000004.190:188): avc: denied { ioctl } for pid=505 comm="syz.0.63" path="socket:[15342]" dev="sockfs" ino=15342 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.418539][ T507] Illegal XDP return value 388345897, expect packet loss! [ 29.442935][ T24] audit: type=1400 audit(2000000004.290:189): avc: denied { create } for pid=514 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 29.495899][ T24] audit: type=1400 audit(2000000004.330:190): avc: denied { create } for pid=522 comm="syz.0.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 29.517874][ T24] audit: type=1400 audit(2000000004.360:191): avc: denied { create } for pid=524 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 29.537494][ T24] audit: type=1400 audit(2000000004.360:192): avc: denied { setopt } for pid=524 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 29.602026][ T296] usb 4-1: USB disconnect, device number 2 [ 29.861174][ T384] usb 5-1: USB disconnect, device number 3 [ 30.109299][ T54] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 30.173644][ T551] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 30.459211][ T296] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 30.518904][ T560] erofs: (device loop5): mounted with root inode @ nid 36. [ 30.529263][ T54] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 30.555279][ T54] usb 3-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 30.569213][ T54] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 30.600651][ T54] usb 3-1: config 0 descriptor?? [ 30.764835][ T581] usb usb1: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 30.833668][ T585] ================================================================== [ 30.841765][ T585] BUG: KASAN: slab-out-of-bounds in xfrm_policy_inexact_list_reinsert+0x606/0x6c0 [ 30.850935][ T585] Read of size 1 at addr ffff88811856bbd8 by task syz.4.95/585 [ 30.858440][ T585] [ 30.860748][ T585] CPU: 0 PID: 585 Comm: syz.4.95 Not tainted syzkaller #0 [ 30.867819][ T585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 30.869357][ T296] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 30.877852][ T585] Call Trace: [ 30.887911][ T296] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 30.891162][ T585] __dump_stack+0x21/0x24 [ 30.891172][ T585] dump_stack_lvl+0x1a7/0x208 [ 30.891184][ T585] ? show_regs_print_info+0x18/0x18 [ 30.891194][ T585] ? thaw_kernel_threads+0x220/0x220 [ 30.891208][ T585] ? unwind_get_return_address+0x4d/0x90 [ 30.891218][ T585] print_address_description+0x7f/0x2c0 [ 30.891229][ T585] ? xfrm_policy_inexact_list_reinsert+0x606/0x6c0 [ 30.891238][ T585] kasan_report+0xe2/0x130 [ 30.891255][ T585] ? xfrm_policy_inexact_list_reinsert+0x606/0x6c0 [ 30.947801][ T585] __asan_report_load1_noabort+0x14/0x20 [ 30.953403][ T585] xfrm_policy_inexact_list_reinsert+0x606/0x6c0 [ 30.959699][ T585] xfrm_policy_inexact_insert_node+0x938/0xb50 [ 30.965822][ T585] ? xfrm_netlink_rcv+0x72/0x90 [ 30.970646][ T585] ? netlink_unicast+0x876/0xa40 [ 30.975551][ T585] ? ____sys_sendmsg+0x5b7/0x8f0 [ 30.980469][ T585] ? do_syscall_64+0x31/0x40 [ 30.985038][ T585] xfrm_policy_inexact_alloc_chain+0x53d/0xb30 [ 30.991167][ T585] xfrm_policy_inexact_insert+0x70/0x1130 [ 30.996860][ T585] ? __kasan_check_write+0x14/0x20 [ 31.001943][ T585] ? _raw_spin_lock_bh+0x94/0xf0 [ 31.006852][ T585] ? policy_hash_bysel+0x13f/0x6f0 [ 31.011944][ T585] xfrm_policy_insert+0x126/0x9a0 [ 31.016939][ T585] ? xfrm_policy_construct+0x54f/0x1f00 [ 31.022455][ T585] xfrm_add_policy+0x4ed/0x850 [ 31.027191][ T585] ? xfrm_dump_sa_done+0xc0/0xc0 [ 31.032101][ T585] xfrm_user_rcv_msg+0x4d0/0x7b0 [ 31.037010][ T585] ? xfrm_netlink_rcv+0x90/0x90 [ 31.041836][ T585] ? do_syscall_64+0x31/0x40 [ 31.046409][ T585] ? selinux_nlmsg_lookup+0x219/0x4a0 [ 31.051769][ T585] netlink_rcv_skb+0x1f5/0x440 [ 31.056521][ T585] ? xfrm_netlink_rcv+0x90/0x90 [ 31.061347][ T585] ? netlink_ack+0xb70/0xb70 [ 31.065914][ T585] ? mutex_trylock+0xa0/0xa0 [ 31.070481][ T585] ? __netlink_lookup+0x387/0x3b0 [ 31.075479][ T585] xfrm_netlink_rcv+0x72/0x90 [ 31.080131][ T585] netlink_unicast+0x876/0xa40 [ 31.084868][ T585] netlink_sendmsg+0x89c/0xb50 [ 31.089608][ T585] ? __kasan_check_read+0x11/0x20 [ 31.094607][ T585] ? netlink_getsockopt+0x530/0x530 [ 31.099779][ T585] ? security_socket_sendmsg+0x82/0xa0 [ 31.105212][ T585] ? netlink_getsockopt+0x530/0x530 [ 31.110382][ T585] ____sys_sendmsg+0x5b7/0x8f0 [ 31.115117][ T585] ? __sys_sendmsg_sock+0x40/0x40 [ 31.120116][ T585] ? import_iovec+0x7c/0xb0 [ 31.124594][ T585] ___sys_sendmsg+0x236/0x2e0 [ 31.129244][ T585] ? slab_post_alloc_hook+0x7d/0x2f0 [ 31.134502][ T585] ? __sys_sendmsg+0x280/0x280 [ 31.139239][ T585] ? alloc_file+0x82/0x540 [ 31.143634][ T585] ? __fdget+0x1a1/0x230 [ 31.147848][ T585] __x64_sys_sendmsg+0x1f9/0x2c0 [ 31.152760][ T585] ? __kasan_check_write+0x14/0x20 [ 31.157844][ T585] ? ___sys_sendmsg+0x2e0/0x2e0 [ 31.162672][ T585] ? __kasan_check_read+0x11/0x20 [ 31.167673][ T585] ? exit_to_user_mode_prepare+0x9a/0xa0 [ 31.173277][ T585] do_syscall_64+0x31/0x40 [ 31.177671][ T585] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 31.183535][ T585] RIP: 0033:0x7f4b718aa629 [ 31.187926][ T585] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 31.207506][ T585] RSP: 002b:00007f4b70305028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 31.215896][ T585] RAX: ffffffffffffffda RBX: 00007f4b71b23fa0 RCX: 00007f4b718aa629 [ 31.223840][ T585] RDX: 0000000000004000 RSI: 0000200000000440 RDI: 0000000000000004 [ 31.231795][ T585] RBP: 00007f4b71940b39 R08: 0000000000000000 R09: 0000000000000000 [ 31.239743][ T585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 31.247690][ T585] R13: 00007f4b71b24038 R14: 00007f4b71b23fa0 R15: 00007fff42150818 [ 31.255639][ T585] [ 31.257945][ T585] Allocated by task 585: [ 31.262166][ T585] __kasan_kmalloc+0xda/0x110 [ 31.266815][ T585] __kmalloc+0x1a4/0x330 [ 31.271032][ T585] sk_prot_alloc+0xb2/0x340 [ 31.275507][ T585] sk_alloc+0x38/0x4e0 [ 31.279550][ T585] pfkey_create+0x12a/0x660 [ 31.284025][ T585] __sock_create+0x38d/0x770 [ 31.288594][ T585] __sys_socket+0xec/0x190 [ 31.292981][ T585] __x64_sys_socket+0x7a/0x90 [ 31.297631][ T585] do_syscall_64+0x31/0x40 [ 31.302026][ T585] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 31.307885][ T585] [ 31.310189][ T585] The buggy address belongs to the object at ffff88811856b800 [ 31.310189][ T585] which belongs to the cache kmalloc-1k of size 1024 [ 31.324210][ T585] The buggy address is located 984 bytes inside of [ 31.324210][ T585] 1024-byte region [ffff88811856b800, ffff88811856bc00) [ 31.337533][ T585] The buggy address belongs to the page: [ 31.343158][ T585] page:ffffea0004615a00 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118568 [ 31.353364][ T585] head:ffffea0004615a00 order:3 compound_mapcount:0 compound_pincount:0 [ 31.361663][ T585] flags: 0x4000000000010200(slab|head) [ 31.367097][ T585] raw: 4000000000010200 ffffea00044c1600 0000000500000005 ffff888100042f00 [ 31.375658][ T585] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 31.384207][ T585] page dumped because: kasan: bad access detected [ 31.390588][ T585] page_owner tracks the page as allocated [ 31.396283][ T585] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 99, ts 3990640063, free_ts 0 [ 31.414217][ T585] prep_new_page+0x179/0x180 [ 31.418779][ T585] get_page_from_freelist+0x223b/0x23d0 [ 31.424296][ T585] __alloc_pages_nodemask+0x290/0x620 [ 31.429644][ T585] new_slab+0x84/0x3f0 [ 31.433689][ T585] ___slab_alloc+0x2a6/0x450 [ 31.438248][ T585] __slab_alloc+0x63/0xa0 [ 31.442548][ T585] __kmalloc_track_caller+0x1ec/0x320 [ 31.448018][ T585] __alloc_skb+0xdc/0x520 [ 31.452322][ T585] netlink_sendmsg+0x605/0xb50 [ 31.457059][ T585] ____sys_sendmsg+0x5b7/0x8f0 [ 31.461796][ T585] ___sys_sendmsg+0x236/0x2e0 [ 31.466445][ T585] __x64_sys_sendmsg+0x1f9/0x2c0 [ 31.471352][ T585] do_syscall_64+0x31/0x40 [ 31.475743][ T585] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 31.481604][ T585] page_owner free stack trace missing [ 31.486946][ T585] [ 31.489254][ T585] Memory state around the buggy address: [ 31.494860][ T585] ffff88811856ba80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.502895][ T585] ffff88811856bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.510932][ T585] >ffff88811856bb80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.518964][ T585] ^ [ 31.525872][ T585] ffff88811856bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.533910][ T585] ffff88811856bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.541941][ T585] ================================================================== [ 31.549974][ T585] Disabling lock debugging due to kernel taint [ 31.579378][ T296] usb 4-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 31.588424][ T296] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 31.596587][ T296] usb 4-1: SerialNumber: syz [ 31.880041][ T296] usb 4-1: 0:2 : does not exist [ 31.885132][ T296] usb 4-1: unit 5: unexpected type 0x0a [ 31.894154][ T296] usb 4-1: USB disconnect, device number 3 [ 32.109556][ T315] udevd[315]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 32.266256][ T5] usb 3-1: USB disconnect, device number 2