last executing test programs: 5.870955899s ago: executing program 2 (id=252): syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x3800813, &(0x7f0000000240)={[{@uid}, {@unhide}, {@unhide}, {@unhide}, {@hide}, {@overriderock}, {@dmode={'dmode', 0x3d, 0x3}}, {@nocompress}, {@mode={'mode', 0x3d, 0x80}}, {@hide}, {@block={'block', 0x3d, 0x200}}, {@overriderock}, {@showassoc}, {@check_relaxed}, {@gid}]}, 0x5, 0xa62, &(0x7f0000000680)="$eJzs3d1vXGdeB/DvGdux1y1ttxtKqbr1NCVdb9c4tkMTol4siT1JvPgF2Y7UiIvNsnFQFENhC1K3QmxWQlxtBRKIC7iruOKq0t6wXKDeILhjr7hAQvkXVlyFq0HnzNge2zOexHVsJ/18rJk5L7/zPM95ec7jmTlznvB0ab64Y6zZrB4HHL/xT0dQYk6wK3MPPv3sk/Lx4/s5lYG8W/xzMpKkngwmeTUZmp1bWV7sk9C95FaSz5MiyXBar4/kVoq/yvPb45+n+Icy355OPWrK9NPkS+24jz8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADiJitm5qanp4lTml268X29J6nvMzq0sF2k2987ZXKblZ1Wv38XP+uabFOUjIyObXX2/enp79itJ6mfyemvs9apD8ozk4+deeem9rw3WNpfvVZovZPjRk/3whx/f+97GxvoPus4tikMs1QnTOkauNZbmV5fnFy9fa9TnV5frly5cmDp3/epq/er8QmP15upaY7E+u9K4vLa8Uh+f/WZ9+tKl8/XG5M3lG0vX5iYXGpsTL/76zNTUhfp3Jn+ncXlldXnp3HcmV2evzy8szC9dq2LK2WXMxfJA/O35tfpa4/JivX7n7sb6+V0lG8iu47cMmu63PmXQTL+gmamZmenpmZnpH7d7z96acOHdS+9enJoanGp5Pu2BbEXUtg78x9/YPHW+0ns3H+4JHL6AWqv9TxYyn6XcyPupd/2bzVxWspzFHvPbNtv/s+ca+2abjva/3coPdsx/rXw6kzfaoyM92v8eZTm6vw/zw3yce/leNrKR9fzg2Et0tH/X0shS5rOa5cxnMZerKfX2lHou5UIuZCrfzfWMZTWDuZr5LKSR1dzMatbSqI6o2aykkctZy3JWUs94ZvPN1DOdS7mU86mnkcnczHJuZCnXMpfLVSp3crfa7uf3KeNW0PSjBM3sE7Snue/V/m/ZvUhj9z8nPINq++7lJ3AWh4Npttv/U/1Dx2d3jA4+uUIBAAAAh+pX/yMvnH753/8nKfL16uvJq/MLjanjLhYAAABwiKrL9V4vX4bKoa+n8P4fAAAAnjVF9Ru7IsloxlpDm7+E8iEAAAAAPCOq7//fSDG2PcH7fwAAAHjG9L/Hft+IYmLz9r/1263X2+2I1lgxenV+oTE5u7zw3nTeru4yUP3SYE9qA0kxVP384J282Yp6c7T1OrqdYpnnSBk1PfnedN7JmfaKjL9Vvrw13iVyphX5jVbkNzojB7Ij8nwZCQDPujP7tMf7t//D7RSK4p1MtAYnXqua/MHXdrTBA1XLOqVlBYCTYquPnf9rd2nWpf1/o3VvgDd6vf//jX3e/5cRL+fOWOuSgsl8Px9kI7czkfYVB2PdUt3sjaB1GcJEn08DRtuXLPz8Yi0Tez4PGNla187Y9cxkousnAh3pFptlON+KG3hSewEAjtaZfdvhzfa/+pC8Z/s/sf/7/4421yWFAHASbPVg/7gDY48efNzrCADspJUGAAAAAAAAAAAAAAAAAAAAAAAAAACAw/dIN/D/z7eTjY315KCdBXQZ+Pm//csv9Yz5yXPJyOOUcP+BWg6lzMNJDmXdn9zAQJLjyv3beeylyn18UjbdszRQ3K8q7BdK55hPTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAByJIhnoNr2WDCeZSnLu6Ev15Nw/7gIclvrBFise5mE+yguHXRwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgC+79v3/a2m9PtealMFacjbJrSS/e9xlfBwjfeY/PKJynDx/UD133P+/lgylWWQwzWazmRRDs3Mry4vloVAMl/MffPrZJ+WjZ5I/2hzY26tCmUCZw47OJdo5dEwZ2rnUV6ulRufWP7z3Jx/8UX3uSnVgXlm7ujC3eG3lt7YDXyl+2uoCobMbhM3y/tnZf/3rjsmn2pn/NIO9VmR3vlerfOf25vsr3Zbuke8juLuxPlPmtNZ4f+1P/7DWOevlvJm8NZ6M78zp98tHZ07NtiRv7t6eOxW/KP6yeCF/l1vV/i+3RtEsyl30YrX+X7lzd2N98vsfbNzeKtOP7n7UkcBLGUtye2ct61amDmPV+aSr56pch8pcp6qg8ul0n/T21ZHi9PZ23bEOX60OmdHHWod673Wo9Nnu7RKd312iZllJ/uaPv5a3993Tw11SfLtPjl0Vvyj+u7ie/8pfdPT/USv3/9l0rZ1dkqgiO46Uznk7qlft7Paaz3TO+O7uNHvWSp6An+T38ptb+79Wnf87681Mj3qzdT76dsfEHvVms2r1qBfDO2vqnnrR1q9e7K2p//jinhZlZ645vatFap99ei3TLufpVlSPcv5yvpUMvvZYZ5Rv9Tmj9Fv+oPX/74vx/G/u6/8HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4+YpkoNv0WnI2yUtJXizH60lzd8z9A+RXGy0OUsxDc5AyP32KnitaPMzDfJQXjrpEAAAAAAAAADwZV+YefPrZJ+Wj+j5+IL9Wa8+pJ4NJXir+dmh2bmV5sU9CQ8mtza/0R7qH9JicW+XT89vjn5djr+6b258/ON7LBwDgqfb/AQAA///DiXYU") name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) syz_usbip_server_init(0x1) syz_usbip_server_init(0x1) syz_usbip_server_init(0x2) syz_usbip_server_init(0x0) syz_usbip_server_init(0x3) syz_usbip_server_init(0x0) syz_usbip_server_init(0x3) syz_usbip_server_init(0x3) open_tree(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x8000) 4.432776736s ago: executing program 4 (id=264): bpf$MAP_CREATE(0x0, 0x0, 0x48) creat(&(0x7f0000000080)='./file0\x00', 0xa) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r3}, 0x18) munlock(&(0x7f00005be000/0x3000)=nil, 0x3000) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x70bd2c, 0x0, {}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @ETHTOOL_A_COALESCE_RATE_SAMPLE_INTERVAL={0x8, 0x17, 0x33f}]}, 0x34}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r4, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) io_setup(0xb2, &(0x7f0000000200)) r6 = syz_io_uring_setup(0x3edf, &(0x7f00000001c0)={0x0, 0x0, 0x100, 0x10, 0x0, 0x0, 0x0}, &(0x7f0000002000), &(0x7f0000ffd000)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r6, 0x3, 0x0, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x101002) preadv(r7, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x8, 0x4000, 0x4000) 4.122677822s ago: executing program 2 (id=265): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000180)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfff}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r4) syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) ioctl$EVIOCRMFF(r4, 0x4004550d, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r3}, 0x18) openat$random(0xffffffffffffff9c, 0x0, 0x80000, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1809049, 0x0, 0xff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r6, &(0x7f0000004200)='t', 0x1) sendfile(r6, r5, 0x0, 0x3ffff) dup3(r5, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x401}, 0x18) move_mount(r5, 0x0, r6, &(0x7f00000000c0)='./bus\x00', 0x14) sendfile(r6, r5, 0x0, 0x7ffff000) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f000000a3c0)=@newtaction={0x488, 0x30, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x10000, 0x325, 0x81, 0x5, 0x7, 0x5, 0x6, 0x599ff518, 0x5, 0x6, 0x2, 0x8, 0x400, 0xff, 0x1, 0x1, 0xff, 0xbd, 0x7, 0xffff, 0x200, 0x0, 0x7fff, 0x5, 0x0, 0xd, 0x3, 0x3, 0x5, 0x80000001, 0x3477, 0x800, 0x0, 0x8, 0x3db, 0x0, 0x1, 0x7f, 0x56, 0x40, 0x4, 0x1000, 0x5, 0x5, 0xcc5, 0x400, 0x1, 0x64f3, 0x7999, 0x401, 0xe, 0x1, 0xfffffffb, 0x428a0562, 0xd7, 0xd, 0xb1, 0x10, 0x2768, 0x200, 0x1, 0x7fffffff, 0x1, 0x81, 0x3, 0x5, 0x8, 0x9, 0x38, 0x3, 0x5, 0xffff0001, 0x9, 0x6, 0xe9a, 0x7, 0x9, 0x5, 0x3, 0x4, 0xff, 0x8000, 0x3c, 0x1ff, 0xffff, 0x6, 0xffff8001, 0x1, 0x6, 0x1, 0x48275caf, 0x7, 0x5, 0x100, 0x3ff, 0x9, 0x9, 0xffffffff, 0x4, 0x1a, 0x101, 0x8000, 0xff, 0xef6f, 0x1, 0x7, 0xccd, 0x7, 0xc6, 0x0, 0x3, 0x401, 0xfffffffb, 0x4, 0x612, 0x2, 0x1, 0x2, 0x1, 0x0, 0x5, 0x3, 0x4956198f, 0x401, 0x3c, 0x7, 0x6, 0x8, 0x101, 0x1, 0x3, 0x2, 0x3320, 0x5, 0x6f41, 0x6, 0x2, 0xa, 0x2, 0x10001, 0x1, 0x4, 0xff, 0x1876, 0x4, 0xfe, 0x8, 0x100, 0x5, 0x6, 0x2e80, 0x6, 0x4, 0x9, 0x0, 0xffffffab, 0xa, 0x1000, 0x3ff, 0x1, 0x3, 0x2e70, 0x8, 0xf3d6, 0xb3f, 0xfffffc00, 0x7, 0x0, 0xff, 0x0, 0x8000, 0x12d00, 0x9, 0xd, 0x8, 0x7f, 0x7, 0x2, 0x4, 0x4, 0xf26, 0x3, 0x1, 0xffffffff, 0x6, 0x1, 0x7, 0x3, 0x3, 0x7, 0x3, 0x64a, 0x1000, 0x100, 0x2, 0x1, 0x0, 0x470121f0, 0x93d0, 0x9, 0x3, 0xfffffff9, 0x3, 0x8, 0xf935, 0x7, 0x8, 0x8000, 0x40, 0x4, 0x4, 0x4, 0x80, 0x8, 0x9, 0x2, 0x5, 0x1, 0x3b05, 0x6, 0x6, 0x3, 0xfffffffd, 0x7fffffff, 0x1, 0x0, 0x38, 0x4, 0x30a6, 0x7fffffff, 0x3, 0x80, 0x3, 0x1, 0x8, 0xfffffff9, 0x6, 0x480, 0x5, 0x0, 0x80000001, 0x1, 0x0, 0x1000, 0x2, 0x1, 0x5, 0x10, 0x4, 0x10, 0x2, 0x2, 0x38000, 0x2, 0x460, 0xffff5824]}], [@TCA_POLICE_TBF={0x3c, 0x1, {0xb, 0x10000000, 0xc6d, 0x101, 0x6, {0x4, 0x0, 0x2, 0x6, 0x9, 0x10001}, {0x3, 0x0, 0x703, 0x2, 0x1}, 0x0, 0x2a6, 0x4}}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x488}, 0x1, 0x0, 0x0, 0x40014}, 0x2400c800) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000ddff00850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4, 0x0, 0x0, 0x0}, 0x94) dup(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) 3.817092348s ago: executing program 0 (id=268): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) write$char_usb(r0, &(0x7f0000001cc0)="e7476b3604da5afbce2b43", 0xb) 3.800609878s ago: executing program 0 (id=269): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000340)=ANY=[], 0x10}}, 0x0) 3.730523069s ago: executing program 0 (id=270): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="020000000400000008"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000a40)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb86dd60004000003c3c0020010000000000000000000000000000ff020000000000000000000000000001000400000000"], 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x18) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r8 = openat(0xffffffffffffff9c, 0x0, 0x4042, 0xf8) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000240)={'\x00', 0x1, 0xb3, 0x8001, 0x6, 0x3, r3}) r9 = socket$nl_generic(0x10, 0x3, 0x10) lchown(&(0x7f00000006c0)='./file0\x00', 0x0, 0xee01) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r9, &(0x7f0000000480)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r10, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a300000000014000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) 2.578665242s ago: executing program 1 (id=273): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000a40)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb86dd60004000003c3c0020010000000000000000000000000000ff020000000000000000000000000001000400000000"], 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0xf8) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a300000000014000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) 2.578036002s ago: executing program 3 (id=274): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000013000000850000008600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = getgid() stat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', 0x0, r2) newfstatat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) socket$netlink(0x10, 0x3, 0x0) r4 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000680)={{}, {0x1, 0x1}, [{0x2, 0x3}], {0x4, 0x1}, [{}, {0x8, 0x2, r1}, {0x8, 0x2}, {0x8, 0x1, r3}, {0x8, 0x5}, {0x8, 0x1, 0xee00}, {0x8, 0x0, r4}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x2}}, 0x6c, 0x39c1b126a2dbdb15) 2.558282612s ago: executing program 3 (id=275): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)=ANY=[@ANYBLOB="34000000120001100000000c00ce00000000000000000014002e800d0006002f6465762f6b766d00000000"], 0x34}], 0x1, 0x0, 0x0, 0x4000}, 0x4000800) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xc7}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="050000000400000008000000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYBLOB="b7a6b9ce47f0074a4531f26f059020a765220f25532b9a4c49275c430af7cd7b2614015d2543b4dda78a5498154364a7b180b018ce231cb3e1d52241dc6b7663393ef7343e4c", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x10000002}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000800)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a0, 0x0, 0x12, 0x60d, 0x1d8, 0x202, 0x2d0, 0x2e8, 0x2e8, 0x2d0, 0x2c0, 0x4, 0x0, {[{{@ipv6={@local, @mcast1, [0x0, 0x0, 0xc0], [0x0, 0xff000000], 'veth1_to_batadv\x00', 'macsec0\x00'}, 0x0, 0x190, 0x1d8, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "000000165a8c2e0617ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f672225d6147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac05a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcf07000000eca0a7b66c60c527bac2b5", 0x2, 0x2}}, @inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28}, {'Yv'}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x1}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) r4 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r4) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_128={{0x303}, "cfc86a00", "4617a9f6040839230fb7fead776dd8dc", "c6db0872", "a44a883fca4400"}, 0x28) recvmmsg(r0, &(0x7f0000000b00)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000a80)=""/32, 0x20}], 0x1}, 0x8}], 0x1, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x3, 0x7}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000001ec0)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x5c) getrlimit(0x8, &(0x7f0000000000)) socket(0x2, 0x2, 0x1) bind$unix(r5, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) r6 = socket(0x2, 0x2, 0x1) bind$unix(r6, &(0x7f0000000000)=@abs, 0x6e) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp\x00') preadv(r5, &(0x7f00000000c0)=[{&(0x7f0000000300)=""/170, 0xaa}], 0x1, 0x0, 0x2) recvmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}, 0x4}], 0x1, 0x40000062, 0x0) socket$key(0xf, 0x3, 0x2) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.499001383s ago: executing program 0 (id=276): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x6b93, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ee}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000500)={r3, 0x0, 0x2d, 0x0, @val=@netfilter={0xa, 0x4, 0x600, 0x1}}, 0x20) r4 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x2409c8c1, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet(r2, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r5, 0x29, 0x1, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x7, 0x10, 0x95, 0x8, 0x0, 0xc304, 0x1031, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7ff, 0x2, @perf_config_ext={0x9, 0xb06}, 0x80, 0x2, 0x1c, 0x5, 0x9, 0xd0d, 0x2, 0x0, 0x0, 0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socket$inet6(0xa, 0x2, 0x2102) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x40, 0x49}]}) utimensat(0xffffffffffffff9c, &(0x7f00000003c0)='.\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) r7 = gettid() timer_create(0x1, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r8, &(0x7f0000000300)=[{&(0x7f0000000440)=""/166, 0xa6}, {&(0x7f00000006c0)=""/252, 0xfc}], 0x2) readv(r8, &(0x7f0000001240)=[{&(0x7f0000000040)=""/73, 0x49}], 0x1) 2.473363854s ago: executing program 4 (id=277): symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000500)={[{@jqfmt_vfsv0}, {}, {@stripe={'stripe', 0x3d, 0x1ff}}, {@resgid}, {@orlov}, {@grpjquota, 0x2e}, {@bh}, {@errors_remount}, {@nomblk_io_submit}, {@delalloc}], [{@fsname={'fsname', 0x3d, 'errors=remount-ro'}}, {@euid_eq}, {@obj_user={'obj_user', 0x3d, ':}$\\/(['}}, {@euid_lt}, {@smackfsroot={'smackfsroot', 0x3d, '&\x02@@^/\xcd}&='}}, {@dont_measure}], 0x2c}, 0x1, 0x4c0, &(0x7f0000000ac0)="$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") syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000600), 0x1, 0x563, &(0x7f0000000640)="$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") setxattr$security_evm(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0), 0x0, 0x0, 0x0) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) 2.402762475s ago: executing program 4 (id=278): r0 = msgget$private(0x0, 0xfffffffffffffffd) msgrcv(r0, 0x0, 0x0, 0x1, 0x0) msgsnd(r0, &(0x7f0000000000)={0x1}, 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) getresuid(&(0x7f0000000180)=0x0, &(0x7f0000000200), &(0x7f0000000500)) getgroups(0x2, &(0x7f0000000540)=[0xffffffffffffffff, 0xee01]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)=0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000680)={{0x3, r2, 0x0, r3, r4, 0x80, 0x8}, 0x0, 0x0, 0x4, 0x19, 0x5, 0x2bde, 0xffffffffffffff27, 0xc5, 0x2, 0x9, r5}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, r7) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001580)=[{{&(0x7f0000000800)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000900), 0x0, &(0x7f0000000940), 0x0, 0x4008021}}, {{&(0x7f0000000980)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000f00), 0x0, &(0x7f0000001200)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="624d353f553df52c7b53aa58b668", @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000000400002000000", @ANYRES32, @ANYRES32=r4, @ANYRESHEX=r1, @ANYRES32=r6, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001800000000000000010000000100", @ANYRESOCT=r1], 0xd8, 0x484c1}}], 0x2, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, 0x0) quotactl_fd$Q_SETQUOTA(r8, 0xffffffff80000801, 0x0, &(0x7f0000000180)={0x7, 0x401, 0x6b2, 0x5, 0xd, 0x8, 0xb4d1, 0xfffffffffffffff8, 0x3}) getresgid(&(0x7f0000000080)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)=ANY=[], 0x11c}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000d70000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32, @ANYRES32=r9, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32], 0x90, 0x4000000}, 0x4c040) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0xc000) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000004, 0x4000010, 0xffffffffffffffff, 0xda29b000) lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setregid(0x0, 0xffffffffffffffff) 2.286772647s ago: executing program 4 (id=279): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00'}, 0x80) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000340)="ae6b1290cf5d614cf9ed60112624ee12098d57dbe3b1fb839c3ff1696fd637d3077171d8c0758d57472b60124fd14d956d870f3c9264226f336cc8501059d3d14732c3004bc04e9f370e8fdaccb84ef62b0302008426304dce95352223d4d3efdb745f68bf650db08879ea60c4df1d9e7c43daedbdbf9bb51f655d7f647b5d453a987636707b1d29959c98e0d48a1682d6ece5f2d33de110526a956e4dbdf6080dbd9fa0d09268ad21ba2ff15377e1f3edc1eb35aa0711d2b663363a61a509c6c13b6d90b4d11a09e0bdcbe4b329fb081a2796f7be2b4cd841e3a47c8b9bef1dbb07d50a683e40fc", 0xe8, r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r1}, 0x18) socket$packet(0x11, 0x3, 0x300) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x810) 1.973053973s ago: executing program 2 (id=280): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) write$char_usb(r0, &(0x7f0000001cc0)="e7476b3604da", 0x6) 1.942138814s ago: executing program 2 (id=281): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x6b93, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ee}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000500)={r3, 0x0, 0x2d, 0x0, @val=@netfilter={0xa, 0x4, 0x600, 0x1}}, 0x20) r4 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x2409c8c1, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet(r2, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r5, 0x29, 0x1, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x7, 0x10, 0x95, 0x8, 0x0, 0xc304, 0x1031, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7ff, 0x2, @perf_config_ext={0x9, 0xb06}, 0x80, 0x2, 0x1c, 0x5, 0x9, 0xd0d, 0x2, 0x0, 0x0, 0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r6 = socket$inet6(0xa, 0x2, 0x2102) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x40, 0x49}]}) utimensat(0xffffffffffffff9c, &(0x7f00000003c0)='.\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) connect$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r7 = gettid() timer_create(0x1, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r8, &(0x7f0000000300)=[{&(0x7f0000000440)=""/166, 0xa6}, {&(0x7f00000006c0)=""/252, 0xfc}], 0x2) readv(r8, &(0x7f0000001240)=[{&(0x7f0000000040)=""/73, 0x49}], 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x80100, 0x0) 1.658912709s ago: executing program 1 (id=282): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000340)=ANY=[], 0x10}}, 0x0) 1.658488799s ago: executing program 3 (id=283): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00'}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000a40)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb86dd60004000003c3c0020010000000000000000000000000000ff020000000000000000000000000001000400000000"], 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) 1.61822273s ago: executing program 1 (id=284): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000380)={&(0x7f0000000080)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x2}}, @sadb_sa={0x2, 0x1, 0xffffffff, 0x0, 0x0, 0x7, 0xc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x7}}]}, 0x70}, 0x1, 0x7}, 0x0) 1.580945611s ago: executing program 0 (id=285): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000013000000850000008600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = getgid() stat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', 0x0, r2) newfstatat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) socket$netlink(0x10, 0x3, 0x0) r4 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000680)={{}, {0x1, 0x1}, [{0x2, 0x3}], {0x4, 0x1}, [{}, {0x8, 0x2, r1}, {0x8, 0x2}, {0x8, 0x1, r3}, {0x8, 0x5}, {0x8, 0x1, 0xee00}, {0x8, 0x0, r4}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x2}}, 0x6c, 0x39c1b126a2dbdb15) 1.526913892s ago: executing program 1 (id=286): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000000400000008000000050000000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x5412, &(0x7f0000000140)=0x13) clock_settime(0xfffffff8, &(0x7f0000000140)={0x0, 0x989680}) r2 = syz_open_procfs$pagemap(0x0, &(0x7f0000000080)) ioctl$PAGEMAP_SCAN(r2, 0xc0606610, &(0x7f0000000200)={0x60, 0x6, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x7, &(0x7f00000000c0)=[{0x7fff, 0x400000000000, 0x5}, {0xffffffff80000000, 0x7, 0x9}, {0xffffffff9fca76b8, 0x6e1, 0x81}, {0x100, 0xa, 0x3}, {0x1, 0xfffffffffffffffc, 0x7}], 0x5, 0x1, 0x0, 0x2c, 0x18, 0x40}) ioctl$TIOCSTI(r1, 0x5412, &(0x7f00000001c0)=0x9) syz_emit_ethernet(0x46, &(0x7f0000000240)={@local, @random="7f0a00034011", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x12, 0x0, 0x2802, {0x5, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @private}, "000088beffff0000"}}}}}, 0x0) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000000)={0xffffbfbd, 0x13, 0xfffffc01, 0x4, 0x5, "5911efcae4ed690034357502000000304205d2", 0x800, 0x9}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18, 0x8805}, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x4c, &(0x7f000002eff0)={0x0, 0x0}, 0x10) recvmmsg(r4, &(0x7f0000007340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f0000000d00)={0x5, 0x80, 0x2e, 0x0, 0xf6, 0x5, 0x0, 0x4, 0x0, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xa, 0x2, @perf_bp={&(0x7f0000000580)}, 0x9050, 0x1, 0x8, 0x4, 0x6, 0x7, 0x1, 0x0, 0x8, 0x0, 0x9}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xb) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/devices.allow\x00', 0x103041, 0x1ae) 1.508162382s ago: executing program 0 (id=287): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="020000000400000008"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000a40)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb86dd60004000003c3c0020010000000000000000000000000000ff020000000000000000000000000001000400000000"], 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x18) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r8 = openat(0xffffffffffffff9c, 0x0, 0x4042, 0xf8) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000240)={'\x00', 0x1, 0xb3, 0x8001, 0x6, 0x3, r3}) r9 = socket$nl_generic(0x10, 0x3, 0x10) lchown(&(0x7f00000006c0)='./file0\x00', 0x0, 0xee01) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r9, &(0x7f0000000480)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r10, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a300000000014000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) 981.088442ms ago: executing program 2 (id=288): bpf$MAP_CREATE(0x0, 0x0, 0x48) creat(&(0x7f0000000080)='./file0\x00', 0xa) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r3}, 0x18) munlock(&(0x7f00005be000/0x3000)=nil, 0x3000) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x70bd2c, 0x0, {}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @ETHTOOL_A_COALESCE_RATE_SAMPLE_INTERVAL={0x8, 0x17, 0x33f}]}, 0x34}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r4, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) io_setup(0xb2, &(0x7f0000000200)) r6 = syz_io_uring_setup(0x3edf, &(0x7f00000001c0)={0x0, 0x0, 0x100, 0x10, 0x0, 0x0, 0x0}, &(0x7f0000002000), &(0x7f0000ffd000)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r6, 0x3, 0x0, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) preadv(r7, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x8, 0x4000, 0x4000) 839.013705ms ago: executing program 1 (id=289): r0 = msgget$private(0x0, 0xfffffffffffffffd) msgrcv(r0, 0x0, 0x0, 0x1, 0x0) msgsnd(r0, &(0x7f0000000000)={0x1}, 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) getresuid(&(0x7f0000000180)=0x0, &(0x7f0000000200), &(0x7f0000000500)) getgroups(0x2, &(0x7f0000000540)=[0xffffffffffffffff, 0xee01]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)=0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000680)={{0x3, r2, 0x0, r3, r4, 0x80, 0x8}, 0x0, 0x0, 0x4, 0x19, 0x5, 0x2bde, 0xffffffffffffff27, 0xc5, 0x2, 0x9, r5}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, r7) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001580)=[{{&(0x7f0000000800)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000900), 0x0, &(0x7f0000000940), 0x0, 0x4008021}}, {{&(0x7f0000000980)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000f00), 0x0, &(0x7f0000001200)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="624d353f553df52c7b53aa58b668", @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000000400002000000", @ANYRES32, @ANYRES32=r4, @ANYRESHEX=r1, @ANYRES32=r6, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000001800000000000000010000000100", @ANYRESOCT=r1], 0xd8, 0x484c1}}], 0x2, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, 0x0) quotactl_fd$Q_SETQUOTA(r8, 0xffffffff80000801, 0x0, &(0x7f0000000180)={0x7, 0x401, 0x6b2, 0x5, 0xd, 0x8, 0xb4d1, 0xfffffffffffffff8, 0x3}) getresgid(&(0x7f0000000080)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)=ANY=[], 0x11c}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000d70000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32, @ANYRES32=r9, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32], 0x90, 0x4000000}, 0x4c040) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0xc000) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000004, 0x4000010, 0xffffffffffffffff, 0xda29b000) lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setregid(0x0, 0xffffffffffffffff) 799.558605ms ago: executing program 3 (id=290): symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000500)={[{@jqfmt_vfsv0}, {}, {@stripe={'stripe', 0x3d, 0x1ff}}, {@resgid}, {@orlov}, {@grpjquota, 0x2e}, {@bh}, {@errors_remount}, {@nomblk_io_submit}, {@delalloc}], [{@fsname={'fsname', 0x3d, 'errors=remount-ro'}}, {@euid_eq}, {@obj_user={'obj_user', 0x3d, ':}$\\/(['}}, {@euid_lt}, {@smackfsroot={'smackfsroot', 0x3d, '&\x02@@^/\xcd}&='}}, {@dont_measure}], 0x2c}, 0x1, 0x4c0, &(0x7f0000000ac0)="$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") (fail_nth: 2) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, &(0x7f0000000600), 0x1, 0x563, &(0x7f0000000640)="$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") setxattr$security_evm(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0), 0x0, 0x0, 0x0) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) 498.552101ms ago: executing program 1 (id=291): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000180)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfff}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r4) syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) ioctl$EVIOCRMFF(r4, 0x4004550d, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r3}, 0x18) openat$random(0xffffffffffffff9c, 0x0, 0x80000, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1809049, 0x0, 0xff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write(r6, &(0x7f0000004200)='t', 0x1) sendfile(r6, r5, 0x0, 0x3ffff) dup3(r5, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x401}, 0x18) move_mount(r5, 0x0, r6, &(0x7f00000000c0)='./bus\x00', 0x14) sendfile(r6, r5, 0x0, 0x7ffff000) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f000000a3c0)=@newtaction={0x488, 0x30, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x10000, 0x325, 0x81, 0x5, 0x7, 0x5, 0x6, 0x599ff518, 0x5, 0x6, 0x2, 0x8, 0x400, 0xff, 0x1, 0x1, 0xff, 0xbd, 0x7, 0xffff, 0x200, 0x0, 0x7fff, 0x5, 0x0, 0xd, 0x3, 0x3, 0x5, 0x80000001, 0x3477, 0x800, 0x0, 0x8, 0x3db, 0x0, 0x1, 0x7f, 0x56, 0x40, 0x4, 0x1000, 0x5, 0x5, 0xcc5, 0x400, 0x1, 0x64f3, 0x7999, 0x401, 0xe, 0x1, 0xfffffffb, 0x428a0562, 0xd7, 0xd, 0xb1, 0x10, 0x2768, 0x200, 0x1, 0x7fffffff, 0x1, 0x81, 0x3, 0x5, 0x8, 0x9, 0x38, 0x3, 0x5, 0xffff0001, 0x9, 0x6, 0xe9a, 0x7, 0x9, 0x5, 0x3, 0x4, 0xff, 0x8000, 0x3c, 0x1ff, 0xffff, 0x6, 0xffff8001, 0x1, 0x6, 0x1, 0x48275caf, 0x7, 0x5, 0x100, 0x3ff, 0x9, 0x9, 0xffffffff, 0x4, 0x1a, 0x101, 0x8000, 0xff, 0xef6f, 0x1, 0x7, 0xccd, 0x7, 0xc6, 0x0, 0x3, 0x401, 0xfffffffb, 0x4, 0x612, 0x2, 0x1, 0x2, 0x1, 0x0, 0x5, 0x3, 0x4956198f, 0x401, 0x3c, 0x7, 0x6, 0x8, 0x101, 0x1, 0x3, 0x2, 0x3320, 0x5, 0x6f41, 0x6, 0x2, 0xa, 0x2, 0x10001, 0x1, 0x4, 0xff, 0x1876, 0x4, 0xfe, 0x8, 0x100, 0x5, 0x6, 0x2e80, 0x6, 0x4, 0x9, 0x0, 0xffffffab, 0xa, 0x1000, 0x3ff, 0x1, 0x3, 0x2e70, 0x8, 0xf3d6, 0xb3f, 0xfffffc00, 0x7, 0x0, 0xff, 0x0, 0x8000, 0x12d00, 0x9, 0xd, 0x8, 0x7f, 0x7, 0x2, 0x4, 0x4, 0xf26, 0x3, 0x1, 0xffffffff, 0x6, 0x1, 0x7, 0x3, 0x3, 0x7, 0x3, 0x64a, 0x1000, 0x100, 0x2, 0x1, 0x0, 0x470121f0, 0x93d0, 0x9, 0x3, 0xfffffff9, 0x3, 0x8, 0xf935, 0x7, 0x8, 0x8000, 0x40, 0x4, 0x4, 0x4, 0x80, 0x8, 0x9, 0x2, 0x5, 0x1, 0x3b05, 0x6, 0x6, 0x3, 0xfffffffd, 0x7fffffff, 0x1, 0x0, 0x38, 0x4, 0x30a6, 0x7fffffff, 0x3, 0x80, 0x3, 0x1, 0x8, 0xfffffff9, 0x6, 0x480, 0x5, 0x0, 0x80000001, 0x1, 0x0, 0x1000, 0x2, 0x1, 0x5, 0x10, 0x4, 0x10, 0x2, 0x2, 0x38000, 0x2, 0x460, 0xffff5824]}], [@TCA_POLICE_TBF={0x3c, 0x1, {0xb, 0x10000000, 0xc6d, 0x101, 0x6, {0x4, 0x0, 0x2, 0x6, 0x9, 0x10001}, {0x3, 0x0, 0x703, 0x2, 0x1}, 0x0, 0x2a6, 0x4}}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x488}, 0x1, 0x0, 0x0, 0x40014}, 0x2400c800) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000ddff00850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4, 0x0, 0x0, 0x0}, 0x94) dup(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) 484.525111ms ago: executing program 3 (id=292): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) write$char_usb(r0, &(0x7f0000001cc0)="e7476b36", 0x4) 467.332562ms ago: executing program 3 (id=293): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000a40)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb86dd60004000003c3c0020010000000000000000000000000000ff020000000000000000000000000001000400000000"], 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0xf8) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a300000000014000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) 46.81984ms ago: executing program 4 (id=294): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000340)=ANY=[], 0x10}}, 0x0) 45.56434ms ago: executing program 4 (id=295): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x2}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0xa0004010}) socket$packet(0x11, 0xa, 0x300) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) eventfd2(0x4, 0x1) 0s ago: executing program 2 (id=296): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x6b93, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ee}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000500)={r3, 0x0, 0x2d, 0x0, @val=@netfilter={0xa, 0x4, 0x600, 0x1}}, 0x20) r4 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x2409c8c1, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet(r2, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r5, 0x29, 0x1, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x7, 0x10, 0x95, 0x8, 0x0, 0xc304, 0x1031, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7ff, 0x2, @perf_config_ext={0x9, 0xb06}, 0x80, 0x2, 0x1c, 0x5, 0x9, 0xd0d, 0x2, 0x0, 0x0, 0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socket$inet6(0xa, 0x2, 0x2102) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x40, 0x49}]}) utimensat(0xffffffffffffff9c, &(0x7f00000003c0)='.\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) r7 = gettid() timer_create(0x1, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r8, &(0x7f0000000300)=[{&(0x7f0000000440)=""/166, 0xa6}, {&(0x7f00000006c0)=""/252, 0xfc}], 0x2) readv(r8, &(0x7f0000001240)=[{&(0x7f0000000040)=""/73, 0x49}], 0x1) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.180' (ED25519) to the list of known hosts. [ 29.098673][ T29] audit: type=1400 audit(1753746306.790:62): avc: denied { mounton } for pid=3292 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 29.099847][ T3292] cgroup: Unknown subsys name 'net' [ 29.121525][ T29] audit: type=1400 audit(1753746306.790:63): avc: denied { mount } for pid=3292 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.149394][ T29] audit: type=1400 audit(1753746306.810:64): avc: denied { unmount } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.249543][ T3292] cgroup: Unknown subsys name 'cpuset' [ 29.255786][ T3292] cgroup: Unknown subsys name 'rlimit' [ 29.367598][ T29] audit: type=1400 audit(1753746307.050:65): avc: denied { setattr } for pid=3292 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 29.390964][ T29] audit: type=1400 audit(1753746307.060:66): avc: denied { create } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.411539][ T29] audit: type=1400 audit(1753746307.060:67): avc: denied { write } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.432183][ T29] audit: type=1400 audit(1753746307.060:68): avc: denied { read } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.441062][ T3295] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 29.452549][ T29] audit: type=1400 audit(1753746307.060:69): avc: denied { mounton } for pid=3292 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 29.486064][ T29] audit: type=1400 audit(1753746307.060:70): avc: denied { mount } for pid=3292 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 29.509392][ T29] audit: type=1400 audit(1753746307.150:71): avc: denied { relabelto } for pid=3295 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.536896][ T3292] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 30.922503][ T3307] chnl_net:caif_netlink_parms(): no params data found [ 30.939478][ T3303] chnl_net:caif_netlink_parms(): no params data found [ 30.988248][ T3304] chnl_net:caif_netlink_parms(): no params data found [ 31.055861][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.063084][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.070259][ T3307] bridge_slave_0: entered allmulticast mode [ 31.076606][ T3307] bridge_slave_0: entered promiscuous mode [ 31.083330][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.090463][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.097601][ T3303] bridge_slave_0: entered allmulticast mode [ 31.104214][ T3303] bridge_slave_0: entered promiscuous mode [ 31.112551][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.119716][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.126882][ T3303] bridge_slave_1: entered allmulticast mode [ 31.133419][ T3303] bridge_slave_1: entered promiscuous mode [ 31.146651][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 31.158341][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.165458][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.172904][ T3307] bridge_slave_1: entered allmulticast mode [ 31.179351][ T3307] bridge_slave_1: entered promiscuous mode [ 31.185508][ T3302] chnl_net:caif_netlink_parms(): no params data found [ 31.216889][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.227029][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.257892][ T3304] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.265014][ T3304] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.272311][ T3304] bridge_slave_0: entered allmulticast mode [ 31.278796][ T3304] bridge_slave_0: entered promiscuous mode [ 31.292948][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.308944][ T3304] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.316086][ T3304] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.323236][ T3304] bridge_slave_1: entered allmulticast mode [ 31.329781][ T3304] bridge_slave_1: entered promiscuous mode [ 31.341811][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.351682][ T3303] team0: Port device team_slave_0 added [ 31.367704][ T3303] team0: Port device team_slave_1 added [ 31.413123][ T3307] team0: Port device team_slave_0 added [ 31.423638][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.430792][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.438048][ T3313] bridge_slave_0: entered allmulticast mode [ 31.444605][ T3313] bridge_slave_0: entered promiscuous mode [ 31.451195][ T3302] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.458308][ T3302] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.465560][ T3302] bridge_slave_0: entered allmulticast mode [ 31.471999][ T3302] bridge_slave_0: entered promiscuous mode [ 31.480028][ T3304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.489501][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.496526][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.522512][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.534180][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.541246][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.567351][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.578960][ T3307] team0: Port device team_slave_1 added [ 31.584892][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.592065][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.599312][ T3313] bridge_slave_1: entered allmulticast mode [ 31.605887][ T3313] bridge_slave_1: entered promiscuous mode [ 31.612045][ T3302] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.619243][ T3302] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.627356][ T3302] bridge_slave_1: entered allmulticast mode [ 31.634418][ T3302] bridge_slave_1: entered promiscuous mode [ 31.646978][ T3304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.694579][ T3304] team0: Port device team_slave_0 added [ 31.701175][ T3304] team0: Port device team_slave_1 added [ 31.707102][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.714087][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.740065][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.752268][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.761629][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.768693][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.794647][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.806604][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.826803][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.843061][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.850114][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.876089][ T3304] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.887800][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.917650][ T3313] team0: Port device team_slave_0 added [ 31.924902][ T3313] team0: Port device team_slave_1 added [ 31.931080][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.938066][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.964074][ T3304] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.982540][ T3303] hsr_slave_0: entered promiscuous mode [ 31.988760][ T3303] hsr_slave_1: entered promiscuous mode [ 32.018584][ T3302] team0: Port device team_slave_0 added [ 32.031701][ T3307] hsr_slave_0: entered promiscuous mode [ 32.037879][ T3307] hsr_slave_1: entered promiscuous mode [ 32.043861][ T3307] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.051513][ T3307] Cannot create hsr debugfs directory [ 32.057540][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.064539][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.090500][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.106828][ T3302] team0: Port device team_slave_1 added [ 32.118940][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.125917][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.151974][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.187000][ T3304] hsr_slave_0: entered promiscuous mode [ 32.193072][ T3304] hsr_slave_1: entered promiscuous mode [ 32.198988][ T3304] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.206582][ T3304] Cannot create hsr debugfs directory [ 32.218094][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.225157][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.251409][ T3302] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.280563][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.287568][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.313548][ T3302] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.343507][ T3313] hsr_slave_0: entered promiscuous mode [ 32.349616][ T3313] hsr_slave_1: entered promiscuous mode [ 32.355419][ T3313] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.363008][ T3313] Cannot create hsr debugfs directory [ 32.405584][ T3302] hsr_slave_0: entered promiscuous mode [ 32.411738][ T3302] hsr_slave_1: entered promiscuous mode [ 32.417839][ T3302] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.425533][ T3302] Cannot create hsr debugfs directory [ 32.568044][ T3307] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 32.576669][ T3307] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 32.594352][ T3307] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 32.605301][ T3307] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 32.629544][ T3303] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 32.638945][ T3303] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 32.648136][ T3303] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 32.660359][ T3303] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 32.686023][ T3304] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 32.695169][ T3304] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 32.704327][ T3304] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 32.714222][ T3304] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 32.760659][ T3313] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 32.769857][ T3313] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 32.780301][ T3313] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 32.792255][ T3313] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 32.808873][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.847344][ T3307] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.854441][ T3302] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 32.863628][ T3302] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 32.872521][ T3302] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 32.881315][ T3302] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 32.910070][ T88] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.917182][ T88] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.931995][ T88] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.939126][ T88] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.953702][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.967251][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.981892][ T3304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.995768][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.002905][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.011666][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.018807][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.040756][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.057889][ T3304] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.076322][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.083407][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.094730][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.105531][ T88] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.112661][ T88] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.153247][ T159] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.160384][ T159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.183313][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.198007][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.205250][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.233546][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.250320][ T3302] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.267491][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.274597][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.303018][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.323097][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.330223][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.356948][ T3302] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 33.367377][ T3302] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.380378][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.407069][ T3304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.465297][ T3307] veth0_vlan: entered promiscuous mode [ 33.500933][ T3307] veth1_vlan: entered promiscuous mode [ 33.535564][ T3307] veth0_macvtap: entered promiscuous mode [ 33.564681][ T3307] veth1_macvtap: entered promiscuous mode [ 33.578842][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.594667][ T3302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.605274][ T3303] veth0_vlan: entered promiscuous mode [ 33.621477][ T3304] veth0_vlan: entered promiscuous mode [ 33.631916][ T3303] veth1_vlan: entered promiscuous mode [ 33.642154][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.651591][ T3304] veth1_vlan: entered promiscuous mode [ 33.667375][ T3303] veth0_macvtap: entered promiscuous mode [ 33.684172][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.693420][ T3303] veth1_macvtap: entered promiscuous mode [ 33.707465][ T3304] veth0_macvtap: entered promiscuous mode [ 33.722137][ T3307] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.731084][ T3307] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.739856][ T3307] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.748659][ T3307] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.762561][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.779681][ T3304] veth1_macvtap: entered promiscuous mode [ 33.787366][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.806174][ T3313] veth0_vlan: entered promiscuous mode [ 33.815000][ T3303] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.823782][ T3303] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.832618][ T3303] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.841472][ T3303] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.855995][ T3313] veth1_vlan: entered promiscuous mode [ 33.863691][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.883208][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.892684][ T3302] veth0_vlan: entered promiscuous mode [ 33.909895][ T3304] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.918782][ T3304] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.919756][ T3307] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 33.927574][ T3304] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.950897][ T3304] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.965592][ T3313] veth0_macvtap: entered promiscuous mode [ 33.996477][ T3302] veth1_vlan: entered promiscuous mode [ 34.004889][ T3313] veth1_macvtap: entered promiscuous mode [ 34.035793][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.054812][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.081454][ T3313] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.090283][ T3313] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.099028][ T3313] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.107818][ T3313] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.134577][ T3302] veth0_macvtap: entered promiscuous mode [ 34.153468][ T3302] veth1_macvtap: entered promiscuous mode [ 34.185557][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.205116][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.226820][ T3302] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.235691][ T3302] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.244574][ T3302] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.253489][ T3302] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.262362][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 34.262376][ T29] audit: type=1400 audit(1753746311.920:105): avc: denied { allowed } for pid=3486 comm="syz.4.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 34.288005][ T29] audit: type=1400 audit(1753746311.930:106): avc: denied { sqpoll } for pid=3486 comm="syz.4.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 34.307063][ T29] audit: type=1400 audit(1753746311.930:107): avc: denied { create } for pid=3486 comm="syz.4.7" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 34.323938][ T3491] loop3: detected capacity change from 0 to 1024 [ 34.335109][ T29] audit: type=1400 audit(1753746311.950:108): avc: denied { create } for pid=3486 comm="syz.4.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.352983][ T3491] EXT4-fs: Ignoring removed orlov option [ 34.355342][ T29] audit: type=1400 audit(1753746311.950:109): avc: denied { lock } for pid=3486 comm="syz.4.7" path="socket:[3802]" dev="sockfs" ino=3802 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 34.432619][ T3491] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 34.447524][ T29] audit: type=1400 audit(1753746312.130:110): avc: denied { mount } for pid=3488 comm="syz.3.4" name="/" dev="loop3" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 34.479552][ T29] audit: type=1400 audit(1753746312.160:111): avc: denied { add_name } for pid=3488 comm="syz.3.4" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 34.499946][ T29] audit: type=1400 audit(1753746312.160:112): avc: denied { create } for pid=3488 comm="syz.3.4" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 34.519744][ T29] audit: type=1400 audit(1753746312.160:113): avc: denied { read open } for pid=3488 comm="syz.3.4" path="/0/bus/bus" dev="loop3" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 34.542165][ T29] audit: type=1400 audit(1753746312.160:114): avc: denied { write } for pid=3488 comm="syz.3.4" name="bus" dev="loop3" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 34.577049][ T3500] 9pnet_fd: Insufficient options for proto=fd [ 34.697332][ T3503] loop1: detected capacity change from 0 to 1024 [ 34.706856][ T3503] ======================================================= [ 34.706856][ T3503] WARNING: The mand mount option has been deprecated and [ 34.706856][ T3503] and is ignored by this kernel. Remove the mand [ 34.706856][ T3503] option from the mount to silence this warning. [ 34.706856][ T3503] ======================================================= [ 34.742803][ T3503] EXT4-fs: inline encryption not supported [ 34.749486][ T3503] EXT4-fs: Ignoring removed bh option [ 34.773464][ T3503] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 34.792246][ T3503] EXT4-fs (loop1): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 34.818467][ T3302] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.860210][ T3490] syz.3.4 (3490) used greatest stack depth: 10904 bytes left [ 34.870225][ T3507] bridge0: entered allmulticast mode [ 34.884509][ T3313] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.885248][ T3507] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9'. [ 34.903757][ T3507] bridge_slave_1: left allmulticast mode [ 34.903774][ T3507] bridge_slave_1: left promiscuous mode [ 34.904120][ T3507] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.910851][ T3507] bridge_slave_0: left allmulticast mode [ 34.910937][ T3507] bridge_slave_0: left promiscuous mode [ 34.911073][ T3507] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.926836][ T3507] bridge0 (unregistering): left allmulticast mode [ 35.342214][ T3523] netlink: 8 bytes leftover after parsing attributes in process `syz.0.14'. [ 35.914544][ T3535] netlink: 'syz.3.18': attribute type 3 has an invalid length. [ 35.944169][ C0] hrtimer: interrupt took 27507 ns [ 36.027687][ T3517] syz.4.13 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 36.038590][ T3517] CPU: 0 UID: 0 PID: 3517 Comm: syz.4.13 Not tainted 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 36.038618][ T3517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 36.038689][ T3517] Call Trace: [ 36.038696][ T3517] [ 36.038704][ T3517] __dump_stack+0x1d/0x30 [ 36.038728][ T3517] dump_stack_lvl+0xe8/0x140 [ 36.038779][ T3517] dump_stack+0x15/0x1b [ 36.038818][ T3517] dump_header+0x81/0x220 [ 36.038854][ T3517] oom_kill_process+0x334/0x3f0 [ 36.038883][ T3517] out_of_memory+0x979/0xb80 [ 36.038921][ T3517] try_charge_memcg+0x5e6/0x9e0 [ 36.039002][ T3517] charge_memcg+0x51/0xc0 [ 36.039088][ T3517] mem_cgroup_swapin_charge_folio+0xcc/0x150 [ 36.039164][ T3517] __read_swap_cache_async+0x1df/0x350 [ 36.039209][ T3517] swap_cluster_readahead+0x277/0x3e0 [ 36.039309][ T3517] swapin_readahead+0xde/0x6f0 [ 36.039347][ T3517] ? __filemap_get_folio+0x4f7/0x6b0 [ 36.039454][ T3517] ? swap_cache_get_folio+0x77/0x200 [ 36.039493][ T3517] do_swap_page+0x301/0x2430 [ 36.039525][ T3517] ? css_rstat_updated+0xcd/0x5b0 [ 36.039595][ T3517] ? __pfx_default_wake_function+0x10/0x10 [ 36.039630][ T3517] handle_mm_fault+0x9a5/0x2be0 [ 36.039691][ T3517] ? mas_walk+0xf2/0x120 [ 36.039792][ T3517] do_user_addr_fault+0x636/0x1090 [ 36.039837][ T3517] exc_page_fault+0x62/0xa0 [ 36.039918][ T3517] asm_exc_page_fault+0x26/0x30 [ 36.039942][ T3517] RIP: 0033:0x7f73fddc1213 [ 36.039961][ T3517] Code: e7 08 00 48 8d 3d 76 e7 08 00 e8 e8 48 f6 ff 0f 1f 84 00 00 00 00 00 83 ff 03 74 7b 83 ff 02 b8 fa ff ff ff 49 89 ca 0f 44 f8 <80> 3d 1e 63 1c 00 00 74 14 b8 e6 00 00 00 0f 05 f7 d8 c3 66 2e 0f [ 36.039988][ T3517] RSP: 002b:00007ffe6beb0a68 EFLAGS: 00010293 [ 36.040009][ T3517] RAX: 00000000fffffffa RBX: 00007f73fdfb5fa0 RCX: 0000000000000000 [ 36.040025][ T3517] RDX: 00007ffe6beb0a80 RSI: 0000000000000000 RDI: 0000000000000000 [ 36.040047][ T3517] RBP: 00007f73fdfb7ba0 R08: 000000002bccad18 R09: 7fffffffffffffff [ 36.040072][ T3517] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000008c39 [ 36.040205][ T3517] R13: 00007ffe6beb0ba0 R14: ffffffffffffffff R15: 00007ffe6beb0bc0 [ 36.040289][ T3517] [ 36.040296][ T3517] memory: usage 307200kB, limit 307200kB, failcnt 200 [ 36.255173][ T3517] memory+swap: usage 307368kB, limit 9007199254740988kB, failcnt 0 [ 36.263124][ T3517] kmem: usage 307176kB, limit 9007199254740988kB, failcnt 0 [ 36.270528][ T3517] Memory cgroup stats for /syz4: [ 36.274884][ T3536] loop1: detected capacity change from 0 to 8192 [ 36.286111][ T3517] cache 0 [ 36.289425][ T3517] rss 0 [ 36.292213][ T3517] shmem 0 [ 36.295283][ T3517] mapped_file 0 [ 36.298939][ T3517] dirty 0 [ 36.301918][ T3517] writeback 4096 [ 36.305472][ T3517] workingset_refault_anon 5 [ 36.310033][ T3517] workingset_refault_file 6 [ 36.314565][ T3517] swap 172032 [ 36.317860][ T3517] swapcached 24576 [ 36.321628][ T3517] pgpgin 288 [ 36.324852][ T3517] pgpgout 282 [ 36.328153][ T3517] pgfault 398 [ 36.331590][ T3517] pgmajfault 6 [ 36.334987][ T3517] inactive_anon 4096 [ 36.338939][ T3517] active_anon 20480 [ 36.342835][ T3517] inactive_file 0 [ 36.346494][ T3517] active_file 0 [ 36.350000][ T3517] unevictable 0 [ 36.353497][ T3517] hierarchical_memory_limit 314572800 [ 36.358946][ T3517] hierarchical_memsw_limit 9223372036854771712 [ 36.365130][ T3517] total_cache 0 [ 36.368685][ T3517] total_rss 0 [ 36.371442][ T3533] netlink: 156 bytes leftover after parsing attributes in process `syz.1.17'. [ 36.372069][ T3517] total_shmem 0 [ 36.372080][ T3517] total_mapped_file 0 [ 36.388666][ T3517] total_dirty 0 [ 36.392188][ T3517] total_writeback 4096 [ 36.396273][ T3517] total_workingset_refault_anon 5 [ 36.401387][ T3517] total_workingset_refault_file 6 [ 36.406488][ T3517] total_swap 172032 [ 36.410401][ T3517] total_swapcached 24576 [ 36.414726][ T3517] total_pgpgin 288 [ 36.418610][ T3517] total_pgpgout 282 [ 36.422606][ T3517] total_pgfault 398 [ 36.426687][ T3517] total_pgmajfault 6 [ 36.430664][ T3517] total_inactive_anon 4096 [ 36.435181][ T3517] total_active_anon 20480 [ 36.439675][ T3517] total_inactive_file 0 [ 36.443857][ T3517] total_active_file 0 [ 36.447862][ T3517] total_unevictable 0 [ 36.452074][ T3517] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz4,task_memcg=/syz4,task=syz.4.13,pid=3517,uid=0 [ 36.466950][ T3517] Memory cgroup out of memory: Killed process 3517 (syz.4.13) total-vm:95676kB, anon-rss:944kB, file-rss:22452kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 36.503931][ T3533] netlink: 24 bytes leftover after parsing attributes in process `syz.1.17'. [ 36.550304][ T3517] syz.4.13 (3517) used greatest stack depth: 9688 bytes left [ 36.614714][ T3545] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.622084][ T3545] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.633099][ T3552] netlink: 'syz.3.24': attribute type 6 has an invalid length. [ 36.684285][ T3556] netlink: 12 bytes leftover after parsing attributes in process `syz.3.24'. [ 36.686680][ T3545] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 36.712120][ T3545] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 36.712128][ T3556] netlink: 12 bytes leftover after parsing attributes in process `syz.3.24'. [ 36.753479][ T3556] netlink: 12 bytes leftover after parsing attributes in process `syz.3.24'. [ 36.798418][ T3545] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.807482][ T3545] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.816417][ T3545] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.825386][ T3545] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.968658][ T3572] loop2: detected capacity change from 0 to 128 [ 37.007111][ T3572] FAT-fs (loop2): FAT read failed (blocknr 234) [ 37.013323][ T3572] FAT-fs (loop2): FAT read failed (blocknr 234) [ 37.108624][ T3518] syz.4.13 (3518) used greatest stack depth: 7160 bytes left [ 37.137135][ T3582] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 37.145744][ T3582] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 37.235092][ T3576] netlink: 8 bytes leftover after parsing attributes in process `syz.3.28'. [ 37.244018][ T3576] netlink: 4 bytes leftover after parsing attributes in process `syz.3.28'. [ 37.252811][ T3576] netlink: 'syz.3.28': attribute type 12 has an invalid length. [ 37.266718][ T3589] netlink: 'syz.4.34': attribute type 4 has an invalid length. [ 37.349807][ T3592] netlink: 'syz.4.34': attribute type 4 has an invalid length. [ 37.389694][ T3594] Zero length message leads to an empty skb [ 38.694556][ T3578] syz.2.29 (3578) used greatest stack depth: 6952 bytes left [ 38.720914][ T3620] loop2: detected capacity change from 0 to 1024 [ 38.730488][ T3620] EXT4-fs: inline encryption not supported [ 38.743196][ T3620] EXT4-fs: Ignoring removed bh option [ 38.779859][ T3620] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 38.801960][ T3620] EXT4-fs (loop2): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 38.824199][ T3307] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.958255][ T3642] netlink: 'syz.2.48': attribute type 3 has an invalid length. [ 39.711400][ T3661] loop0: detected capacity change from 0 to 1024 [ 39.718233][ T3661] EXT4-fs: Ignoring removed orlov option [ 39.728794][ T3661] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 39.911958][ T3671] 9pnet_fd: Insufficient options for proto=fd [ 39.922360][ T29] kauditd_printk_skb: 130 callbacks suppressed [ 39.922377][ T29] audit: type=1326 audit(1753746317.610:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.0.54" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1406ce9a9 code=0x7ffc0000 [ 39.952081][ T29] audit: type=1326 audit(1753746317.610:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.0.54" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fa1406ce9a9 code=0x7ffc0000 [ 39.975374][ T29] audit: type=1326 audit(1753746317.610:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.0.54" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fa1406ce9e3 code=0x7ffc0000 [ 39.975519][ T3668] loop1: detected capacity change from 0 to 1024 [ 39.998753][ T29] audit: type=1326 audit(1753746317.610:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.0.54" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fa1406cd45f code=0x7ffc0000 [ 40.039328][ T29] audit: type=1326 audit(1753746317.690:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.0.54" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7fa1406cea37 code=0x7ffc0000 [ 40.043793][ T3668] EXT4-fs: inline encryption not supported [ 40.062670][ T29] audit: type=1326 audit(1753746317.720:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.0.54" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa1406cd310 code=0x7ffc0000 [ 40.091541][ T29] audit: type=1326 audit(1753746317.720:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.0.54" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fa1406cd60a code=0x7ffc0000 [ 40.114687][ T29] audit: type=1326 audit(1753746317.730:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.0.54" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1406ce9a9 code=0x7ffc0000 [ 40.137870][ T29] audit: type=1326 audit(1753746317.730:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.0.54" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1406ce9a9 code=0x7ffc0000 [ 40.200614][ T3668] EXT4-fs: Ignoring removed bh option [ 40.445792][ T3668] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.464453][ T29] audit: type=1326 audit(1753746317.970:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3660 comm="syz.0.54" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa1406ce9a9 code=0x7ffc0000 [ 40.719712][ T3668] EXT4-fs (loop1): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 40.795934][ T3686] netlink: 'syz.2.62': attribute type 3 has an invalid length. [ 40.814569][ T3302] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.072724][ T3304] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.351135][ T3710] loop4: detected capacity change from 0 to 512 [ 41.371162][ T3710] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz.4.68: bg 0: block 248: padding at end of block bitmap is not set [ 41.394003][ T3710] EXT4-fs error (device loop4): ext4_acquire_dquot:6933: comm syz.4.68: Failed to acquire dquot type 1 [ 41.406969][ T3710] EXT4-fs (loop4): 1 truncate cleaned up [ 41.414704][ T3710] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.429879][ T3710] ext4 filesystem being mounted at /11/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 41.878433][ T3730] loop1: detected capacity change from 0 to 1024 [ 41.903343][ T3730] EXT4-fs: inline encryption not supported [ 41.926770][ T3730] EXT4-fs: Ignoring removed bh option [ 41.964597][ T3730] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.992473][ T3730] EXT4-fs (loop1): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 42.020110][ T3302] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.137365][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.160796][ T3742] netlink: 'syz.1.74': attribute type 3 has an invalid length. [ 42.979489][ T3766] netlink: 'syz.2.82': attribute type 4 has an invalid length. [ 42.989028][ T3766] netlink: 'syz.2.82': attribute type 4 has an invalid length. [ 43.111360][ T3771] loop0: detected capacity change from 0 to 1024 [ 43.122251][ T3771] EXT4-fs: inline encryption not supported [ 43.128723][ T3771] EXT4-fs: Ignoring removed bh option [ 43.151306][ T3771] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 43.176969][ T3771] EXT4-fs (loop0): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 43.311899][ T3304] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.987876][ T3797] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.94'. [ 44.003995][ T3801] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.94'. [ 44.440891][ T3810] loop4: detected capacity change from 0 to 1024 [ 44.447713][ T3810] EXT4-fs: inline encryption not supported [ 44.457405][ T3806] loop2: detected capacity change from 0 to 1024 [ 44.464571][ T3810] EXT4-fs: Ignoring removed bh option [ 44.510444][ T3806] EXT4-fs: Ignoring removed orlov option [ 44.535864][ T3810] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 44.561872][ T3816] loop0: detected capacity change from 0 to 1024 [ 44.574818][ T3806] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 44.595733][ T3816] EXT4-fs: inline encryption not supported [ 44.615202][ T3810] EXT4-fs (loop4): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 44.631229][ T3816] EXT4-fs: Ignoring removed bh option [ 44.659641][ T3816] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 44.684531][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.707538][ T3816] EXT4-fs (loop0): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 44.799737][ T3304] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 45.110232][ T3844] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.107'. [ 45.119888][ T3839] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.107'. [ 45.437226][ T29] kauditd_printk_skb: 134 callbacks suppressed [ 45.437240][ T29] audit: type=1326 audit(1753746323.120:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3847 comm="syz.3.109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd05b8be9a9 code=0x7ffc0000 [ 45.495117][ T29] audit: type=1326 audit(1753746323.120:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3847 comm="syz.3.109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd05b8be9a9 code=0x7ffc0000 [ 45.518537][ T29] audit: type=1326 audit(1753746323.120:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3847 comm="syz.3.109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd05b8be9a9 code=0x7ffc0000 [ 45.541965][ T29] audit: type=1326 audit(1753746323.120:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3847 comm="syz.3.109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd05b8be9a9 code=0x7ffc0000 [ 45.565579][ T29] audit: type=1326 audit(1753746323.120:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3847 comm="syz.3.109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd05b8be9a9 code=0x7ffc0000 [ 45.589408][ T29] audit: type=1326 audit(1753746323.120:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3847 comm="syz.3.109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd05b8be9a9 code=0x7ffc0000 [ 45.612988][ T29] audit: type=1326 audit(1753746323.120:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3847 comm="syz.3.109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd05b8be9a9 code=0x7ffc0000 [ 45.636347][ T29] audit: type=1326 audit(1753746323.120:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3847 comm="syz.3.109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd05b8be9a9 code=0x7ffc0000 [ 45.659817][ T29] audit: type=1326 audit(1753746323.120:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3847 comm="syz.3.109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd05b8be9a9 code=0x7ffc0000 [ 45.683293][ T29] audit: type=1326 audit(1753746323.120:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3847 comm="syz.3.109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd05b8be9a9 code=0x7ffc0000 [ 45.707744][ T3307] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 45.841245][ T3856] loop4: detected capacity change from 0 to 512 [ 45.874472][ T3856] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 46.025642][ T3856] EXT4-fs (loop4): 1 orphan inode deleted [ 46.031929][ T3856] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 46.053386][ T51] EXT4-fs error (device loop4): ext4_release_dquot:6969: comm kworker/u8:3: Failed to release dquot type 1 [ 46.086584][ T3856] ext4 filesystem being mounted at /21/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 46.113194][ T3856] EXT4-fs (loop4): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 46.221430][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.456666][ T3878] FAULT_INJECTION: forcing a failure. [ 46.456666][ T3878] name failslab, interval 1, probability 0, space 0, times 1 [ 46.470080][ T3878] CPU: 0 UID: 0 PID: 3878 Comm: syz.3.120 Not tainted 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 46.470171][ T3878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 46.470187][ T3878] Call Trace: [ 46.470256][ T3878] [ 46.470263][ T3878] __dump_stack+0x1d/0x30 [ 46.470290][ T3878] dump_stack_lvl+0xe8/0x140 [ 46.470308][ T3878] dump_stack+0x15/0x1b [ 46.470382][ T3878] should_fail_ex+0x265/0x280 [ 46.470556][ T3878] should_failslab+0x8c/0xb0 [ 46.470577][ T3878] kmem_cache_alloc_noprof+0x50/0x310 [ 46.470607][ T3878] ? audit_log_start+0x365/0x6c0 [ 46.470638][ T3878] audit_log_start+0x365/0x6c0 [ 46.470860][ T3878] audit_seccomp+0x48/0x100 [ 46.470890][ T3878] ? __seccomp_filter+0x68c/0x10d0 [ 46.470911][ T3878] __seccomp_filter+0x69d/0x10d0 [ 46.470940][ T3878] ? _raw_spin_unlock+0x26/0x50 [ 46.470968][ T3878] __secure_computing+0x82/0x150 [ 46.471055][ T3878] syscall_trace_enter+0xcf/0x1e0 [ 46.471086][ T3878] do_syscall_64+0xac/0x200 [ 46.471110][ T3878] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 46.471137][ T3878] ? clear_bhb_loop+0x40/0x90 [ 46.471189][ T3878] ? clear_bhb_loop+0x40/0x90 [ 46.471216][ T3878] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 46.471242][ T3878] RIP: 0033:0x7fd05b8bd3bc [ 46.471261][ T3878] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 46.471284][ T3878] RSP: 002b:00007fd059f27030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 46.471314][ T3878] RAX: ffffffffffffffda RBX: 00007fd05bae5fa0 RCX: 00007fd05b8bd3bc [ 46.471325][ T3878] RDX: 000000000000000f RSI: 00007fd059f270a0 RDI: 0000000000000006 [ 46.471336][ T3878] RBP: 00007fd059f27090 R08: 0000000000000000 R09: 0000000000000000 [ 46.471347][ T3878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 46.471364][ T3878] R13: 0000000000000000 R14: 00007fd05bae5fa0 R15: 00007ffd8f73d0b8 [ 46.471389][ T3878] [ 47.025599][ T3893] loop3: detected capacity change from 0 to 4096 [ 47.129231][ T3893] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 47.178145][ T3313] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 48.632014][ T3929] loop3: detected capacity change from 0 to 1024 [ 48.665343][ T3929] EXT4-fs: inline encryption not supported [ 48.689707][ T3929] EXT4-fs: Ignoring removed bh option [ 48.712673][ T3936] netlink: 4 bytes leftover after parsing attributes in process `syz.1.137'. [ 48.723828][ T3929] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 48.742830][ T3936] team1: entered promiscuous mode [ 48.754480][ T3936] team1: entered allmulticast mode [ 48.759774][ T3929] EXT4-fs (loop3): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 48.892958][ T3313] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.267554][ T29] kauditd_printk_skb: 91 callbacks suppressed [ 51.267568][ T29] audit: type=1400 audit(1753746328.950:485): avc: denied { search } for pid=3033 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 51.318442][ T29] audit: type=1400 audit(1753746328.950:486): avc: denied { search } for pid=3033 comm="dhcpcd" name="udev" dev="tmpfs" ino=9 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 51.340265][ T29] audit: type=1400 audit(1753746328.950:487): avc: denied { search } for pid=3033 comm="dhcpcd" name="data" dev="tmpfs" ino=13 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 51.361965][ T29] audit: type=1400 audit(1753746328.950:488): avc: denied { read } for pid=3033 comm="dhcpcd" name="n25" dev="tmpfs" ino=1382 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 51.383546][ T29] audit: type=1400 audit(1753746328.950:489): avc: denied { open } for pid=3033 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=1382 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 51.406540][ T29] audit: type=1400 audit(1753746328.950:490): avc: denied { getattr } for pid=3033 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=1382 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 51.429810][ T29] audit: type=1326 audit(1753746328.980:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3976 comm="syz.4.149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f73fdd8e9a9 code=0x7ffc0000 [ 51.453379][ T29] audit: type=1326 audit(1753746328.980:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3976 comm="syz.4.149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f73fdd8e9a9 code=0x7ffc0000 [ 51.476732][ T29] audit: type=1326 audit(1753746328.980:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3976 comm="syz.4.149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=274 compat=0 ip=0x7f73fdd8e9a9 code=0x7ffc0000 [ 51.500082][ T29] audit: type=1326 audit(1753746328.980:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3976 comm="syz.4.149" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f73fdd8e9a9 code=0x7ffc0000 [ 51.608899][ T3979] SELinux: Context system_u:object_r:modules_object_t:s0 is not valid (left unmapped). [ 51.917001][ T3983] loop1: detected capacity change from 0 to 1024 [ 51.924100][ T3983] EXT4-fs: Ignoring removed orlov option [ 52.008213][ T4000] 9pnet: Could not find request transport: r [ 52.141838][ T3983] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 52.236385][ T4006] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.160'. [ 52.260607][ T4007] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.160'. [ 52.834450][ T4012] loop4: detected capacity change from 0 to 1024 [ 52.916651][ T4012] EXT4-fs: Ignoring removed orlov option [ 53.012763][ T4012] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 53.043349][ T4036] loop2: detected capacity change from 0 to 1024 [ 53.196391][ T4036] EXT4-fs: Ignoring removed orlov option [ 53.214233][ T3302] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 53.318962][ T4036] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 53.731045][ T4049] 9pnet_fd: Insufficient options for proto=fd [ 53.742382][ T4051] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=22290 sclass=netlink_tcpdiag_socket pid=4051 comm=syz.1.172 [ 53.810357][ T4051] syz.1.172 uses obsolete (PF_INET,SOCK_PACKET) [ 53.817159][ T4051] syzkaller1: entered promiscuous mode [ 53.822763][ T4051] syzkaller1: entered allmulticast mode [ 53.871787][ T3307] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 54.367626][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 54.412241][ T4075] netlink: 8 bytes leftover after parsing attributes in process `syz.3.181'. [ 54.500727][ T4084] lo speed is unknown, defaulting to 1000 [ 54.630381][ T4084] lo speed is unknown, defaulting to 1000 [ 54.636393][ T4084] lo speed is unknown, defaulting to 1000 [ 54.651779][ T4084] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 54.661887][ T4084] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 54.735141][ T4084] lo speed is unknown, defaulting to 1000 [ 54.754322][ T4084] lo speed is unknown, defaulting to 1000 [ 54.776983][ T4084] lo speed is unknown, defaulting to 1000 [ 54.819342][ T4084] lo speed is unknown, defaulting to 1000 [ 54.908908][ T4084] lo speed is unknown, defaulting to 1000 [ 54.915170][ T4084] lo speed is unknown, defaulting to 1000 [ 54.938976][ T4087] siw: device registration error -23 [ 55.271666][ T4104] lo speed is unknown, defaulting to 1000 [ 55.346987][ T4104] loop3: detected capacity change from 0 to 1024 [ 55.369056][ T4104] EXT4-fs: Ignoring removed orlov option [ 55.377290][ T4104] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 56.112566][ T4110] syz.0.195 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 56.126680][ T4110] CPU: 0 UID: 0 PID: 4110 Comm: syz.0.195 Not tainted 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 56.126711][ T4110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 56.126727][ T4110] Call Trace: [ 56.126736][ T4110] [ 56.126745][ T4110] __dump_stack+0x1d/0x30 [ 56.126773][ T4110] dump_stack_lvl+0xe8/0x140 [ 56.126836][ T4110] dump_stack+0x15/0x1b [ 56.126854][ T4110] dump_header+0x81/0x220 [ 56.126886][ T4110] oom_kill_process+0x334/0x3f0 [ 56.126923][ T4110] out_of_memory+0x979/0xb80 [ 56.127038][ T4110] try_charge_memcg+0x5e6/0x9e0 [ 56.127094][ T4110] obj_cgroup_charge_pages+0xa6/0x150 [ 56.127148][ T4110] __memcg_kmem_charge_page+0x9f/0x170 [ 56.127206][ T4110] __alloc_frozen_pages_noprof+0x188/0x360 [ 56.127320][ T4110] alloc_pages_mpol+0xb3/0x250 [ 56.127363][ T4110] alloc_pages_noprof+0x90/0x130 [ 56.127403][ T4110] __vmalloc_node_range_noprof+0x6f2/0xe00 [ 56.127490][ T4110] __kvmalloc_node_noprof+0x30f/0x4e0 [ 56.127529][ T4110] ? ip_set_alloc+0x1f/0x30 [ 56.127558][ T4110] ? ip_set_alloc+0x1f/0x30 [ 56.127585][ T4110] ? __kmalloc_cache_noprof+0x189/0x320 [ 56.127691][ T4110] ip_set_alloc+0x1f/0x30 [ 56.127726][ T4110] hash_netiface_create+0x282/0x740 [ 56.127842][ T4110] ? __pfx_hash_netiface_create+0x10/0x10 [ 56.127944][ T4110] ip_set_create+0x3c9/0x960 [ 56.128029][ T4110] ? __nla_parse+0x40/0x60 [ 56.128052][ T4110] nfnetlink_rcv_msg+0x4c6/0x590 [ 56.128108][ T4110] ? selinux_capable+0x1f9/0x270 [ 56.128150][ T4110] netlink_rcv_skb+0x123/0x220 [ 56.128203][ T4110] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 56.128296][ T4110] nfnetlink_rcv+0x16b/0x1690 [ 56.128322][ T4110] ? __kfree_skb+0x109/0x150 [ 56.128353][ T4110] ? nlmon_xmit+0x4f/0x60 [ 56.128397][ T4110] ? consume_skb+0x49/0x150 [ 56.128439][ T4110] ? nlmon_xmit+0x4f/0x60 [ 56.128524][ T4110] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 56.128712][ T4110] ? __dev_queue_xmit+0x11c0/0x1fb0 [ 56.128732][ T4110] ? __dev_queue_xmit+0x182/0x1fb0 [ 56.128753][ T4110] ? ref_tracker_free+0x37d/0x3e0 [ 56.128822][ T4110] ? __netlink_deliver_tap+0x4dc/0x500 [ 56.128854][ T4110] netlink_unicast+0x5a8/0x680 [ 56.128898][ T4110] netlink_sendmsg+0x58b/0x6b0 [ 56.128964][ T4110] ? __pfx_netlink_sendmsg+0x10/0x10 [ 56.129017][ T4110] __sock_sendmsg+0x142/0x180 [ 56.129042][ T4110] ____sys_sendmsg+0x31e/0x4e0 [ 56.129099][ T4110] ___sys_sendmsg+0x17b/0x1d0 [ 56.129209][ T4110] __x64_sys_sendmsg+0xd4/0x160 [ 56.129240][ T4110] x64_sys_call+0x2999/0x2fb0 [ 56.129270][ T4110] do_syscall_64+0xd2/0x200 [ 56.129295][ T4110] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 56.129408][ T4110] ? clear_bhb_loop+0x40/0x90 [ 56.129436][ T4110] ? clear_bhb_loop+0x40/0x90 [ 56.129552][ T4110] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 56.129686][ T4110] RIP: 0033:0x7fa1406ce9a9 [ 56.129704][ T4110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 56.129726][ T4110] RSP: 002b:00007fa13ed37038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 56.129750][ T4110] RAX: ffffffffffffffda RBX: 00007fa1408f5fa0 RCX: 00007fa1406ce9a9 [ 56.129767][ T4110] RDX: 0000000000000810 RSI: 0000200000000040 RDI: 0000000000000005 [ 56.129783][ T4110] RBP: 00007fa140750d69 R08: 0000000000000000 R09: 0000000000000000 [ 56.129804][ T4110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 56.129821][ T4110] R13: 0000000000000000 R14: 00007fa1408f5fa0 R15: 00007ffd6cdf7928 [ 56.129889][ T4110] [ 56.474409][ T4110] memory: usage 307200kB, limit 307200kB, failcnt 349 [ 56.481263][ T4110] memory+swap: usage 307396kB, limit 9007199254740988kB, failcnt 0 [ 56.489255][ T4110] kmem: usage 307196kB, limit 9007199254740988kB, failcnt 0 [ 56.496554][ T4110] Memory cgroup stats for /syz0: [ 56.633477][ T4110] cache 4096 [ 56.641732][ T4110] rss 0 [ 56.644554][ T4110] shmem 0 [ 56.647514][ T4110] mapped_file 0 [ 56.651028][ T4110] dirty 0 [ 56.654077][ T4110] writeback 0 [ 56.657377][ T4110] workingset_refault_anon 108 [ 56.662091][ T4110] workingset_refault_file 462 [ 56.666813][ T4110] swap 204800 [ 56.670144][ T4110] swapcached 0 [ 56.673628][ T4110] pgpgin 26199 [ 56.677098][ T4110] pgpgout 26198 [ 56.680593][ T4110] pgfault 28079 [ 56.684077][ T4110] pgmajfault 74 [ 56.687571][ T4110] inactive_anon 0 [ 56.691272][ T4110] active_anon 0 [ 56.694750][ T4110] inactive_file 0 [ 56.698389][ T4110] active_file 0 [ 56.699098][ T29] kauditd_printk_skb: 3562 callbacks suppressed [ 56.699115][ T29] audit: type=1326 audit(1753746334.380:4051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4138 comm="syz.1.204" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f5e88e6e9a9 code=0x0 [ 56.701934][ T4110] unevictable 0 [ 56.734480][ T4110] hierarchical_memory_limit 314572800 [ 56.739884][ T4110] hierarchical_memsw_limit 9223372036854771712 [ 56.746050][ T4110] total_cache 4096 [ 56.749850][ T4110] total_rss 0 [ 56.753166][ T4110] total_shmem 0 [ 56.756731][ T4110] total_mapped_file 0 [ 56.760810][ T4110] total_dirty 0 [ 56.764282][ T4110] total_writeback 0 [ 56.768140][ T4110] total_workingset_refault_anon 108 [ 56.773433][ T4110] total_workingset_refault_file 462 [ 56.778665][ T4110] total_swap 204800 [ 56.782535][ T4110] total_swapcached 0 [ 56.786486][ T4110] total_pgpgin 26199 [ 56.790448][ T4110] total_pgpgout 26198 [ 56.794454][ T4110] total_pgfault 28079 [ 56.798543][ T4110] total_pgmajfault 74 [ 56.802560][ T4110] total_inactive_anon 0 [ 56.806769][ T4110] total_active_anon 0 [ 56.810796][ T4110] total_inactive_file 0 [ 56.815056][ T4110] total_active_file 0 [ 56.819196][ T4110] total_unevictable 0 [ 56.823267][ T4110] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.195,pid=4109,uid=0 [ 56.837926][ T4110] Memory cgroup out of memory: Killed process 4109 (syz.0.195) total-vm:93760kB, anon-rss:940kB, file-rss:22440kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 58.067979][ T3313] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 58.209211][ T29] audit: type=1326 audit(1753746335.900:4052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4154 comm="syz.2.210" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f4e61bce9a9 code=0x0 [ 58.275893][ T29] audit: type=1326 audit(1753746335.930:4053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.4.211" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f73fdd85967 code=0x7ffc0000 [ 58.299636][ T29] audit: type=1326 audit(1753746335.930:4054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.4.211" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f73fdd2ab89 code=0x7ffc0000 [ 58.322958][ T29] audit: type=1326 audit(1753746335.930:4055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.4.211" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f73fdd85967 code=0x7ffc0000 [ 58.346268][ T29] audit: type=1326 audit(1753746335.930:4056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.4.211" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f73fdd2ab89 code=0x7ffc0000 [ 58.369582][ T29] audit: type=1326 audit(1753746335.930:4057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.4.211" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f73fdd85967 code=0x7ffc0000 [ 58.392904][ T29] audit: type=1326 audit(1753746335.930:4058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.4.211" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f73fdd2ab89 code=0x7ffc0000 [ 58.416240][ T29] audit: type=1326 audit(1753746335.930:4059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.4.211" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f73fdd85967 code=0x7ffc0000 [ 58.439578][ T29] audit: type=1326 audit(1753746335.930:4060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4157 comm="syz.4.211" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f73fdd2ab89 code=0x7ffc0000 [ 59.482560][ T30] oom_reaper: reaped process 4109 (syz.0.195), now anon-rss:0kB, file-rss:21252kB, shmem-rss:0kB [ 59.914158][ T4181] lo speed is unknown, defaulting to 1000 [ 59.961309][ T4202] loop2: detected capacity change from 0 to 1024 [ 59.968156][ T4202] EXT4-fs: Ignoring removed orlov option [ 59.976112][ T4202] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 60.872292][ T3307] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.902658][ T4221] loop2: detected capacity change from 0 to 512 [ 61.022699][ T4221] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 61.132913][ T4221] ext4 filesystem being mounted at /45/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 61.422912][ T3307] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.724885][ T29] kauditd_printk_skb: 261 callbacks suppressed [ 61.724899][ T29] audit: type=1326 audit(1753746339.410:4322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.239" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fa1406ce9a9 code=0x0 [ 61.887108][ T29] audit: type=1326 audit(1753746339.560:4323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.1.240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5e88e6e9a9 code=0x7ffc0000 [ 61.910618][ T29] audit: type=1326 audit(1753746339.560:4324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.1.240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5e88e6e9a9 code=0x7ffc0000 [ 61.934001][ T29] audit: type=1326 audit(1753746339.560:4325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.1.240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=104 compat=0 ip=0x7f5e88e6e9a9 code=0x7ffc0000 [ 61.957578][ T29] audit: type=1326 audit(1753746339.560:4326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.1.240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5e88e6e9a9 code=0x7ffc0000 [ 61.980998][ T29] audit: type=1326 audit(1753746339.560:4327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.1.240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=4 compat=0 ip=0x7f5e88e6e9a9 code=0x7ffc0000 [ 62.004221][ T29] audit: type=1326 audit(1753746339.560:4328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.1.240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5e88e6e9a9 code=0x7ffc0000 [ 62.027628][ T29] audit: type=1326 audit(1753746339.570:4329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.1.240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5e88e6e9a9 code=0x7ffc0000 [ 62.051056][ T29] audit: type=1326 audit(1753746339.570:4330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.1.240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=94 compat=0 ip=0x7f5e88e6e9a9 code=0x7ffc0000 [ 62.074332][ T29] audit: type=1326 audit(1753746339.570:4331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4245 comm="syz.1.240" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5e88e6e9a9 code=0x7ffc0000 [ 62.334686][ T4249] lo speed is unknown, defaulting to 1000 [ 62.418012][ T4249] loop1: detected capacity change from 0 to 1024 [ 62.426157][ T4249] EXT4-fs: Ignoring removed orlov option [ 62.435557][ T4249] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 63.304509][ T4286] loop2: detected capacity change from 0 to 1764 [ 63.524249][ T3302] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 63.924840][ T4286] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(4) [ 63.931411][ T4286] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 63.939025][ T4286] vhci_hcd vhci_hcd.0: Device attached [ 63.994263][ T4295] vhci_hcd vhci_hcd.0: pdev(2) rhport(1) sockfd(6) [ 64.000896][ T4295] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 64.008564][ T4295] vhci_hcd vhci_hcd.0: Device attached [ 64.114255][ T4286] vhci_hcd vhci_hcd.0: pdev(2) rhport(2) sockfd(8) [ 64.120844][ T4286] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 64.121872][ T4295] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 64.128659][ T4286] vhci_hcd vhci_hcd.0: Device attached [ 64.151776][ T4295] vhci_hcd vhci_hcd.0: pdev(2) rhport(4) sockfd(13) [ 64.158479][ T4295] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 64.166130][ T4295] vhci_hcd vhci_hcd.0: Device attached [ 64.216535][ T4286] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 64.224800][ T1035] usb 5-1: new low-speed USB device number 2 using vhci_hcd [ 64.240538][ T4286] vhci_hcd vhci_hcd.0: pdev(2) rhport(6) sockfd(16) [ 64.247201][ T4286] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 64.254884][ T4286] vhci_hcd vhci_hcd.0: Device attached [ 64.269088][ T4286] vhci_hcd vhci_hcd.0: pdev(2) rhport(7) sockfd(18) [ 64.275851][ T4286] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 64.283490][ T4286] vhci_hcd vhci_hcd.0: Device attached [ 64.299735][ T4311] vhci_hcd: connection closed [ 64.299822][ T4316] vhci_hcd: connection closed [ 64.299968][ T4307] vhci_hcd: connection closed [ 64.304660][ T4291] vhci_hcd: connection reset by peer [ 64.309557][ T4296] vhci_hcd: connection closed [ 64.319652][ T4303] vhci_hcd: connection closed [ 64.325693][ T159] vhci_hcd: stop threads [ 64.334710][ T159] vhci_hcd: release socket [ 64.339239][ T159] vhci_hcd: disconnect device [ 64.362914][ T159] vhci_hcd: stop threads [ 64.367298][ T159] vhci_hcd: release socket [ 64.372233][ T159] vhci_hcd: disconnect device [ 64.387372][ T159] vhci_hcd: stop threads [ 64.391831][ T159] vhci_hcd: release socket [ 64.396287][ T159] vhci_hcd: disconnect device [ 64.424626][ T159] vhci_hcd: stop threads [ 64.429074][ T159] vhci_hcd: release socket [ 64.433570][ T159] vhci_hcd: disconnect device [ 64.445363][ T159] vhci_hcd: stop threads [ 64.449695][ T159] vhci_hcd: release socket [ 64.454134][ T159] vhci_hcd: disconnect device [ 64.472555][ T159] vhci_hcd: stop threads [ 64.476855][ T159] vhci_hcd: release socket [ 64.481350][ T159] vhci_hcd: disconnect device [ 65.070904][ T4335] lo speed is unknown, defaulting to 1000 [ 65.105671][ T4338] loop2: detected capacity change from 0 to 1024 [ 65.113913][ T4338] EXT4-fs: Ignoring removed orlov option [ 65.151703][ T4338] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 66.522967][ T4364] netlink: 20 bytes leftover after parsing attributes in process `syz.3.275'. [ 66.532635][ T4364] x_tables: ip6_tables: mh match: only valid for protocol 135 [ 66.546726][ T4369] loop4: detected capacity change from 0 to 512 [ 66.554583][ T4364] process 'syz.3.275' launched './file0' with NULL argv: empty string added [ 66.561192][ T4369] loop4: detected capacity change from 0 to 1024 [ 66.739902][ T29] kauditd_printk_skb: 147 callbacks suppressed [ 66.739920][ T29] audit: type=1400 audit(1753746344.430:4479): avc: denied { create } for pid=4363 comm="syz.3.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 67.014168][ T3307] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 67.053217][ T29] audit: type=1326 audit(1753746344.740:4480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4382 comm="syz.2.281" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f4e61bce9a9 code=0x0 [ 67.422804][ T29] audit: type=1326 audit(1753746345.110:4481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4394 comm="syz.0.285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1406ce9a9 code=0x7ffc0000 [ 67.446370][ T29] audit: type=1326 audit(1753746345.110:4482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4394 comm="syz.0.285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1406ce9a9 code=0x7ffc0000 [ 67.469850][ T29] audit: type=1326 audit(1753746345.110:4483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4394 comm="syz.0.285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=104 compat=0 ip=0x7fa1406ce9a9 code=0x7ffc0000 [ 67.493805][ T29] audit: type=1326 audit(1753746345.110:4484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4394 comm="syz.0.285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1406ce9a9 code=0x7ffc0000 [ 67.517188][ T29] audit: type=1326 audit(1753746345.110:4485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4394 comm="syz.0.285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=4 compat=0 ip=0x7fa1406ce9a9 code=0x7ffc0000 [ 67.540488][ T29] audit: type=1326 audit(1753746345.110:4486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4394 comm="syz.0.285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1406ce9a9 code=0x7ffc0000 [ 67.563866][ T29] audit: type=1326 audit(1753746345.110:4487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4394 comm="syz.0.285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=94 compat=0 ip=0x7fa1406ce9a9 code=0x7ffc0000 [ 67.587305][ T29] audit: type=1326 audit(1753746345.110:4488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4394 comm="syz.0.285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa1406ce9a9 code=0x7ffc0000 [ 67.623134][ T4377] syz.4.279 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 67.634083][ T4377] CPU: 1 UID: 0 PID: 4377 Comm: syz.4.279 Not tainted 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 67.634112][ T4377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 67.634129][ T4377] Call Trace: [ 67.634137][ T4377] [ 67.634147][ T4377] __dump_stack+0x1d/0x30 [ 67.634231][ T4377] dump_stack_lvl+0xe8/0x140 [ 67.634256][ T4377] dump_stack+0x15/0x1b [ 67.634275][ T4377] dump_header+0x81/0x220 [ 67.634377][ T4377] oom_kill_process+0x334/0x3f0 [ 67.634415][ T4377] out_of_memory+0x979/0xb80 [ 67.634444][ T4377] try_charge_memcg+0x5e6/0x9e0 [ 67.634550][ T4377] charge_memcg+0x51/0xc0 [ 67.634625][ T4377] mem_cgroup_swapin_charge_folio+0xcc/0x150 [ 67.634669][ T4377] __read_swap_cache_async+0x1df/0x350 [ 67.634711][ T4377] swap_cluster_readahead+0x376/0x3e0 [ 67.634789][ T4377] swapin_readahead+0xde/0x6f0 [ 67.634819][ T4377] ? __filemap_get_folio+0x4f7/0x6b0 [ 67.634857][ T4377] ? __rcu_read_unlock+0x34/0x70 [ 67.634887][ T4377] ? swap_cache_get_folio+0x77/0x200 [ 67.634929][ T4377] do_swap_page+0x301/0x2430 [ 67.635030][ T4377] ? css_rstat_updated+0xcd/0x5b0 [ 67.635076][ T4377] ? __pfx_default_wake_function+0x10/0x10 [ 67.635106][ T4377] handle_mm_fault+0x9a5/0x2be0 [ 67.635127][ T4377] ? mas_walk+0xf2/0x120 [ 67.635228][ T4377] do_user_addr_fault+0x636/0x1090 [ 67.635263][ T4377] exc_page_fault+0x62/0xa0 [ 67.635293][ T4377] asm_exc_page_fault+0x26/0x30 [ 67.635350][ T4377] RIP: 0033:0x7f73fddb6740 [ 67.635369][ T4377] Code: 6e c7 89 13 48 8b 50 08 0f 16 40 50 0f 11 00 48 89 50 50 48 8b 50 10 48 89 78 10 48 89 50 40 48 89 d7 eb b2 66 0f 1f 44 00 00 <64> 48 8b 0c 25 10 00 00 00 8b 91 08 03 00 00 48 8d b9 08 03 00 00 [ 67.635399][ T4377] RSP: 002b:00007ffe6beb0a38 EFLAGS: 00010202 [ 67.635417][ T4377] RAX: 00000000fffffffa RBX: 00007f73fdfb5fa0 RCX: 0000000000000000 [ 67.635433][ T4377] RDX: 00007ffe6beb0a80 RSI: 0000000000000000 RDI: 0000000000000000 [ 67.635447][ T4377] RBP: 00007f73fdfb7ba0 R08: 0000000015258679 R09: 7fffffffffffffff [ 67.635458][ T4377] R10: 0000000000000000 R11: 0000000000000293 R12: 000000000001078b [ 67.635469][ T4377] R13: 00007ffe6beb0ba0 R14: ffffffffffffffff R15: 00007ffe6beb0bc0 [ 67.635488][ T4377] [ 67.635496][ T4377] memory: usage 307200kB, limit 307200kB, failcnt 414 [ 67.855687][ T4377] memory+swap: usage 307388kB, limit 9007199254740988kB, failcnt 0 [ 67.863651][ T4377] kmem: usage 307200kB, limit 9007199254740988kB, failcnt 0 [ 67.871011][ T4377] Memory cgroup stats for /syz4: [ 67.887500][ T4377] cache 0 [ 67.895521][ T4377] rss 0 [ 67.898335][ T4377] shmem 0 [ 67.901312][ T4377] mapped_file 0 [ 67.904789][ T4377] dirty 0 [ 67.907737][ T4377] writeback 0 [ 67.911088][ T4377] workingset_refault_anon 65 [ 67.915685][ T4377] workingset_refault_file 343 [ 67.920479][ T4377] swap 192512 [ 67.923847][ T4377] swapcached 0 [ 67.927349][ T4377] pgpgin 26592 [ 67.930810][ T4377] pgpgout 26592 [ 67.934299][ T4377] pgfault 29279 [ 67.937821][ T4377] pgmajfault 66 [ 67.941314][ T4377] inactive_anon 0 [ 67.944973][ T4377] active_anon 0 [ 67.948440][ T4377] inactive_file 0 [ 67.952111][ T4377] active_file 0 [ 67.955632][ T4377] unevictable 0 [ 67.959109][ T4377] hierarchical_memory_limit 314572800 [ 67.964925][ T4377] hierarchical_memsw_limit 9223372036854771712 [ 67.971156][ T4377] total_cache 0 [ 67.974708][ T4377] total_rss 0 [ 67.978011][ T4377] total_shmem 0 [ 67.981520][ T4377] total_mapped_file 0 [ 67.985652][ T4377] total_dirty 0 [ 67.989144][ T4377] total_writeback 0 [ 67.992983][ T4377] total_workingset_refault_anon 65 [ 67.998109][ T4377] total_workingset_refault_file 343 [ 68.003360][ T4377] total_swap 192512 [ 68.007191][ T4377] total_swapcached 0 [ 68.011122][ T4377] total_pgpgin 26592 [ 68.015037][ T4377] total_pgpgout 26592 [ 68.019135][ T4377] total_pgfault 29279 [ 68.023138][ T4377] total_pgmajfault 66 [ 68.027167][ T4377] total_inactive_anon 0 [ 68.031362][ T4377] total_active_anon 0 [ 68.035375][ T4377] total_inactive_file 0 [ 68.039833][ T4377] total_active_file 0 [ 68.039844][ T4377] total_unevictable 0 [ 68.039855][ T4377] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz4,task_memcg=/syz4,task=syz.4.279,pid=4377,uid=0 [ 68.039937][ T4377] Memory cgroup out of memory: Killed process 4377 (syz.4.279) total-vm:93628kB, anon-rss:1068kB, file-rss:22308kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 68.192242][ T4411] FAULT_INJECTION: forcing a failure. [ 68.192242][ T4411] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 68.205444][ T4411] CPU: 0 UID: 0 PID: 4411 Comm: syz.3.290 Not tainted 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 68.205483][ T4411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 68.205495][ T4411] Call Trace: [ 68.205501][ T4411] [ 68.205507][ T4411] __dump_stack+0x1d/0x30 [ 68.205598][ T4411] dump_stack_lvl+0xe8/0x140 [ 68.205623][ T4411] dump_stack+0x15/0x1b [ 68.205638][ T4411] should_fail_ex+0x265/0x280 [ 68.205668][ T4411] should_fail+0xb/0x20 [ 68.205703][ T4411] should_fail_usercopy+0x1a/0x20 [ 68.205865][ T4411] strncpy_from_user+0x25/0x230 [ 68.205928][ T4411] ? __kmalloc_cache_noprof+0x189/0x320 [ 68.205962][ T4411] __se_sys_memfd_create+0x1ff/0x590 [ 68.205993][ T4411] __x64_sys_memfd_create+0x31/0x40 [ 68.206031][ T4411] x64_sys_call+0x122f/0x2fb0 [ 68.206121][ T4411] do_syscall_64+0xd2/0x200 [ 68.206141][ T4411] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 68.206181][ T4411] ? clear_bhb_loop+0x40/0x90 [ 68.206271][ T4411] ? clear_bhb_loop+0x40/0x90 [ 68.206375][ T4411] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 68.206402][ T4411] RIP: 0033:0x7fd05b8be9a9 [ 68.206419][ T4411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.206498][ T4411] RSP: 002b:00007fd059f26e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 68.206520][ T4411] RAX: ffffffffffffffda RBX: 00000000000004c0 RCX: 00007fd05b8be9a9 [ 68.206531][ T4411] RDX: 00007fd059f26ef0 RSI: 0000000000000000 RDI: 00007fd05b9416fc [ 68.206543][ T4411] RBP: 0000200000000ac0 R08: 00007fd059f26bb7 R09: 00007fd059f26e40 [ 68.206554][ T4411] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 68.206590][ T4411] R13: 00007fd059f26ef0 R14: 00007fd059f26eb0 R15: 0000200000000500 [ 68.206669][ T4411] [ 68.470549][ T4411] loop3: detected capacity change from 0 to 1024 [ 68.667460][ T4414] lo speed is unknown, defaulting to 1000 [ 68.742960][ T4420] loop1: detected capacity change from 0 to 1024 [ 68.794601][ T4420] EXT4-fs: Ignoring removed orlov option [ 68.866779][ T4420] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 69.068662][ T4414] ================================================================== [ 69.076828][ T4414] BUG: KCSAN: data-race in __mark_inode_dirty / writeback_single_inode [ 69.085108][ T4414] [ 69.087445][ T4414] write to 0xffff888106f81300 of 4 bytes by task 4420 on cpu 1: [ 69.095093][ T4414] writeback_single_inode+0x14a/0x3e0 [ 69.100501][ T4414] sync_inode_metadata+0x5b/0x90 [ 69.105476][ T4414] generic_buffers_fsync_noflush+0xd9/0x120 [ 69.111414][ T4414] ext4_sync_file+0x1ab/0x690 [ 69.116172][ T4414] vfs_fsync_range+0x10a/0x130 [ 69.120985][ T4414] ext4_buffered_write_iter+0x34f/0x3c0 [ 69.126558][ T4414] ext4_file_write_iter+0x383/0xf00 [ 69.131787][ T4414] iter_file_splice_write+0x5ef/0x970 [ 69.137203][ T4414] direct_splice_actor+0x153/0x2a0 [ 69.142347][ T4414] splice_direct_to_actor+0x30f/0x680 [ 69.147748][ T4414] do_splice_direct+0xda/0x150 [ 69.152545][ T4414] do_sendfile+0x380/0x650 [ 69.156977][ T4414] __x64_sys_sendfile64+0x105/0x150 [ 69.162217][ T4414] x64_sys_call+0xb39/0x2fb0 [ 69.166832][ T4414] do_syscall_64+0xd2/0x200 [ 69.171356][ T4414] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.177267][ T4414] [ 69.179597][ T4414] read to 0xffff888106f81300 of 4 bytes by task 4414 on cpu 0: [ 69.187154][ T4414] __mark_inode_dirty+0x52/0x760 [ 69.192125][ T4414] ext4_write_inline_data_end+0x3e5/0x5f0 [ 69.197872][ T4414] ext4_write_end+0x4cd/0x730 [ 69.202573][ T4414] generic_perform_write+0x312/0x490 [ 69.207874][ T4414] ext4_buffered_write_iter+0x1ee/0x3c0 [ 69.213450][ T4414] ext4_file_write_iter+0x383/0xf00 [ 69.218839][ T4414] iter_file_splice_write+0x5ef/0x970 [ 69.224232][ T4414] direct_splice_actor+0x153/0x2a0 [ 69.229367][ T4414] splice_direct_to_actor+0x30f/0x680 [ 69.234762][ T4414] do_splice_direct+0xda/0x150 [ 69.239548][ T4414] do_sendfile+0x380/0x650 [ 69.244153][ T4414] __x64_sys_sendfile64+0x105/0x150 [ 69.249370][ T4414] x64_sys_call+0xb39/0x2fb0 [ 69.253980][ T4414] do_syscall_64+0xd2/0x200 [ 69.258501][ T4414] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.264410][ T4414] [ 69.266750][ T4414] value changed: 0x00000038 -> 0x00000002 [ 69.272472][ T4414] [ 69.274820][ T4414] Reported by Kernel Concurrency Sanitizer on: [ 69.280976][ T4414] CPU: 0 UID: 0 PID: 4414 Comm: syz.1.291 Not tainted 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 69.291332][ T4414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 69.301490][ T4414] ================================================================== [ 69.309915][ T1035] usb 5-1: enqueue for inactive port 0 [ 69.315662][ T1035] usb 5-1: enqueue for inactive port 0 [ 69.388650][ T1035] vhci_hcd: vhci_device speed not set [ 69.951777][ T3302] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000.