last executing test programs: 14.509453117s ago: executing program 3 (id=5032): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0xf, 0x0, &(0x7f0000000140)="69015438a420bbea40bb7d94bc9db5", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "00009200000000000000000000000058b200"}) r1 = syz_open_pts(r0, 0x0) r2 = dup(r1) syz_emit_ethernet(0x66, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff6487a2bcd3d608004500001400000000002f90780000000000000000042008060000000000000800000086dd080088be00000000100000000100000000000000080022eb0000000020000000020000000000000000000000080065580000000054dd7962e471360528a04cb5be740089f4fb58a0c1a4c1e7132b90525a6ba5f7f0b6f6d459f84630734283e461ff9c97495946290d00c4775e9fde483e5459d58414e478d273b12e539ba9d00ab4fe1cef3cf837e5be04e3b0dd05b8625671efe533d81335790e137bd2338503a30be88a"], 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0x541b, &(0x7f0000000080)={0xffffffffffffffff}) close_range(r3, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000000)={0x4800}, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000003900)={0x14, 0x1e, 0xa01}, 0x14}}, 0x0) ioctl$TIOCGPTLCK(r4, 0x80045439, &(0x7f0000000300)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180200000000000000000000000000008500040041001ef3ff00200000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) syz_usb_connect(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="120100009b23fd406d04c1088dee000000010902240001000000000904000000ff0100000724", @ANYRES16=r6], 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) getpid() r7 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000c80)=ANY=[@ANYBLOB="12010000000000406d0422c2000000000001090224000100000000090400000103000000092100000001220b0009058103"], 0x0) syz_usb_control_io$hid(r7, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x8, 0x0, r8, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) syz_usb_control_io(r7, &(0x7f0000000100)={0x2c, &(0x7f0000000680)=ANY=[@ANYBLOB="00000b0000000b00304d9481"], 0x0, 0x0, 0x0, 0x0}, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) 10.677347429s ago: executing program 3 (id=5043): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1d}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) 8.201926826s ago: executing program 2 (id=5048): truncate(&(0x7f0000000000)='./file0\x00', 0x7ff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) (async, rerun: 32) r2 = syz_open_pts(0xffffffffffffffff, 0x400) (rerun: 32) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000080)={0x2, 0x7c, 0x101}) (async, rerun: 32) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (rerun: 32) r4 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000100)={0x3, r4}) (async, rerun: 32) r5 = syz_open_dev$loop(&(0x7f0000000140), 0xffffffffffffffff, 0x20000) (rerun: 32) ioctl$LOOP_SET_FD(r5, 0x4c00, r2) (async) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_UPDATE_FT_IES(r0, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)={0x230, r1, 0xbba522305681c7cc, 0x70bd2a, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0xc, 0x50}}}}, [@NL80211_ATTR_IE={0xc, 0x2a, [@ssid={0x0, 0x6, @default_ap_ssid}]}, @NL80211_ATTR_IE={0x9d, 0x2a, [@random_vendor={0xdd, 0x3b, "13ef15c77d667edb2fb13408598de311254a2b85bcab409576c2c086edfef961e589c371accaf5e5ed4da2ed8e7cc5c486839cf4d619f09eaa243d"}, @preq={0x82, 0x57, {{0x1, 0x0, 0x0, 0x0, 0x1}, 0x9, 0x6, 0x2, @broadcast, 0x6, @value, 0x7, 0xd, 0x5, [{{0x1}, @device_b, 0x51}, {{}, @device_a, 0x7}, {{}, @device_a, 0x8}, {{}, @device_a, 0x6}, {{0x1, 0x0, 0x1}, @broadcast, 0x10}]}}, @sec_chan_ofs={0x3e, 0x1, 0x3}]}, @NL80211_ATTR_MDID={0x6, 0xb1, 0x4dd}, @NL80211_ATTR_MDID={0x6, 0xb1, 0x100}, @NL80211_ATTR_MDID={0x6, 0xb1, 0x9}, @NL80211_ATTR_IE={0x10, 0x2a, [@mesh_config={0x71, 0x7, {0xffffffffffffffff, 0x1, 0x0, 0x1, 0x0, 0x1}}, @sec_chan_ofs={0x3e, 0x1, 0x1}]}, @NL80211_ATTR_IE={0x10d, 0x2a, [@link_id={0x65, 0x12, {@from_mac=@device_b, @device_a, @broadcast}}, @cf={0x4, 0x6, {0x0, 0x0, 0x6, 0xf52}}, @ext_channel_switch={0x3c, 0x4, {0x1, 0x6, 0x1, 0x2}}, @preq={0x82, 0x6d, {{0x1, 0x1, 0x0, 0x0, 0x1}, 0x7, 0x4, 0x2, @device_b, 0x0, @value=@broadcast, 0x66b0, 0x78d, 0x7, [{{0x1, 0x0, 0x1}, @device_b, 0xb}, {{0x1}, @broadcast, 0x3}, {{0x1}, @device_b, 0x3}, {{0x1}, @device_a, 0x8d2}, {{0x0, 0x0, 0x1}, @device_a, 0x1}, {{0x1, 0x0, 0x1}, @device_b, 0x8}, {{}, @device_b, 0x3}]}}, @erp={0x2a, 0x1, {0x1, 0x1}}, @preq={0x82, 0x6d, {{0x0, 0x1, 0x1, 0x0, 0x1}, 0x0, 0xf, 0x8, @device_a, 0xc, @value=@broadcast, 0x2, 0xd, 0x7, [{{}, @broadcast, 0x7}, {{0x1}, @device_a, 0x1000}, {{0x0, 0x0, 0x1}, @broadcast, 0xfffffffa}, {{0x1}, @device_b, 0x8}, {{0x1}}, {{0x1, 0x0, 0x1}, @broadcast, 0x4}, {{0x1}, @device_b, 0x39d5}]}}, @ext_channel_switch={0x3c, 0x4, {0x1, 0xec, 0x40, 0x9}}]}, @NL80211_ATTR_IE={0x18, 0x2a, [@link_id={0x65, 0x12, {@random="efb9dd93277b"}}]}, @NL80211_ATTR_IE={0x4}, @NL80211_ATTR_MDID={0x6, 0xb1, 0x9}]}, 0x230}, 0x1, 0x0, 0x0, 0x8015}, 0x10044000) (async) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000000, 0x30, r3, 0x9ba65000) (async) r7 = syz_open_dev$usbfs(&(0x7f00000004c0), 0x8, 0x462101) ioctl$USBDEVFS_ALLOW_SUSPEND(r7, 0x5522) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='btrfs_clear_extent_bit\x00', r4}, 0x10) (async) connect$unix(r4, &(0x7f0000000580)=@file={0x1, './file0\x00'}, 0x6e) (async) r8 = syz_open_dev$ptys(0xc, 0x3, 0x0) r9 = ioctl$TIOCGPTPEER(r8, 0x5441, 0x6) (async) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000600)=r4, 0x1) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f0000000880)={'syztnl1\x00', &(0x7f00000007c0)={'syztnl0\x00', 0x0, 0x20, 0x8048, 0x80000000, 0xfe000000, {{0x23, 0x4, 0x1, 0x10, 0x8c, 0x6, 0x0, 0x3, 0x29, 0x0, @multicast2, @loopback, {[@generic={0x94, 0x7, "5ecfefc07c"}, @timestamp_prespec={0x44, 0x1c, 0x33, 0x3, 0x0, [{@remote, 0x5}, {@empty, 0x4}, {@loopback, 0x7fff}]}, @lsrr={0x83, 0x13, 0x4e, [@multicast1, @loopback, @loopback, @loopback]}, @ssrr={0x89, 0x1b, 0x94, [@private=0xa010101, @private=0xa010102, @empty, @local, @local, @multicast1]}, @ssrr={0x89, 0x13, 0x41, [@local, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @timestamp={0x44, 0x14, 0x52, 0x0, 0xd, [0x6c780000, 0x0, 0x6, 0x6]}]}}}}}) (async, rerun: 64) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000900)={0x6, 0x0}, 0x8) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x4, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, [@exit]}, &(0x7f0000000680)='GPL\x00', 0x1, 0xd1, &(0x7f00000006c0)=""/209, 0x40f00, 0x40, '\x00', r10, 0x2c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000008c0)={0x4, 0x2, 0x9, 0x1ae}, 0x10, r11, r4, 0x7, &(0x7f0000000940)=[r0, r4], &(0x7f0000000980)=[{0x0, 0x3, 0x7, 0x1}, {0x1, 0x4, 0xa, 0x4}, {0x2, 0x2, 0x1, 0x5}, {0x5, 0x1, 0xa, 0x2}, {0x1, 0x2, 0x1}, {0x0, 0x5, 0xf, 0xa}, {0x3, 0x2, 0x5}], 0x10, 0x8}, 0x90) read(r2, &(0x7f0000000ac0)=""/183, 0xb7) mknodat(0xffffffffffffffff, &(0x7f0000000b80)='./file0\x00', 0x100, 0x8) (async) fcntl$getownex(r9, 0x10, &(0x7f0000000bc0)={0x0, 0x0}) prlimit64(r13, 0x8, &(0x7f0000000c00)={0xf8b, 0x8880}, &(0x7f0000000c40)) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000c80)={r12, r10, 0x25, 0x10, @val=@perf_event}, 0x40) sendmsg$NL80211_CMD_REGISTER_BEACONS(r9, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x5000008}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x1c, r1, 0x2, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x7c}, @void, @void}}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) (async) pwritev2(r7, &(0x7f0000000dc0), 0x0, 0xfffffff1, 0x2, 0x5) 8.033893768s ago: executing program 2 (id=5049): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) link(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x840, &(0x7f0000000540)={[{@test_dummy_encryption}]}, 0x1, 0x236, &(0x7f0000000300)="$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") mkdir(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x88, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) pipe2(0x0, 0xf0ff1f) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c01250000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000340), 0x0, 0x0) 6.397056705s ago: executing program 2 (id=5053): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) r1 = syz_mount_image$fuse(0x0, &(0x7f0000002080)='./file0\x00', 0x360044, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x88, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) prlimit64(0x0, 0xe, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES8=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x804810, &(0x7f0000000d40), 0x9, 0x61c, &(0x7f0000000700)="$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") r5 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x3ffffffffffffda, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r8 = openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="2d7069647320ddd23e24b42c378ac84ca7d4b6b8e039795083eb08b0820d8be20854d0bbae066fbc561332ddaacc2f9f233b861a024569167d3f4e1fe3d5dfbbd46ac1b098484f12cb0407de42b32adad1c0c5787f0d04490bed4646b0d8a777e1deb14f5d7598f055b97884d65d211b903c3fa761fed4443b4329853c9aa66e9843cdbfb345fdc0afc5e2438b5a92b72a9d18c8430f6d3669063f067183"], 0x6) write$cgroup_subtree(r8, 0x0, 0x6) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00"], 0x1c}}, 0x0) 6.386540305s ago: executing program 3 (id=5054): prlimit64(0x0, 0x6, &(0x7f0000000140), 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)={[{@jqfmt_vfsv0}, {@errors_remount}]}, 0x1, 0x784, &(0x7f00000007c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000380), 0x1040c) close(0xffffffffffffffff) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200003, 0x0, 0x0, 0x7}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) connect$inet(r1, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x0, @random="4df193f35347"}, 0x0, {0x2, 0x0, @private}, 'syz_tun\x00'}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x74, 0x2}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x17, 0x8, 0x40, 0x42, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r3}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001600)={r3, &(0x7f0000000580), &(0x7f0000001580)=""/92}, 0x20) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) syz_open_dev$evdev(0x0, 0x0, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x5, 0x8, 0x9, 0x2082, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4, 0xf}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 5.016636732s ago: executing program 2 (id=5056): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@local}}, 0xe8) sendmmsg$inet6(r3, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x10}}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0xe00}}], 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 4.956719997s ago: executing program 0 (id=5057): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0xfffffffffffffd74, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/consoles\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x1000, &(0x7f00000003c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_any}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) syz_open_dev$usbfs(0x0, 0x205, 0x8401) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000000000000000e0000001000000000000000000000000e000000100000000000000000000000000000000000000000200002000000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000001000000000000fe3cc3fd000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000004000190000000000000300000000"], 0xb8}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r6 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) r7 = fsmount(r6, 0x0, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000280), 0x12) sendfile(0xffffffffffffffff, r8, 0x0, 0xfffffffe) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 4.145024575s ago: executing program 2 (id=5058): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000300)='./file0\x00', 0x202030, &(0x7f0000000380)=ANY=[], 0x2, 0x224, &(0x7f0000000700)="$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") bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="950200000000000018000000000000000000000000000000950000000000000085ff"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x7fffffffffffffff}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = dup(r4) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0xc018aec0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x20000700, &(0x7f0000001000/0x1000)=nil}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0xffffffffffffff43) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) socket(0x10, 0x3, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000001000000000000004b64ffecc50000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r7, 0x8933, &(0x7f0000000240)={'wg1\x00', 0x0}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r9, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x20, r8, 0x1, 0x0, 0x0, {0x16}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}]}, 0x20}}, 0x0) 4.135113645s ago: executing program 3 (id=5059): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0x6, &(0x7f0000000140), 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)={[{@jqfmt_vfsv0}, {@errors_remount}]}, 0x1, 0x784, &(0x7f00000007c0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) keyctl$session_to_parent(0x12) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000000280)=0x22002, 0x4) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'vlan0\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f0000000140)=0x4000, 0x4) bind$xdp(r4, &(0x7f0000000100)={0x2c, 0x0, r5}, 0x10) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000340)={0x39}) 3.800710449s ago: executing program 0 (id=5060): r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) (fail_nth: 1) 3.78973849s ago: executing program 0 (id=5061): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100000000200000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@local}}, 0xe8) sendmmsg$inet6(r6, &(0x7f0000000a80)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x10}}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0xe00}}], 0x2, 0x0) 3.756155092s ago: executing program 1 (id=5062): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x26, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x6c}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) (async) mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x103) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/fscaps', 0x0, 0x0) (async, rerun: 32) r2 = socket$pppl2tp(0x18, 0x1, 0x1) (rerun: 32) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) splice(r0, &(0x7f0000000080)=0x7, r2, &(0x7f00000000c0)=0xfffffffffffffffb, 0x6, 0x8) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x20000000, 0x4) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000001040)={'sit0\x00', &(0x7f0000001000)={@local, @dev={0xac, 0x14, 0x14, 0x3f}, 0x5, 0x16}}) 3.664824999s ago: executing program 1 (id=5063): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f00000000c0)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@noquota}, {@noquota}, {@data_writeback}, {@noload}]}, 0x64, 0x539, &(0x7f0000000e80)="$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") r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) 3.545923897s ago: executing program 4 (id=5064): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) link(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x840, &(0x7f0000000540)={[{@test_dummy_encryption}]}, 0x1, 0x236, &(0x7f0000000300)="$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") mkdir(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x88, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) pipe2(0x0, 0xf0ff1f) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c01250000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000340), 0x0, 0x0) 2.639700972s ago: executing program 3 (id=5065): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0xfffffffffffffd74, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/consoles\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) syz_open_dev$usbfs(0x0, 0x205, 0x8401) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000000000000000e0000001000000000000000000000000e000000100000000000000000000000000000000000000000200002000000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000001000000000000fe3cc3fd000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000004000190000000000000300000000"], 0xb8}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f00000001c0)=0x3, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(r6, 0x0, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000280), 0x12) sendfile(r5, r8, 0x0, 0xfffffffe) 2.636524192s ago: executing program 0 (id=5066): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'syztnl2\x00', &(0x7f0000000200)={'sit0\x00', 0x0, 0x8, 0x40, 0x6, 0x8, {{0x5, 0x4, 0x0, 0x7, 0x14, 0x68, 0x0, 0x7f, 0x4, 0x0, @multicast1, @broadcast}}}}) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000000040)=ANY=[@ANYBLOB="840e0000", @ANYBLOB="000000000000000000000100000024000300a05ca84f6c9c8e3853e2fd7a70ae0fb2"], 0xe84}}, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, 0x0}, 0x90) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = dup(r3) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)="480000001500190a20ffff7fffffff5602113e850e1de0974881030491720000de213ee23f", 0x25}], 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, 0x0}], 0x1, 0x50, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x4000}) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_RUN(r5, 0xae80, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x8000) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4400ae8f, &(0x7f0000000140)) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000280)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x10020f58, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}]}}) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000000)=0x4001) ioctl$KVM_SET_SREGS(r9, 0x4138ae84, &(0x7f0000000100)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xddf8ffdb, 0x0, 0x0, 0x140030}) ioctl$KVM_TRANSLATE(r9, 0xc018ae85, &(0x7f0000000080)) syz_open_dev$tty1(0xc, 0x4, 0x1) 2.516175841s ago: executing program 2 (id=5067): syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="05010000000000107d1e222e00000000000109022400"], 0x0) r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f0000000780)={&(0x7f0000000200)={0xa, 0x0, 0x6e1f, @empty, 0x7ff}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="14000000000000002900000003000000040000000000000018000000000000002900000000030000dfff001400000000000000290040000af200000000040000001082d540cc0dc6d08ffe9c62123c99ec84116bc9d64b7932615ea0f53e0c88e9aac325e8700600000000000000d9f314bcdd3af7b36f8eb9ccfe7d03f2a2df681286832d173f631d0c00"/156], 0x48}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x5, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) mknod(&(0x7f0000000240)='./file0\x00', 0x20, 0xc6) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b70300000000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000000180)=@file={0x1}, 0x6e) listen(r2, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400), 0x2100, 0x0) timerfd_settime(r4, 0x0, &(0x7f0000000440)={{0x77359400}, {0x77359400}}, &(0x7f0000000480)) connect$unix(r3, &(0x7f0000000000)=@file={0x1}, 0x6e) connect$unix(r3, &(0x7f0000000080)=@file={0x1}, 0x6e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000003c0)=ANY=[@ANYRESOCT=r1, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="08000a0090"], 0x54}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@getchain={0x44, 0x66, 0x100, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x6}, {0x2, 0xf}, {0x0, 0x39f6b708c92336f4}}, [{0x8}, {0x8, 0xb, 0x9}, {0x8, 0xb, 0x4}, {0x8, 0xb, 0xa41b}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x40000004) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000002d80), &(0x7f0000002dc0)=0xc) syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000002240)='./file0\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYRESOCT=0x0, @ANYRES32], 0x6, 0x2d7, &(0x7f0000000a00)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r5, &(0x7f0000000340)=ANY=[@ANYRESHEX=r5, @ANYBLOB="9e8b32628dea0c337ee5a625726952e890748455d87f0eafa51c11e078e121744b7aaa59b0c1a29aa26c8bd339caf58099a806"], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000005, 0x13, r5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/schedstat\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000006140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$exfat(&(0x7f0000001500), &(0x7f0000001540)='./file0\x00', 0x220100b0, &(0x7f0000000480)=ANY=[@ANYBLOB='allow_utime=00000000000000000000007,dmask=00000000000000001,iocharset=macroman,allow_utime=00000000000000000000002,uid=', @ANYRES64=r9, @ANYRESOCT=r7, @ANYBLOB="2a3a6dc4d70cd8504afe4f20df34ad3cf37d706dd73fd000", @ANYBLOB="00001b0087e1e85631dc26e7a9ce3c4396436bc6736574e997938c382c009cd0aeba477396b2cb852b9c7a6a4bf39e0368bfe3e9c44e297aeade0000000000fb4fffa3da2229249f9eae67b594fb6fa71518c4638f5e66923f2ba986156feb62be500e4840d9758d3d1f11577798871b0a2d0009ae68165160d76495fc48f43da2e2147ad0809022a1a0c2d4", @ANYRESHEX=r8], 0x1, 0x14ee, &(0x7f0000004000)="$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") 2.515762971s ago: executing program 1 (id=5068): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=@newtaction={0x48, 0x30, 0xffff, 0x0, 0x0, {}, [{0x34, 0x1, [@m_police={0x30, 0x1, 0x0, 0x0, {{0xb, 0xfff5}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) 2.160370766s ago: executing program 4 (id=5069): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@local}}, 0xe8) sendmmsg$inet6(r3, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x10}}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0xe00}}], 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 1.54364103s ago: executing program 1 (id=5070): prlimit64(0x0, 0x6, &(0x7f0000000140), 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)={[{@jqfmt_vfsv0}, {@errors_remount}]}, 0x1, 0x784, &(0x7f00000007c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000380), 0x1040c) close(0xffffffffffffffff) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200003, 0x0, 0x0, 0x7}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) connect$inet(r1, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x0, @random="4df193f35347"}, 0x0, {0x2, 0x0, @private}, 'syz_tun\x00'}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x74, 0x2}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x17, 0x8, 0x40, 0x42, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r3}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001600)={r3, &(0x7f0000000580), &(0x7f0000001580)=""/92}, 0x20) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) syz_open_dev$evdev(0x0, 0x0, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x5, 0x8, 0x9, 0x2082, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4, 0xf}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.490166924s ago: executing program 0 (id=5071): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0xfffffffffffffd74, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/consoles\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x1000, &(0x7f00000003c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_any}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) syz_open_dev$usbfs(0x0, 0x205, 0x8401) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000000000000000e0000001000000000000000000000000e000000100000000000000000000000000000000000000000200002000000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000001000000000000fe3cc3fd000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000004000190000000000000300000000"], 0xb8}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r6 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) r7 = fsmount(r6, 0x0, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000280), 0x12) sendfile(0xffffffffffffffff, r8, 0x0, 0xfffffffe) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 1.141767449s ago: executing program 4 (id=5072): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7c0000001000010400"/20, @ANYRES32=r4, @ANYBLOB="00000000000000005c001280110001006272696467655f736c617665000000004400058005000900000000000500200001000000050008"], 0x7c}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000004c0)={&(0x7f0000000300), 0xc, &(0x7f0000000480)={&(0x7f0000000340)=ANY=[@ANYBLOB="940000001100010026bd7000fcdbdf2500000000", @ANYRES32=r8], 0x94}}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x32, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) 924.729114ms ago: executing program 1 (id=5073): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) (async) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) (async) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x4, 0x8, 0x8}, 0x48) (async, rerun: 32) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x20008001) (async, rerun: 32) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = open(0x0, 0x80000, 0xd5) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x90e976db910956fe, 0x4002011, r4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) (async) sendmsg$DEVLINK_CMD_RATE_GET(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x14, 0x0, 0x2, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8005}, 0x4010) (async) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$UI_DEV_CREATE(r6, 0x5501) (async) write$uinput_user_dev(r6, &(0x7f0000000100)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], [], [0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x80000000]}, 0x45c) ioctl$UI_DEV_SETUP(r6, 0x5501, 0x0) (async, rerun: 64) readv(r6, &(0x7f0000000600)=[{&(0x7f0000000640)=""/89, 0x59}], 0x1) (async, rerun: 64) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) (async, rerun: 32) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000400)={'ip6tnl0\x00', 0x0, 0x29, 0x19, 0x9, 0x8000, 0x1, @mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40, 0x1, 0x2, 0x2}}) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 662.585663ms ago: executing program 1 (id=5074): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x7, &(0x7f0000001b40)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000640)='percpu_alloc_percpu\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x440, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, &(0x7f0000000040)=r4) dup3(r3, r4, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x0, 0x0}, 0x10) socket$key(0xf, 0x3, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB], 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) 656.739743ms ago: executing program 3 (id=5075): memfd_create(&(0x7f0000000140)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\xea7\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xcd\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f00000002c0)={0x24, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x21, 0x9, {0x9}}}, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100), 0x48) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x90) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup(r2) r4 = dup2(r3, r1) socket$netlink(0x10, 0x3, 0x8ab0117d794ff86) preadv(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000080), 0x1, 0x7a9, &(0x7f0000001a00)="$eJzs3c9rG9kdAPDvyLIdO2ntQqFNToZCawiR49RNWughpYdSaCDQnpsIWTGpZStYcoiNoQml0EuhLT0U2kvO/ZHeeu3uXnf/iz0sCdldJ6yXPSxeRh7Zciw5tmNJ3vXnA2O9NzPye1+9+fFG89AEcGpNpH9yEecj4k9JxFg2P4mIwUYqH3F9a72NoYhYXyslsbn5y4+Sxjov19dK0fKe1Nks8+2IePv3ERdze8utrazOFyuV8lKWn6ov3JuqraxeurtQnCvPlRevTs/MXLn2g2tX3yi8r7dmPnlv9dyzP//se/+5/tnvvvXkj+8kcT3OZcta4zguEzGRfSaD6Ue4y0+Pu7A+S/pdAY4k3TUHtvbyOB9jMdBIdTDSy5oBAN3y24jYBABOmcT5HwBOmeb3AC/X10rZdKG/30j01vOfRMSZrfg3smlrST67Z3emcR909GWy685IEhHjx1D+RET843+//lc6RZfuQwK08/BRRNwen2g5/mfHn2TPmIXDurzfws3hxsvEK7Md/6B3/p/2f364q/+X7X+57f5PtOn/DLfZd4/i9ft/7ukxFNNR2v/7cURs7On/bQ9aGx/Icl9r9PkGkzt3K+XL2eCyyRgcTvPTjVXbj4KafPH5i07lt/b/Pv7Lb/6Zlp++7qyRe5of3v2e2WK9+KZxNz1/FHEh3y7+ZLv9kw7935sHLOPnP/rD3zstS+NP421Oe+Pvrs3HEd9t2/47bZnsOz5xqrE5TDU3ijb++/7fRndyu8dXtbZ/OqXlN68FeiFt/9H94x9PWsdr1g5fxruPx97qtOz18bff/oeSXzXSQ9m8B8V6fWk6Yij5xd75V3be28w310/jn/xO+/1/v+0/vSa8fcD4888+/PfR4++uNP7ZQ7X/4RNPNuYHOpV/sPafaaQmszkHOf7t1CK/Z05r4qifGwAAAAAAAAAAAAAAAAAAAAAAAAAcRi4izkWSK2ync7lCYesZ3t+M0VylWqtfvFNdXpyNxrOyx2Mw1/ypy7GW30Odzn4Pv5m/8kr++xHxjYj46/BII18oVSuz/Q4eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADJnOzz/P/XBcL9rBwB0zZl+VwAA6DnnfwA4fQ53/h/pWj0AgN5x/Q8Ap8+Bz/+3u1sPAKB3Dn39n+9OPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPjKunnjRjptfrq+Vkrzs/dXluer9y/NlmvzhYXlUqFUXbpXmKtW5yrlQqm60PEfPdx6qVSr92ZicfnBVL1cq0/VVlZvLVSXF+u37i4U58q3yoM9iwwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADq62sjpfrFTKSxL7JkZORjVOTCIf88XKWN+r0bm94kRU40ucaD1KjPTvAAUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwwn0RAAD//wBtIzw=") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x275a, 0x0) r6 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r6, 0xaf01, 0x0) r7 = eventfd(0xb) ioctl$VHOST_SET_LOG_FD(r6, 0x4004af07, &(0x7f0000000240)=r7) ioctl$VHOST_SET_VRING_KICK(r6, 0x4008af20, &(0x7f0000000040)={0x1, r7}) ioctl$VHOST_SET_VRING_ADDR(r6, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/53, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r6, 0x4008af03, &(0x7f0000000980)) ioctl$VHOST_SET_VRING_ADDR(r6, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, 0x0, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=""/74}) ioctl$VHOST_VSOCK_SET_RUNNING(r6, 0x4004af61, &(0x7f0000000000)=0x1) write$binfmt_script(r5, &(0x7f0000000040)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x70, 0x0, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000040)) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000300)=0x3) 652.359114ms ago: executing program 0 (id=5076): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000080), 0x1c) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@local}}, 0xe8) sendmmsg$inet6(r6, &(0x7f0000000a80)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x10}}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0xe00}}], 0x2, 0x0) 231.596243ms ago: executing program 4 (id=5077): prlimit64(0x0, 0x6, &(0x7f0000000140), 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)={[{@jqfmt_vfsv0}, {@errors_remount}]}, 0x1, 0x784, &(0x7f00000007c0)="$eJzs3c1rHOUfAPDvbJKmSfv7JYKg9RQQNFC6MTW2Ch4qHkSwUNCz7bLZhppNtmQ3pQkBW0TwIqh4EPTSsy/15tWXq/4XHqSlalqseJDI7Eu7bXbTTZvdDeTzgck+z8xsnue7z8wzz+wMOwHsWRPpn0zEoYj4KIkYq89PImKomhqMOFFb7/b6Wj6dktjYePOPpLrOrfW1fDS9J3WgnnkyIn58P+JwZnO55ZXV+VyxWFiq56cqC+enyiurR84t5OYKc4XFY9MzM0ePv3D82M7F+tcvqwevf/zas9+c+Oe9J65++FMSJ+JgfVlzHDtlIibqn8lQ+hHe49WdLqzPkn5XgIeS7poDtb08DsVYDFRTbYz0smYAQLe8GxEbAMAekzj+A8Ae0/ge4Nb6Wr4x9fcbid668UpE7K/F37i+WVsyWL9mt796HXT0VnLPlZEkIsZ3oPyJiPjiu7e/Sqfo0nVIgFYuXY6IM+MTm/v/ZNM9C9v13FYLN4arLxP3zdb/Qe98n45/Xmw1/svcGf9Ei/HPcIt992E8eP/PXNuBYtpKx38vN93bdrsp/rrxgXruf9Ux31By9lyxkPZt/4+IyRgaTvPT1VVb3wU1efPfm+3Kbx7//fnJO1+m5aevd9fIXBscvvc9s7lK7lHjbrhxOeKpwVbxJ3faP2kz/j3VYRmvv/TB5+2WpfGn8TamzfF318aViGdatv/dtky2vD9xqro5TDU2iha+/fWz0XblN7d/OqXlN84FeiFt/9Gt4x9Pmu/XLG+/jJ+vjP3QbtmD42+9/e9L3qqm99XnXcxVKkvTEfuSNzbPP3r3vY18Y/00/smnW+//W23/6TnhmQ7jH7z++9cPH393pfHPbqv9t5+4ent+oF35nbX/TDU1WZ/TSf/XaQUf5bMDAAAAAAAAAAAAAAAAAAAAAAAAgE5lIuJgJJnsnXQmk83WnuH9eIxmiqVy5fDZ0vLibFSflT0eQ5nGT12ONf0e6nT99/Ab+aP35Z+PiMci4tPhkWo+my8VZ/sdPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADUHWjz/P/Ub8P9rh0A0DX7+10BAKDnHP8BYO/Z3vF/pGv1AAB6x/k/AOw9HR//z3S3HgBA7zj/BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoMtOnTyZTht/r6/l0/zshZXl+dKFI7OF8nx2YTmfzZeWzmfnSqW5YiGbLy20/UeXai/FUun8TCwuX5yqFMqVqfLK6umF0vJi5fS5hdxc4XRhqGeRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDnyiur87lisbAksWViZHdUY9ckBmNXVEOia4nmXmKkfx0UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwC73XwAAAP//+Lkq2Q==") r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000380), 0x1040c) setreuid(0xee01, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200003, 0x0, 0x0, 0x7}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) connect$inet(r1, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x0, @random="4df193f35347"}, 0x0, {0x2, 0x0, @private}, 'syz_tun\x00'}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x74, 0x2}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x17, 0x8, 0x40, 0x42, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r3}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001600)={r3, &(0x7f0000000580), &(0x7f0000001580)=""/92}, 0x20) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) syz_open_dev$evdev(0x0, 0x0, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x5, 0x8, 0x9, 0x2082, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4, 0xf}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 121.893552ms ago: executing program 4 (id=5078): prlimit64(0x0, 0x6, &(0x7f0000000140), 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)={[{@jqfmt_vfsv0}, {@errors_remount}]}, 0x1, 0x784, &(0x7f00000007c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000380), 0x1040c) setreuid(0xee01, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200003, 0x0, 0x0, 0x7}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) connect$inet(r1, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x0, @random="4df193f35347"}, 0x0, {0x2, 0x0, @private}, 'syz_tun\x00'}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000001080)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x74, 0x2}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x17, 0x8, 0x40, 0x42, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r3}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001600)={r3, &(0x7f0000000580), &(0x7f0000001580)=""/92}, 0x20) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) syz_open_dev$evdev(0x0, 0x0, 0x0) syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x5, 0x8, 0x9, 0x2082, r0, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4, 0xf}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 0s ago: executing program 4 (id=5079): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) link(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x840, &(0x7f0000000540)={[{@test_dummy_encryption}]}, 0x1, 0x236, &(0x7f0000000300)="$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") mkdir(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x88, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) pipe2(0x0, 0xf0ff1f) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c01250000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000340), 0x0, 0x0) kernel console output (not intermixed with test programs): type=1326 audit(1725094875.146:5204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21436 comm="syz.2.4699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1395.778453][T21444] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. [ 1395.802625][ T28] audit: type=1326 audit(1725094875.146:5205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21436 comm="syz.2.4699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1395.815544][T21388] device veth0_vlan entered promiscuous mode [ 1395.832007][ T28] audit: type=1326 audit(1725094875.156:5206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21436 comm="syz.2.4699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1395.844905][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1395.869560][T21444] ext4 filesystem being mounted at /33/file0 supports timestamps until 2038 (0x7fffffff) [ 1395.870115][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1395.887691][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1395.906441][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1395.922357][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1395.929930][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1395.949421][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1395.993703][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1396.010271][T21388] device veth1_macvtap entered promiscuous mode [ 1396.021089][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1396.029659][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1396.037978][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1396.074692][T21461] loop2: detected capacity change from 0 to 128 [ 1396.085556][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1396.102816][T20773] EXT4-fs (loop1): unmounting filesystem. [ 1396.110789][T21461] EXT4-fs (loop2): Test dummy encryption mode enabled [ 1396.381447][T21461] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1396.415633][T21461] ext4 filesystem being mounted at /5/mnt supports timestamps until 2038 (0x7fffffff) [ 1396.416045][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1396.487705][T21468] device veth0_vlan left promiscuous mode [ 1396.496250][T21468] device veth0_vlan entered promiscuous mode [ 1396.527274][ T8286] device bridge_slave_1 left promiscuous mode [ 1396.540494][ T8286] bridge0: port 2(bridge_slave_1) entered disabled state [ 1397.493654][ T8286] device bridge_slave_0 left promiscuous mode [ 1397.530048][ T8286] bridge0: port 1(bridge_slave_0) entered disabled state [ 1397.826320][ T8286] device veth1_macvtap left promiscuous mode [ 1397.832480][ T8286] device veth0_vlan left promiscuous mode [ 1397.839718][T21286] EXT4-fs (loop2): unmounting filesystem. [ 1397.867456][T21481] loop1: detected capacity change from 0 to 128 [ 1397.880216][T21483] loop2: detected capacity change from 0 to 1024 [ 1397.887842][T21483] JBD2: no valid journal superblock found [ 1397.887874][T21481] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1397.893383][T21483] EXT4-fs (loop2): error loading journal [ 1397.949441][ T324] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1398.047588][T21485] loop4: detected capacity change from 0 to 2048 [ 1398.050871][T21489] loop0: detected capacity change from 0 to 1024 [ 1398.059174][T21481] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1398.068866][T21489] JBD2: no valid journal superblock found [ 1398.074421][T21489] EXT4-fs (loop0): error loading journal [ 1398.077589][T21481] ext4 filesystem being mounted at /35/mnt supports timestamps until 2038 (0x7fffffff) [ 1398.653593][T21485] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1398.708504][T21172] EXT4-fs (loop4): unmounting filesystem. [ 1401.266912][T21522] device veth0_vlan left promiscuous mode [ 1401.273268][T21522] device veth0_vlan entered promiscuous mode [ 1402.667151][T21533] device veth0_vlan left promiscuous mode [ 1402.681749][T21533] device veth0_vlan entered promiscuous mode [ 1403.098523][T20773] EXT4-fs (loop1): unmounting filesystem. [ 1403.725570][T21547] loop0: detected capacity change from 0 to 128 [ 1403.774563][T21544] loop2: detected capacity change from 0 to 2048 [ 1403.806356][T21547] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1403.836625][T21547] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1403.845347][T21547] ext4 filesystem being mounted at /4/mnt supports timestamps until 2038 (0x7fffffff) [ 1403.856410][T21544] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1404.869865][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 1404.869888][ T28] audit: type=1326 audit(1725094884.816:5218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21545 comm="syz.1.4721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efef3379eb9 code=0x7ffc0000 [ 1404.918028][ T28] audit: type=1326 audit(1725094884.816:5219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21545 comm="syz.1.4721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efef3379eb9 code=0x7ffc0000 [ 1404.942258][ T28] audit: type=1326 audit(1725094884.816:5220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21545 comm="syz.1.4721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efef3379eb9 code=0x7ffc0000 [ 1404.970587][ T28] audit: type=1326 audit(1725094884.836:5221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21545 comm="syz.1.4721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efef3379eb9 code=0x7ffc0000 [ 1405.011024][T21286] EXT4-fs (loop2): unmounting filesystem. [ 1405.017358][ T28] audit: type=1326 audit(1725094884.836:5222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21545 comm="syz.1.4721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efef3379eb9 code=0x7ffc0000 [ 1405.043860][ T28] audit: type=1326 audit(1725094884.896:5223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21545 comm="syz.1.4721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efef3379eb9 code=0x7ffc0000 [ 1405.068323][ T28] audit: type=1326 audit(1725094884.896:5224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21545 comm="syz.1.4721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efef3379eb9 code=0x7ffc0000 [ 1405.092120][ T28] audit: type=1326 audit(1725094884.906:5225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21545 comm="syz.1.4721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efef3379eb9 code=0x7ffc0000 [ 1405.130203][ T28] audit: type=1326 audit(1725094884.916:5226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21545 comm="syz.1.4721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7efef3379eb9 code=0x7ffc0000 [ 1405.177193][T21570] loop2: detected capacity change from 0 to 512 [ 1405.379205][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1405.406791][ T28] audit: type=1326 audit(1725094884.916:5227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21545 comm="syz.1.4721" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efef3379eb9 code=0x7ffc0000 [ 1405.501776][T21570] EXT4-fs (loop2): 1 orphan inode deleted [ 1405.526508][T21570] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1405.540813][T21570] ext4 filesystem being mounted at /10/file1 supports timestamps until 2038 (0x7fffffff) [ 1405.624011][T21286] EXT4-fs (loop2): unmounting filesystem. [ 1405.662767][T21581] loop2: detected capacity change from 0 to 128 [ 1405.684247][T21581] EXT4-fs (loop2): Test dummy encryption mode enabled [ 1405.836568][T21581] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1405.848103][T21581] ext4 filesystem being mounted at /11/mnt supports timestamps until 2038 (0x7fffffff) [ 1406.334974][T21586] device veth0_vlan left promiscuous mode [ 1406.341356][T21586] device veth0_vlan entered promiscuous mode [ 1408.099982][T21286] EXT4-fs (loop2): unmounting filesystem. [ 1408.123925][T21610] loop4: detected capacity change from 0 to 2048 [ 1408.144158][T21610] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1409.025820][T21616] device veth0_vlan left promiscuous mode [ 1409.034325][T21616] device veth0_vlan entered promiscuous mode [ 1409.301075][T21172] EXT4-fs (loop4): unmounting filesystem. [ 1412.102833][T21641] loop3: detected capacity change from 0 to 128 [ 1412.163965][T21644] loop2: detected capacity change from 0 to 1024 [ 1412.171059][T21644] JBD2: no valid journal superblock found [ 1412.176799][T21644] EXT4-fs (loop2): error loading journal [ 1412.182351][T21641] EXT4-fs (loop3): Test dummy encryption mode enabled [ 1412.230315][ T324] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1412.246467][T21641] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1412.285964][T21641] ext4 filesystem being mounted at /12/mnt supports timestamps until 2038 (0x7fffffff) [ 1412.536832][T21638] loop4: detected capacity change from 0 to 40427 [ 1412.569325][T21638] F2FS-fs (loop4): Wrong NAT boundary, start(2560) end(462336) blocks(1024) [ 1412.591347][T21638] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 1412.634682][T21655] loop1: detected capacity change from 0 to 128 [ 1412.664116][T21655] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1412.671603][T21638] F2FS-fs (loop4): Found nat_bits in checkpoint [ 1412.683201][T21655] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1412.702060][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1412.718402][T21655] ext4 filesystem being mounted at /41/mnt supports timestamps until 2038 (0x7fffffff) [ 1412.770847][T21638] F2FS-fs (loop4): Try to recover 1th superblock, ret: 0 [ 1412.777866][T21638] F2FS-fs (loop4): Mounted with checkpoint version = 48b305e5 [ 1413.012483][T21669] device veth0_vlan left promiscuous mode [ 1413.018736][T21669] device veth0_vlan entered promiscuous mode [ 1413.500935][T20773] EXT4-fs (loop1): unmounting filesystem. [ 1413.581533][T21677] loop1: detected capacity change from 0 to 2048 [ 1413.655460][T21681] loop0: detected capacity change from 0 to 128 [ 1413.671450][T21681] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1413.693193][T21677] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1413.704238][T21685] loop4: detected capacity change from 0 to 128 [ 1413.752481][T21685] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1414.019233][T21678] device veth0_vlan left promiscuous mode [ 1414.043339][T21685] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1414.049530][T21678] device veth0_vlan entered promiscuous mode [ 1414.053016][T21681] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1414.060231][T21685] ext4 filesystem being mounted at /23/mnt supports timestamps until 2038 (0x7fffffff) [ 1414.085953][T21681] ext4 filesystem being mounted at /10/mnt supports timestamps until 2038 (0x7fffffff) [ 1414.215624][T20773] EXT4-fs (loop1): unmounting filesystem. [ 1414.249097][T21693] loop1: detected capacity change from 0 to 512 [ 1414.266295][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1414.615639][T21172] EXT4-fs (loop4): unmounting filesystem. [ 1414.640323][T21700] loop4: detected capacity change from 0 to 128 [ 1414.674305][T21700] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1414.682710][T21693] EXT4-fs (loop1): 1 orphan inode deleted [ 1414.688364][T21693] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. [ 1414.721338][T21693] ext4 filesystem being mounted at /43/file1 supports timestamps until 2038 (0x7fffffff) [ 1414.743097][T21700] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1414.751796][T21700] ext4 filesystem being mounted at /24/mnt supports timestamps until 2038 (0x7fffffff) [ 1416.466553][T21713] device veth0_vlan left promiscuous mode [ 1416.480981][T21713] device veth0_vlan entered promiscuous mode [ 1416.911834][T21172] EXT4-fs (loop4): unmounting filesystem. [ 1416.919565][T21718] loop3: detected capacity change from 0 to 128 [ 1416.951973][T21718] ext4: Unknown parameter 'hash' [ 1416.988796][T21722] loop4: detected capacity change from 0 to 128 [ 1417.003089][T21722] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1417.011260][T21722] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1417.020102][T21722] ext4 filesystem being mounted at /25/mnt supports timestamps until 2038 (0x7fffffff) [ 1418.207338][ T28] kauditd_printk_skb: 48 callbacks suppressed [ 1418.207391][ T28] audit: type=1326 audit(1725094898.136:5276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21719 comm="syz.2.4760" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1418.431342][ T28] audit: type=1326 audit(1725094898.136:5277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21719 comm="syz.2.4760" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1418.474748][ T28] audit: type=1326 audit(1725094898.156:5278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21719 comm="syz.2.4760" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1418.498628][ T28] audit: type=1326 audit(1725094898.166:5279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21719 comm="syz.2.4760" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1418.522365][ T28] audit: type=1326 audit(1725094898.166:5280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21719 comm="syz.2.4760" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1418.556802][T21172] EXT4-fs (loop4): unmounting filesystem. [ 1418.568951][ T28] audit: type=1326 audit(1725094898.216:5281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21719 comm="syz.2.4760" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1418.592673][ T28] audit: type=1326 audit(1725094898.216:5282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21719 comm="syz.2.4760" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1418.616306][ T28] audit: type=1326 audit(1725094898.226:5283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21719 comm="syz.2.4760" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1418.640831][T20773] EXT4-fs (loop1): unmounting filesystem. [ 1418.641063][ T28] audit: type=1326 audit(1725094898.236:5284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21719 comm="syz.2.4760" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1418.687899][ T28] audit: type=1326 audit(1725094898.236:5285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21719 comm="syz.2.4760" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1418.792137][T21738] device veth0_vlan left promiscuous mode [ 1418.800785][T21738] device veth0_vlan entered promiscuous mode [ 1418.959640][T21742] loop4: detected capacity change from 0 to 128 [ 1419.053298][T21742] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1419.074783][T21742] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1419.084666][T21742] ext4 filesystem being mounted at /26/mnt supports timestamps until 2038 (0x7fffffff) [ 1419.246835][T21748] device veth0_vlan left promiscuous mode [ 1419.255277][T21748] device veth0_vlan entered promiscuous mode [ 1419.441888][T21750] loop2: detected capacity change from 0 to 128 [ 1419.466649][T21750] EXT4-fs (loop2): Test dummy encryption mode enabled [ 1419.487110][T21750] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1419.520871][T21750] ext4 filesystem being mounted at /19/mnt supports timestamps until 2038 (0x7fffffff) [ 1420.671208][T21286] EXT4-fs (loop2): unmounting filesystem. [ 1420.677761][T21172] EXT4-fs (loop4): unmounting filesystem. [ 1420.789699][T21769] loop2: detected capacity change from 0 to 128 [ 1420.818438][T21769] EXT4-fs (loop2): Test dummy encryption mode enabled [ 1420.837286][T21769] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1420.880482][T21769] ext4 filesystem being mounted at /20/mnt supports timestamps until 2038 (0x7fffffff) [ 1421.035466][T21767] loop3: detected capacity change from 0 to 40427 [ 1421.042373][T21767] F2FS-fs (loop3): Wrong NAT boundary, start(2560) end(462336) blocks(1024) [ 1421.051254][T21767] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1421.321962][T21767] F2FS-fs (loop3): Found nat_bits in checkpoint [ 1421.475243][T21767] F2FS-fs (loop3): Try to recover 1th superblock, ret: 0 [ 1421.484359][T21767] F2FS-fs (loop3): Mounted with checkpoint version = 48b305e5 [ 1421.500820][T21765] loop4: detected capacity change from 0 to 40427 [ 1421.508346][T21765] F2FS-fs (loop4): Wrong NAT boundary, start(2560) end(462336) blocks(1024) [ 1421.517375][T21765] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 1421.570392][T21765] F2FS-fs (loop4): Found nat_bits in checkpoint [ 1421.671266][T21765] F2FS-fs (loop4): Try to recover 1th superblock, ret: 0 [ 1421.684661][T21286] EXT4-fs (loop2): unmounting filesystem. [ 1421.696107][T21765] F2FS-fs (loop4): Mounted with checkpoint version = 48b305e5 [ 1421.709949][T21790] loop2: detected capacity change from 0 to 128 [ 1421.716782][T21790] EXT4-fs (loop2): Test dummy encryption mode enabled [ 1421.724821][T21790] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1421.734133][T21790] ext4 filesystem being mounted at /21/mnt supports timestamps until 2038 (0x7fffffff) [ 1421.747067][T21784] fuse: Bad value for 'fd' [ 1421.904098][T21313] syz-executor: attempt to access beyond end of device [ 1421.904098][T21313] loop3: rw=2049, sector=45096, nr_sectors = 8 limit=40427 [ 1421.904876][T21286] EXT4-fs (loop2): unmounting filesystem. [ 1422.036440][T21782] loop1: detected capacity change from 0 to 40427 [ 1422.048876][T21782] F2FS-fs (loop1): Wrong NAT boundary, start(2560) end(462336) blocks(1024) [ 1422.057727][T21782] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 1422.060437][T21796] loop2: detected capacity change from 0 to 1024 [ 1422.083728][T21796] JBD2: no valid journal superblock found [ 1422.093639][T21796] EXT4-fs (loop2): error loading journal [ 1422.100825][T21782] F2FS-fs (loop1): Found nat_bits in checkpoint [ 1422.173140][T21782] F2FS-fs (loop1): Try to recover 1th superblock, ret: 0 [ 1422.180980][T21782] F2FS-fs (loop1): Mounted with checkpoint version = 48b305e5 [ 1422.301978][T21172] syz-executor: attempt to access beyond end of device [ 1422.301978][T21172] loop4: rw=2049, sector=45096, nr_sectors = 8 limit=40427 [ 1423.190360][T20773] F2FS-fs (loop1): access invalid blkaddr:2048 [ 1423.196569][T21813] loop0: detected capacity change from 0 to 1024 [ 1423.200548][T20773] CPU: 0 PID: 20773 Comm: syz-executor Not tainted 6.1.93-syzkaller-00068-gb5e374dda921 #0 [ 1423.211693][T21815] loop3: detected capacity change from 0 to 128 [ 1423.212639][T20773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1423.228615][T20773] Call Trace: [ 1423.231737][T20773] [ 1423.234517][T20773] dump_stack_lvl+0x151/0x1b7 [ 1423.239033][T20773] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1423.244324][T20773] ? f2fs_get_next_page_offset+0x770/0x770 [ 1423.249969][T20773] dump_stack+0x15/0x1c [ 1423.253955][T20773] __f2fs_is_valid_blkaddr+0xda6/0x1450 [ 1423.259337][T20773] f2fs_is_valid_blkaddr+0x25/0x30 [ 1423.264283][T20773] f2fs_map_blocks+0xd32/0x43a0 [ 1423.268975][T20773] ? mempool_alloc_slab+0x1d/0x30 [ 1423.273834][T20773] ? f2fs_map_lock+0x260/0x260 [ 1423.278438][T20773] ? xa_load+0x1a1/0x210 [ 1423.282515][T20773] ? xas_find_conflict+0x8c0/0x8c0 [ 1423.287462][T20773] ? folio_unlock+0x5c/0x70 [ 1423.291797][T20773] f2fs_mpage_readpages+0xc65/0x20f0 [ 1423.296922][T20773] ? get_page_from_freelist+0x27ea/0x2870 [ 1423.302478][T20773] ? xas_load+0x39d/0x3b0 [ 1423.306640][T20773] ? dquot_release_reservation_block+0xa0/0xa0 [ 1423.312627][T20773] ? __this_cpu_preempt_check+0x13/0x20 [ 1423.318010][T20773] ? memcg_rstat_updated+0x4f/0x110 [ 1423.323054][T20773] f2fs_readahead+0xfd/0x250 [ 1423.327468][T20773] ? blk_start_plug+0x9c/0x130 [ 1423.332069][T20773] read_pages+0x1be/0xd40 [ 1423.336235][T20773] ? workingset_activation+0x430/0x430 [ 1423.341532][T20773] ? folio_add_lru+0x280/0x3f0 [ 1423.346129][T20773] ? page_cache_ra_unbounded+0x690/0x690 [ 1423.351685][T20773] ? filemap_add_folio+0x18f/0x200 [ 1423.356631][T20773] ? __filemap_add_folio+0xd10/0xd10 [ 1423.361758][T20773] page_cache_ra_unbounded+0x4c1/0x690 [ 1423.367054][T20773] ? readahead_gfp_mask+0x190/0x190 [ 1423.372085][T20773] ? __kernel_text_address+0xd/0x40 [ 1423.377115][T20773] ? unwind_get_return_address+0x4d/0x90 [ 1423.382586][T20773] page_cache_ra_order+0x987/0xc40 [ 1423.387536][T20773] ? do_page_cache_ra+0x110/0x110 [ 1423.392391][T20773] ? __stack_depot_save+0x36/0x480 [ 1423.397340][T20773] ? putname+0xfa/0x150 [ 1423.401332][T20773] ondemand_readahead+0x91a/0xee0 [ 1423.406190][T20773] ? kasan_set_track+0x4b/0x70 [ 1423.410790][T20773] ? kasan_save_free_info+0x2b/0x40 [ 1423.415825][T20773] ? ____kasan_slab_free+0x131/0x180 [ 1423.420948][T20773] ? do_syscall_64+0x3b/0xb0 [ 1423.425376][T20773] ? page_cache_sync_ra+0x450/0x450 [ 1423.430408][T20773] ? blk_cgroup_congested+0x132/0x150 [ 1423.435615][T20773] page_cache_sync_ra+0x3d6/0x450 [ 1423.440477][T20773] f2fs_readdir+0x599/0xc10 [ 1423.444823][T20773] ? f2fs_fill_dentries+0xd00/0xd00 [ 1423.449851][T20773] ? __this_cpu_preempt_check+0x13/0x20 [ 1423.455230][T20773] ? memcg_rstat_updated+0x4f/0x110 [ 1423.460268][T20773] ? security_file_permission+0x86/0xb0 [ 1423.465646][T20773] iterate_dir+0x265/0x610 [ 1423.469898][T20773] ? f2fs_fill_dentries+0xd00/0xd00 [ 1423.474933][T20773] __se_sys_getdents64+0x1c1/0x460 [ 1423.479881][T20773] ? __x64_sys_getdents64+0x90/0x90 [ 1423.484912][T20773] ? filldir+0x670/0x670 [ 1423.488992][T20773] ? debug_smp_processor_id+0x17/0x20 [ 1423.494202][T20773] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1423.500106][T20773] ? exit_to_user_mode_prepare+0x39/0xa0 [ 1423.505571][T20773] __x64_sys_getdents64+0x7b/0x90 [ 1423.510431][T20773] x64_sys_call+0x5ae/0x9a0 [ 1423.514770][T20773] do_syscall_64+0x3b/0xb0 [ 1423.519028][T20773] ? clear_bhb_loop+0x55/0xb0 [ 1423.523634][T20773] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1423.529361][T20773] RIP: 0033:0x7efef33ac053 [ 1423.533613][T20773] Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 62 43 f8 ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 a8 ff ff ff f7 d8 [ 1423.553058][T20773] RSP: 002b:00007fff62e70ef8 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9 [ 1423.561301][T20773] RAX: ffffffffffffffda RBX: 00005555573434e0 RCX: 00007efef33ac053 [ 1423.569118][T20773] RDX: 0000000000008000 RSI: 00005555573434e0 RDI: 0000000000000005 [ 1423.576930][T20773] RBP: 00005555573434b4 R08: 0000000000000000 R09: 0000000000000000 [ 1423.584737][T20773] R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffa8 [ 1423.592549][T20773] R13: 0000000000000010 R14: 00005555573434b0 R15: 00007fff62e731a0 [ 1423.600365][T20773] [ 1423.604171][T21813] JBD2: no valid journal superblock found [ 1423.610419][T21813] EXT4-fs (loop0): error loading journal [ 1423.627741][T21815] EXT4-fs (loop3): Test dummy encryption mode enabled [ 1423.656685][T21815] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1423.664367][T20773] syz-executor: attempt to access beyond end of device [ 1423.664367][T20773] loop1: rw=524288, sector=45064, nr_sectors = 8 limit=40427 [ 1423.679103][T20773] syz-executor: attempt to access beyond end of device [ 1423.679103][T20773] loop1: rw=0, sector=45064, nr_sectors = 8 limit=40427 [ 1423.684013][T21815] ext4 filesystem being mounted at /20/mnt supports timestamps until 2038 (0x7fffffff) [ 1423.752845][T20773] syz-executor: attempt to access beyond end of device [ 1423.752845][T20773] loop1: rw=2049, sector=45096, nr_sectors = 8 limit=40427 [ 1424.202275][T21826] loop0: detected capacity change from 0 to 128 [ 1424.225299][T21826] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1424.238765][T21826] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1424.248128][T21826] ext4 filesystem being mounted at /15/mnt supports timestamps until 2038 (0x7fffffff) [ 1424.857036][T21833] bridge0: port 1(bridge_slave_0) entered blocking state [ 1424.864033][T21833] bridge0: port 1(bridge_slave_0) entered disabled state [ 1424.873545][T21833] device bridge_slave_0 entered promiscuous mode [ 1424.882606][T21833] bridge0: port 2(bridge_slave_1) entered blocking state [ 1424.889967][T21833] bridge0: port 2(bridge_slave_1) entered disabled state [ 1424.907744][T21833] device bridge_slave_1 entered promiscuous mode [ 1424.978518][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1424.993010][ T8286] device bridge_slave_1 left promiscuous mode [ 1424.999168][ T8286] bridge0: port 2(bridge_slave_1) entered disabled state [ 1425.008525][ T8286] device bridge_slave_0 left promiscuous mode [ 1425.016103][ T8286] bridge0: port 1(bridge_slave_0) entered disabled state [ 1425.016181][T21845] loop3: detected capacity change from 0 to 128 [ 1425.032651][T21845] EXT4-fs (loop3): Test dummy encryption mode enabled [ 1425.047405][ T8286] device veth1_macvtap left promiscuous mode [ 1425.088484][ T8286] device veth0_vlan left promiscuous mode [ 1425.095306][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1425.100547][T21845] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1425.108463][T21848] loop2: detected capacity change from 0 to 128 [ 1425.123782][T21848] EXT4-fs (loop2): Test dummy encryption mode enabled [ 1425.138519][T21845] ext4 filesystem being mounted at /21/mnt supports timestamps until 2038 (0x7fffffff) [ 1425.151600][T21848] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1425.216037][T21848] ext4 filesystem being mounted at /25/mnt supports timestamps until 2038 (0x7fffffff) [ 1425.333354][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1425.878616][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1425.925841][T21858] device veth0_vlan left promiscuous mode [ 1425.932057][T21858] device veth0_vlan entered promiscuous mode [ 1425.942719][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1425.952210][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1425.961360][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1425.986584][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 1425.993494][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1426.016480][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1426.024829][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1426.033447][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 1426.040325][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1426.047814][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1426.059731][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1426.068095][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1426.088622][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1426.118994][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1426.141647][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1426.150336][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1426.170995][T21833] device veth0_vlan entered promiscuous mode [ 1426.180738][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1426.523621][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1426.533414][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1426.540933][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1426.567941][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1426.576537][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1426.585901][T21833] device veth1_macvtap entered promiscuous mode [ 1426.607212][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1426.614753][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1426.636132][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1426.653500][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1426.663925][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1426.779647][T21872] loop1: detected capacity change from 0 to 2048 [ 1428.537405][T21881] device veth0_vlan left promiscuous mode [ 1428.543824][T21881] device veth0_vlan entered promiscuous mode [ 1428.592955][T21286] EXT4-fs (loop2): unmounting filesystem. [ 1429.473106][T21884] loop0: detected capacity change from 0 to 128 [ 1429.483229][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1429.491850][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1429.499330][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1429.541572][T21884] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1429.565858][T21872] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1429.589208][T21890] loop2: detected capacity change from 0 to 1024 [ 1429.597492][T21890] JBD2: no valid journal superblock found [ 1429.603053][T21890] EXT4-fs (loop2): error loading journal [ 1429.645161][T21884] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1429.664032][T21884] ext4 filesystem being mounted at /18/mnt supports timestamps until 2038 (0x7fffffff) [ 1430.213062][T21898] device veth0_vlan left promiscuous mode [ 1430.219302][T21898] device veth0_vlan entered promiscuous mode [ 1431.573257][T21909] loop2: detected capacity change from 0 to 128 [ 1431.582155][T21909] EXT4-fs (loop2): Test dummy encryption mode enabled [ 1431.600093][T21833] EXT4-fs (loop1): unmounting filesystem. [ 1431.922952][T21909] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1431.933087][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1431.939133][T21909] ext4 filesystem being mounted at /27/mnt supports timestamps until 2038 (0x7fffffff) [ 1432.572037][T21924] device veth0_vlan left promiscuous mode [ 1432.585509][T21924] device veth0_vlan entered promiscuous mode [ 1432.921435][T21927] device veth0_vlan left promiscuous mode [ 1432.935825][T21927] device veth0_vlan entered promiscuous mode [ 1434.506380][T21938] device veth0_vlan left promiscuous mode [ 1434.514525][T21938] device veth0_vlan entered promiscuous mode [ 1434.613781][T21286] EXT4-fs (loop2): unmounting filesystem. [ 1434.936177][T21947] loop3: detected capacity change from 0 to 128 [ 1434.950379][T21947] EXT4-fs (loop3): Test dummy encryption mode enabled [ 1434.962811][T21947] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1434.975080][T21947] ext4 filesystem being mounted at /27/mnt supports timestamps until 2038 (0x7fffffff) [ 1436.212462][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1436.304034][T21972] loop3: detected capacity change from 0 to 128 [ 1436.433282][T21972] EXT4-fs (loop3): Test dummy encryption mode enabled [ 1436.616492][T21972] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1436.625245][T21972] ext4 filesystem being mounted at /28/mnt supports timestamps until 2038 (0x7fffffff) [ 1436.716949][T21963] loop4: detected capacity change from 0 to 40427 [ 1436.741986][T21963] F2FS-fs (loop4): Wrong NAT boundary, start(2560) end(462336) blocks(1024) [ 1436.750743][T21963] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 1437.088568][T21963] F2FS-fs (loop4): Found nat_bits in checkpoint [ 1437.178592][T21963] F2FS-fs (loop4): Try to recover 1th superblock, ret: 0 [ 1437.187558][T21963] F2FS-fs (loop4): Mounted with checkpoint version = 48b305e5 [ 1437.524375][T21172] F2FS-fs (loop4): access invalid blkaddr:2048 [ 1437.546378][T21172] CPU: 1 PID: 21172 Comm: syz-executor Not tainted 6.1.93-syzkaller-00068-gb5e374dda921 #0 [ 1437.556205][T21172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1437.566098][T21172] Call Trace: [ 1437.569218][T21172] [ 1437.571999][T21172] dump_stack_lvl+0x151/0x1b7 [ 1437.576516][T21172] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1437.581810][T21172] ? f2fs_get_next_page_offset+0x770/0x770 [ 1437.587452][T21172] dump_stack+0x15/0x1c [ 1437.591437][T21172] __f2fs_is_valid_blkaddr+0xda6/0x1450 [ 1437.596821][T21172] f2fs_is_valid_blkaddr+0x25/0x30 [ 1437.601769][T21172] f2fs_map_blocks+0xd32/0x43a0 [ 1437.606460][T21172] ? mempool_alloc_slab+0x1d/0x30 [ 1437.611319][T21172] ? f2fs_map_lock+0x260/0x260 [ 1437.615919][T21172] ? xa_load+0x1a1/0x210 [ 1437.619995][T21172] ? xas_find_conflict+0x8c0/0x8c0 [ 1437.624945][T21172] ? folio_unlock+0x5c/0x70 [ 1437.629283][T21172] f2fs_mpage_readpages+0xc65/0x20f0 [ 1437.634589][T21172] ? get_page_from_freelist+0x27ea/0x2870 [ 1437.640141][T21172] ? xas_load+0x39d/0x3b0 [ 1437.644308][T21172] ? dquot_release_reservation_block+0xa0/0xa0 [ 1437.650298][T21172] ? __this_cpu_preempt_check+0x13/0x20 [ 1437.655675][T21172] ? memcg_rstat_updated+0x4f/0x110 [ 1437.660718][T21172] f2fs_readahead+0xfd/0x250 [ 1437.665134][T21172] ? blk_start_plug+0x9c/0x130 [ 1437.669740][T21172] read_pages+0x1be/0xd40 [ 1437.673906][T21172] ? workingset_activation+0x430/0x430 [ 1437.679201][T21172] ? folio_add_lru+0x280/0x3f0 [ 1437.683798][T21172] ? page_cache_ra_unbounded+0x690/0x690 [ 1437.689264][T21172] ? filemap_add_folio+0x18f/0x200 [ 1437.694214][T21172] ? __filemap_add_folio+0xd10/0xd10 [ 1437.699335][T21172] page_cache_ra_unbounded+0x4c1/0x690 [ 1437.704627][T21172] ? readahead_gfp_mask+0x190/0x190 [ 1437.709660][T21172] ? __kernel_text_address+0xd/0x40 [ 1437.714696][T21172] ? unwind_get_return_address+0x4d/0x90 [ 1437.720162][T21172] page_cache_ra_order+0x987/0xc40 [ 1437.725115][T21172] ? do_page_cache_ra+0x110/0x110 [ 1437.729971][T21172] ? __stack_depot_save+0x36/0x480 [ 1437.734922][T21172] ? putname+0xfa/0x150 [ 1437.738911][T21172] ondemand_readahead+0x91a/0xee0 [ 1437.743777][T21172] ? kasan_set_track+0x4b/0x70 [ 1437.748369][T21172] ? kasan_save_free_info+0x2b/0x40 [ 1437.753403][T21172] ? ____kasan_slab_free+0x131/0x180 [ 1437.758531][T21172] ? do_syscall_64+0x3b/0xb0 [ 1437.763055][T21172] ? page_cache_sync_ra+0x450/0x450 [ 1437.768096][T21172] ? blk_cgroup_congested+0x132/0x150 [ 1437.773327][T21172] page_cache_sync_ra+0x3d6/0x450 [ 1437.778158][T21172] f2fs_readdir+0x599/0xc10 [ 1437.782499][T21172] ? f2fs_fill_dentries+0xd00/0xd00 [ 1437.787531][T21172] ? __this_cpu_preempt_check+0x13/0x20 [ 1437.792913][T21172] ? memcg_rstat_updated+0x4f/0x110 [ 1437.797950][T21172] ? security_file_permission+0x86/0xb0 [ 1437.803326][T21172] iterate_dir+0x265/0x610 [ 1437.807580][T21172] ? f2fs_fill_dentries+0xd00/0xd00 [ 1437.812613][T21172] __se_sys_getdents64+0x1c1/0x460 [ 1437.817559][T21172] ? __x64_sys_getdents64+0x90/0x90 [ 1437.822592][T21172] ? filldir+0x670/0x670 [ 1437.826690][T21172] ? debug_smp_processor_id+0x17/0x20 [ 1437.831889][T21172] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1437.837785][T21172] ? exit_to_user_mode_prepare+0x39/0xa0 [ 1437.843248][T21172] __x64_sys_getdents64+0x7b/0x90 [ 1437.848109][T21172] x64_sys_call+0x5ae/0x9a0 [ 1437.852447][T21172] do_syscall_64+0x3b/0xb0 [ 1437.856702][T21172] ? clear_bhb_loop+0x55/0xb0 [ 1437.861214][T21172] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1437.867033][T21172] RIP: 0033:0x7fd0de1ac053 [ 1437.871282][T21172] Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 62 43 f8 ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 a8 ff ff ff f7 d8 [ 1437.890732][T21172] RSP: 002b:00007ffccf4c8048 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9 [ 1437.898970][T21172] RAX: ffffffffffffffda RBX: 00005555561944e0 RCX: 00007fd0de1ac053 [ 1437.906781][T21172] RDX: 0000000000008000 RSI: 00005555561944e0 RDI: 0000000000000005 [ 1437.914599][T21172] RBP: 00005555561944b4 R08: 0000000000000000 R09: 0000000000000000 [ 1437.922432][T21172] R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffa8 [ 1437.930217][T21172] R13: 0000000000000010 R14: 00005555561944b0 R15: 00007ffccf4ca2f0 [ 1437.938030][T21172] [ 1437.960996][T21172] syz-executor: attempt to access beyond end of device [ 1437.960996][T21172] loop4: rw=524288, sector=45064, nr_sectors = 8 limit=40427 [ 1437.978525][T21172] syz-executor: attempt to access beyond end of device [ 1437.978525][T21172] loop4: rw=0, sector=45064, nr_sectors = 8 limit=40427 [ 1437.999076][T21172] syz-executor: attempt to access beyond end of device [ 1437.999076][T21172] loop4: rw=2049, sector=45096, nr_sectors = 8 limit=40427 [ 1438.055916][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1439.360831][T21996] loop1: detected capacity change from 0 to 40427 [ 1439.454713][T21996] F2FS-fs (loop1): Wrong NAT boundary, start(2560) end(462336) blocks(1024) [ 1439.463924][T21996] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 1439.487902][T22020] loop3: detected capacity change from 0 to 2048 [ 1439.528369][T22020] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1439.540993][T21996] F2FS-fs (loop1): Found nat_bits in checkpoint [ 1439.603338][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1439.613130][T21996] F2FS-fs (loop1): Try to recover 1th superblock, ret: 0 [ 1439.620339][T21996] F2FS-fs (loop1): Mounted with checkpoint version = 48b305e5 [ 1439.757881][T22032] bridge0: port 1(bridge_slave_0) entered blocking state [ 1439.764921][T22032] bridge0: port 1(bridge_slave_0) entered disabled state [ 1439.772425][T22032] device bridge_slave_0 entered promiscuous mode [ 1439.779763][T22032] bridge0: port 2(bridge_slave_1) entered blocking state [ 1439.790301][T22032] bridge0: port 2(bridge_slave_1) entered disabled state [ 1439.801295][T22032] device bridge_slave_1 entered promiscuous mode [ 1439.843530][T21833] F2FS-fs (loop1): access invalid blkaddr:2048 [ 1439.849609][T21833] CPU: 0 PID: 21833 Comm: syz-executor Not tainted 6.1.93-syzkaller-00068-gb5e374dda921 #0 [ 1439.859331][T21833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1439.869227][T21833] Call Trace: [ 1439.872350][T21833] [ 1439.875125][T21833] dump_stack_lvl+0x151/0x1b7 [ 1439.879642][T21833] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1439.884934][T21833] ? f2fs_get_next_page_offset+0x770/0x770 [ 1439.890576][T21833] dump_stack+0x15/0x1c [ 1439.894568][T21833] __f2fs_is_valid_blkaddr+0xda6/0x1450 [ 1439.899950][T21833] f2fs_is_valid_blkaddr+0x25/0x30 [ 1439.904896][T21833] f2fs_map_blocks+0xd32/0x43a0 [ 1439.909591][T21833] ? mempool_alloc_slab+0x1d/0x30 [ 1439.914450][T21833] ? f2fs_map_lock+0x260/0x260 [ 1439.919047][T21833] ? xa_load+0x1a1/0x210 [ 1439.923290][T21833] ? xas_find_conflict+0x8c0/0x8c0 [ 1439.925306][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 1439.925324][ T28] audit: type=1326 audit(1725094920.786:5296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22030 comm="syz.3.4826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1439.928321][T21833] ? folio_unlock+0x5c/0x70 [ 1439.928353][T21833] f2fs_mpage_readpages+0xc65/0x20f0 [ 1439.928386][T21833] ? get_page_from_freelist+0x27ea/0x2870 [ 1439.939519][ T28] audit: type=1326 audit(1725094920.806:5297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22030 comm="syz.3.4826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1439.957760][T21833] ? xas_load+0x39d/0x3b0 [ 1439.957796][T21833] ? dquot_release_reservation_block+0xa0/0xa0 [ 1439.957826][T21833] ? __this_cpu_preempt_check+0x13/0x20 [ 1439.957851][T21833] ? memcg_rstat_updated+0x4f/0x110 [ 1439.957878][T21833] f2fs_readahead+0xfd/0x250 [ 1439.962663][ T28] audit: type=1326 audit(1725094920.806:5298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22030 comm="syz.3.4826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1439.967201][T21833] ? blk_start_plug+0x9c/0x130 [ 1439.967231][T21833] read_pages+0x1be/0xd40 [ 1439.967255][T21833] ? workingset_activation+0x430/0x430 [ 1439.973321][ T28] audit: type=1326 audit(1725094920.806:5299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22030 comm="syz.3.4826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1439.996026][T21833] ? folio_add_lru+0x280/0x3f0 [ 1439.996062][T21833] ? page_cache_ra_unbounded+0x690/0x690 [ 1439.996087][T21833] ? filemap_add_folio+0x18f/0x200 [ 1439.996112][T21833] ? __filemap_add_folio+0xd10/0xd10 [ 1439.996139][T21833] page_cache_ra_unbounded+0x4c1/0x690 [ 1439.996165][T21833] ? readahead_gfp_mask+0x190/0x190 [ 1439.996187][T21833] ? __kernel_text_address+0xd/0x40 [ 1439.996205][T21833] ? unwind_get_return_address+0x4d/0x90 [ 1439.996232][T21833] page_cache_ra_order+0x987/0xc40 [ 1440.001147][ T28] audit: type=1326 audit(1725094920.806:5300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22030 comm="syz.3.4826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1440.006349][T21833] ? do_page_cache_ra+0x110/0x110 [ 1440.006380][T21833] ? __stack_depot_save+0x36/0x480 [ 1440.006409][T21833] ? putname+0xfa/0x150 [ 1440.012176][ T28] audit: type=1326 audit(1725094920.806:5301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22030 comm="syz.3.4826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1440.016768][T21833] ondemand_readahead+0x91a/0xee0 [ 1440.016805][T21833] ? kasan_set_track+0x4b/0x70 [ 1440.021486][ T28] audit: type=1326 audit(1725094920.806:5302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22030 comm="syz.3.4826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1440.044452][T21833] ? kasan_save_free_info+0x2b/0x40 [ 1440.044486][T21833] ? ____kasan_slab_free+0x131/0x180 [ 1440.044517][T21833] ? do_syscall_64+0x3b/0xb0 [ 1440.044538][T21833] ? page_cache_sync_ra+0x450/0x450 [ 1440.044562][T21833] ? blk_cgroup_congested+0x132/0x150 [ 1440.049779][ T28] audit: type=1326 audit(1725094920.806:5303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22030 comm="syz.3.4826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f390b578850 code=0x7ffc0000 [ 1440.053210][T21833] page_cache_sync_ra+0x3d6/0x450 [ 1440.058765][ T28] audit: type=1326 audit(1725094920.806:5304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22030 comm="syz.3.4826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1440.081790][T21833] f2fs_readdir+0x599/0xc10 [ 1440.081825][T21833] ? f2fs_fill_dentries+0xd00/0xd00 [ 1440.081846][T21833] ? __this_cpu_preempt_check+0x13/0x20 [ 1440.081870][T21833] ? memcg_rstat_updated+0x4f/0x110 [ 1440.086879][ T28] audit: type=1326 audit(1725094920.806:5305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22030 comm="syz.3.4826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1440.091841][T21833] ? security_file_permission+0x86/0xb0 [ 1440.346597][T21833] iterate_dir+0x265/0x610 [ 1440.350862][T21833] ? f2fs_fill_dentries+0xd00/0xd00 [ 1440.355880][T21833] __se_sys_getdents64+0x1c1/0x460 [ 1440.360831][T21833] ? __x64_sys_getdents64+0x90/0x90 [ 1440.365863][T21833] ? filldir+0x670/0x670 [ 1440.369941][T21833] ? debug_smp_processor_id+0x17/0x20 [ 1440.375149][T21833] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1440.381048][T21833] ? exit_to_user_mode_prepare+0x39/0xa0 [ 1440.386521][T21833] __x64_sys_getdents64+0x7b/0x90 [ 1440.391378][T21833] x64_sys_call+0x5ae/0x9a0 [ 1440.395716][T21833] do_syscall_64+0x3b/0xb0 [ 1440.399975][T21833] ? clear_bhb_loop+0x55/0xb0 [ 1440.404484][T21833] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1440.410212][T21833] RIP: 0033:0x7fba84fac053 [ 1440.414464][T21833] Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 62 43 f8 ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 a8 ff ff ff f7 d8 [ 1440.433914][T21833] RSP: 002b:00007ffe84ad4948 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9 [ 1440.442150][T21833] RAX: ffffffffffffffda RBX: 00005555558d04e0 RCX: 00007fba84fac053 [ 1440.449961][T21833] RDX: 0000000000008000 RSI: 00005555558d04e0 RDI: 0000000000000005 [ 1440.457775][T21833] RBP: 00005555558d04b4 R08: 0000000000000000 R09: 0000000000000000 [ 1440.465592][T21833] R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffa8 [ 1440.473395][T21833] R13: 0000000000000010 R14: 00005555558d04b0 R15: 00007ffe84ad6bf0 [ 1440.481314][T21833] [ 1440.486761][T21833] syz-executor: attempt to access beyond end of device [ 1440.486761][T21833] loop1: rw=524288, sector=45064, nr_sectors = 8 limit=40427 [ 1440.511779][T21833] syz-executor: attempt to access beyond end of device [ 1440.511779][T21833] loop1: rw=0, sector=45064, nr_sectors = 8 limit=40427 [ 1440.613950][T21833] syz-executor: attempt to access beyond end of device [ 1440.613950][T21833] loop1: rw=2049, sector=45096, nr_sectors = 8 limit=40427 [ 1440.658143][T22046] loop3: detected capacity change from 0 to 512 [ 1440.661484][T22045] loop2: detected capacity change from 0 to 512 [ 1440.696740][T13016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1440.704758][T13016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1440.713789][T13016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1440.721670][T13016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1440.729262][T13016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1440.747055][T22046] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 1440.757504][T22045] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 1440.758513][T13016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1440.766379][T22046] ext4 filesystem being mounted at /32/file0 supports timestamps until 2038 (0x7fffffff) [ 1440.784102][T22045] ext4 filesystem being mounted at /33/file0 supports timestamps until 2038 (0x7fffffff) [ 1440.787486][T13016] bridge0: port 1(bridge_slave_0) entered blocking state [ 1440.800637][T13016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1440.811650][T13016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1440.826214][T13016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1440.835057][T13016] bridge0: port 2(bridge_slave_1) entered blocking state [ 1440.841966][T13016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1440.850098][T13016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1440.866723][T21286] EXT4-fs (loop2): unmounting filesystem. [ 1440.895864][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1440.912849][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1440.921904][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1440.929466][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1440.937540][ T382] device bridge_slave_1 left promiscuous mode [ 1440.943866][ T382] bridge0: port 2(bridge_slave_1) entered disabled state [ 1440.951752][ T382] device bridge_slave_0 left promiscuous mode [ 1440.959639][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1440.965999][ T382] bridge0: port 1(bridge_slave_0) entered disabled state [ 1440.979854][ T382] device veth1_macvtap left promiscuous mode [ 1440.985823][ T382] device veth0_vlan left promiscuous mode [ 1441.036807][T22058] loop3: detected capacity change from 0 to 128 [ 1441.043609][T22058] EXT4-fs (loop3): Test dummy encryption mode enabled [ 1441.219680][T22058] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1441.311376][T22058] ext4 filesystem being mounted at /33/mnt supports timestamps until 2038 (0x7fffffff) [ 1441.599832][T22032] device veth0_vlan entered promiscuous mode [ 1441.616302][T22032] device veth1_macvtap entered promiscuous mode [ 1441.688990][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1441.697661][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1441.706052][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1441.713666][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1441.722117][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1441.730607][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1441.739092][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1442.645384][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1442.753711][T22064] bridge0: port 1(bridge_slave_0) entered blocking state [ 1442.761100][T22064] bridge0: port 1(bridge_slave_0) entered disabled state [ 1442.768999][T22064] device bridge_slave_0 entered promiscuous mode [ 1442.777118][T22064] bridge0: port 2(bridge_slave_1) entered blocking state [ 1442.784049][T22064] bridge0: port 2(bridge_slave_1) entered disabled state [ 1442.816344][T22064] device bridge_slave_1 entered promiscuous mode [ 1443.277775][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1443.286445][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1444.413206][T22064] device veth0_vlan entered promiscuous mode [ 1444.427933][T22064] device veth1_macvtap entered promiscuous mode [ 1444.809160][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1444.817609][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1444.826397][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1444.834904][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1444.843013][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1444.850446][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1444.857987][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1444.867293][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1444.875662][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1444.888263][ T666] bridge0: port 1(bridge_slave_0) entered blocking state [ 1444.895146][ T666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1444.909614][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1444.926233][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1444.939599][ T666] bridge0: port 2(bridge_slave_1) entered blocking state [ 1444.946506][ T666] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1444.957874][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1444.966258][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1444.974268][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1444.993906][T22103] device veth0_vlan left promiscuous mode [ 1445.000168][T22103] device veth0_vlan entered promiscuous mode [ 1446.969760][T22121] loop1: detected capacity change from 0 to 128 [ 1446.997469][T22121] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1447.035434][T22121] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1447.092098][T22121] ext4 filesystem being mounted at /1/mnt supports timestamps until 2038 (0x7fffffff) [ 1447.877791][T22136] device veth0_vlan left promiscuous mode [ 1447.890746][T22136] device veth0_vlan entered promiscuous mode [ 1448.851745][T22137] device veth0_vlan left promiscuous mode [ 1448.857937][T22137] device veth0_vlan entered promiscuous mode [ 1448.980503][T22064] EXT4-fs (loop1): unmounting filesystem. [ 1448.982698][T22146] loop2: detected capacity change from 0 to 128 [ 1449.023585][T22146] EXT4-fs (loop2): Test dummy encryption mode enabled [ 1449.506223][T22146] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1449.539476][T22146] ext4 filesystem being mounted at /39/mnt supports timestamps until 2038 (0x7fffffff) [ 1449.609754][ T382] device bridge_slave_1 left promiscuous mode [ 1449.616095][ T382] bridge0: port 2(bridge_slave_1) entered disabled state [ 1449.623653][ T382] device bridge_slave_0 left promiscuous mode [ 1449.629904][ T382] bridge0: port 1(bridge_slave_0) entered disabled state [ 1449.638554][ T382] device veth1_macvtap left promiscuous mode [ 1449.666336][ T382] device veth0_vlan left promiscuous mode [ 1449.686811][T22158] loop4: detected capacity change from 0 to 2048 [ 1450.212966][T21286] EXT4-fs (loop2): unmounting filesystem. [ 1450.233510][T22164] loop0: detected capacity change from 0 to 1024 [ 1450.241120][T22164] JBD2: no valid journal superblock found [ 1450.246714][T22164] EXT4-fs (loop0): error loading journal [ 1450.261468][T22158] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1450.346026][T17554] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1450.495839][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1451.087474][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 1451.087492][ T28] audit: type=1326 audit(1725094931.956:5324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22167 comm="syz.2.4854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1451.123009][ T28] audit: type=1326 audit(1725094931.986:5325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22167 comm="syz.2.4854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1451.463038][ T28] audit: type=1326 audit(1725094932.006:5326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22167 comm="syz.2.4854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1451.506062][T22185] device veth0_vlan left promiscuous mode [ 1451.518858][ T28] audit: type=1326 audit(1725094932.036:5327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22167 comm="syz.2.4854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1451.551175][T22185] device veth0_vlan entered promiscuous mode [ 1451.575829][ T28] audit: type=1326 audit(1725094932.056:5328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22167 comm="syz.2.4854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1451.593607][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1451.599254][ T28] audit: type=1326 audit(1725094932.056:5329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22167 comm="syz.2.4854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1451.630707][ T28] audit: type=1326 audit(1725094932.096:5330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22167 comm="syz.2.4854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1451.654216][ T28] audit: type=1326 audit(1725094932.106:5331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22167 comm="syz.2.4854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1451.739400][ T28] audit: type=1326 audit(1725094932.116:5332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22167 comm="syz.2.4854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2c96d78850 code=0x7ffc0000 [ 1451.865101][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1451.872624][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1451.880432][ T28] audit: type=1326 audit(1725094932.126:5333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22167 comm="syz.2.4854" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c96d79eb9 code=0x7ffc0000 [ 1451.912522][T22197] loop4: detected capacity change from 0 to 512 [ 1451.943142][T22197] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 1451.960468][T22197] ext4 filesystem being mounted at /5/file0 supports timestamps until 2038 (0x7fffffff) [ 1452.019726][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1452.055227][T22203] loop4: detected capacity change from 0 to 128 [ 1452.090199][T22203] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1452.112349][T22203] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1452.125989][T22203] ext4 filesystem being mounted at /6/mnt supports timestamps until 2038 (0x7fffffff) [ 1452.171584][T22206] loop0: detected capacity change from 0 to 1024 [ 1452.178822][T22206] JBD2: no valid journal superblock found [ 1452.184385][T22206] EXT4-fs (loop0): error loading journal [ 1454.224327][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1454.740647][T22228] loop1: detected capacity change from 0 to 2048 [ 1454.773371][T22228] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1454.881843][T22064] EXT4-fs (loop1): unmounting filesystem. [ 1456.734709][T22273] device veth0_vlan left promiscuous mode [ 1456.748999][T22273] device veth0_vlan entered promiscuous mode [ 1456.769103][T14652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1456.780506][T14652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1456.797268][T14652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1456.897146][T22263] loop3: detected capacity change from 0 to 40427 [ 1456.913950][T22263] F2FS-fs (loop3): Wrong NAT boundary, start(2560) end(462336) blocks(1024) [ 1456.931306][T22263] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1456.968917][T22263] F2FS-fs (loop3): Found nat_bits in checkpoint [ 1457.052645][T22278] loop1: detected capacity change from 0 to 1024 [ 1457.059998][T22278] JBD2: no valid journal superblock found [ 1457.065664][T22278] EXT4-fs (loop1): error loading journal [ 1457.154896][T22270] loop4: detected capacity change from 0 to 40427 [ 1457.182131][T22263] F2FS-fs (loop3): Try to recover 1th superblock, ret: 0 [ 1457.195846][T22263] F2FS-fs (loop3): Mounted with checkpoint version = 48b305e5 [ 1457.195990][T22270] F2FS-fs (loop4): Wrong NAT boundary, start(2560) end(462336) blocks(1024) [ 1457.226048][T22270] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 1457.235161][T22272] loop2: detected capacity change from 0 to 40427 [ 1457.350929][T22272] F2FS-fs (loop2): Wrong NAT boundary, start(2560) end(462336) blocks(1024) [ 1457.450654][T22272] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 1457.475313][T22270] F2FS-fs (loop4): Found nat_bits in checkpoint [ 1457.488498][T22272] F2FS-fs (loop2): Found nat_bits in checkpoint [ 1457.654481][T22270] F2FS-fs (loop4): Try to recover 1th superblock, ret: 0 [ 1457.707444][T22270] F2FS-fs (loop4): Mounted with checkpoint version = 48b305e5 [ 1457.843254][T22294] loop0: detected capacity change from 0 to 2048 [ 1457.846275][T22272] F2FS-fs (loop2): Try to recover 1th superblock, ret: 0 [ 1457.865863][T22272] F2FS-fs (loop2): Mounted with checkpoint version = 48b305e5 [ 1457.963823][T22294] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1458.786946][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1459.975246][T21286] F2FS-fs (loop2): access invalid blkaddr:2048 [ 1459.994541][T21286] CPU: 0 PID: 21286 Comm: syz-executor Not tainted 6.1.93-syzkaller-00068-gb5e374dda921 #0 [ 1460.004366][T21286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1460.014259][T21286] Call Trace: [ 1460.017382][T21286] [ 1460.020159][T21286] dump_stack_lvl+0x151/0x1b7 [ 1460.024673][T21286] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1460.029974][T21286] ? f2fs_get_next_page_offset+0x770/0x770 [ 1460.035620][T21286] dump_stack+0x15/0x1c [ 1460.039604][T21286] __f2fs_is_valid_blkaddr+0xda6/0x1450 [ 1460.044988][T21286] f2fs_is_valid_blkaddr+0x25/0x30 [ 1460.049932][T21286] f2fs_map_blocks+0xd32/0x43a0 [ 1460.054623][T21286] ? mempool_alloc_slab+0x1d/0x30 [ 1460.059482][T21286] ? f2fs_map_lock+0x260/0x260 [ 1460.064083][T21286] ? xa_load+0x1a1/0x210 [ 1460.068161][T21286] ? xas_find_conflict+0x8c0/0x8c0 [ 1460.073116][T21286] ? folio_unlock+0x5c/0x70 [ 1460.077447][T21286] f2fs_mpage_readpages+0xc65/0x20f0 [ 1460.082567][T21286] ? get_page_from_freelist+0x27ea/0x2870 [ 1460.088125][T21286] ? xas_load+0x39d/0x3b0 [ 1460.092291][T21286] ? dquot_release_reservation_block+0xa0/0xa0 [ 1460.098278][T21286] ? __this_cpu_preempt_check+0x13/0x20 [ 1460.103656][T21286] ? memcg_rstat_updated+0x4f/0x110 [ 1460.108698][T21286] f2fs_readahead+0xfd/0x250 [ 1460.113113][T21286] ? blk_start_plug+0x9c/0x130 [ 1460.117715][T21286] read_pages+0x1be/0xd40 [ 1460.121878][T21286] ? workingset_activation+0x430/0x430 [ 1460.127177][T21286] ? folio_add_lru+0x280/0x3f0 [ 1460.131775][T21286] ? page_cache_ra_unbounded+0x690/0x690 [ 1460.137244][T21286] ? filemap_add_folio+0x18f/0x200 [ 1460.142192][T21286] ? __filemap_add_folio+0xd10/0xd10 [ 1460.147315][T21286] page_cache_ra_unbounded+0x4c1/0x690 [ 1460.152609][T21286] ? readahead_gfp_mask+0x190/0x190 [ 1460.157639][T21286] ? __kernel_text_address+0xd/0x40 [ 1460.162671][T21286] ? unwind_get_return_address+0x4d/0x90 [ 1460.168152][T21286] page_cache_ra_order+0x987/0xc40 [ 1460.173095][T21286] ? do_page_cache_ra+0x110/0x110 [ 1460.177948][T21286] ? __stack_depot_save+0x36/0x480 [ 1460.182901][T21286] ? putname+0xfa/0x150 [ 1460.186895][T21286] ondemand_readahead+0x91a/0xee0 [ 1460.191752][T21286] ? kasan_set_track+0x4b/0x70 [ 1460.196350][T21286] ? kasan_save_free_info+0x2b/0x40 [ 1460.201385][T21286] ? ____kasan_slab_free+0x131/0x180 [ 1460.206509][T21286] ? do_syscall_64+0x3b/0xb0 [ 1460.210937][T21286] ? page_cache_sync_ra+0x450/0x450 [ 1460.215970][T21286] ? blk_cgroup_congested+0x132/0x150 [ 1460.221175][T21286] page_cache_sync_ra+0x3d6/0x450 [ 1460.226038][T21286] f2fs_readdir+0x599/0xc10 [ 1460.230380][T21286] ? f2fs_fill_dentries+0xd00/0xd00 [ 1460.235499][T21286] ? __this_cpu_preempt_check+0x13/0x20 [ 1460.240880][T21286] ? memcg_rstat_updated+0x4f/0x110 [ 1460.245917][T21286] ? security_file_permission+0x86/0xb0 [ 1460.251294][T21286] iterate_dir+0x265/0x610 [ 1460.255543][T21286] ? f2fs_fill_dentries+0xd00/0xd00 [ 1460.260580][T21286] __se_sys_getdents64+0x1c1/0x460 [ 1460.265527][T21286] ? __x64_sys_getdents64+0x90/0x90 [ 1460.270556][T21286] ? filldir+0x670/0x670 [ 1460.274639][T21286] ? debug_smp_processor_id+0x17/0x20 [ 1460.279847][T21286] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1460.285750][T21286] ? exit_to_user_mode_prepare+0x39/0xa0 [ 1460.291215][T21286] __x64_sys_getdents64+0x7b/0x90 [ 1460.296080][T21286] x64_sys_call+0x5ae/0x9a0 [ 1460.300413][T21286] do_syscall_64+0x3b/0xb0 [ 1460.304669][T21286] ? clear_bhb_loop+0x55/0xb0 [ 1460.309202][T21286] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1460.314911][T21286] RIP: 0033:0x7f2c96dac053 [ 1460.319189][T21286] Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 62 43 f8 ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 a8 ff ff ff f7 d8 [ 1460.338603][T21286] RSP: 002b:00007ffef9fcb048 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9 [ 1460.346848][T21286] RAX: ffffffffffffffda RBX: 0000555555f154e0 RCX: 00007f2c96dac053 [ 1460.354662][T21286] RDX: 0000000000008000 RSI: 0000555555f154e0 RDI: 0000000000000005 [ 1460.362471][T21286] RBP: 0000555555f154b4 R08: 0000000000000000 R09: 0000000000000000 [ 1460.370282][T21286] R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffa8 [ 1460.378096][T21286] R13: 0000000000000010 R14: 0000555555f154b0 R15: 00007ffef9fcd2f0 [ 1460.385912][T21286] [ 1460.849218][T21286] syz-executor: attempt to access beyond end of device [ 1460.849218][T21286] loop2: rw=524288, sector=45064, nr_sectors = 8 limit=40427 [ 1460.873480][T21286] syz-executor: attempt to access beyond end of device [ 1460.873480][T21286] loop2: rw=0, sector=45064, nr_sectors = 8 limit=40427 [ 1460.880918][T22324] loop4: detected capacity change from 0 to 1024 [ 1461.134801][T22324] JBD2: no valid journal superblock found [ 1461.140574][T22324] EXT4-fs (loop4): error loading journal [ 1461.276523][T21286] syz-executor: attempt to access beyond end of device [ 1461.276523][T21286] loop2: rw=2049, sector=45096, nr_sectors = 8 limit=40427 [ 1461.848421][T22336] loop4: detected capacity change from 0 to 128 [ 1461.889614][T22336] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1461.921469][T22336] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1461.946221][T22336] ext4 filesystem being mounted at /12/mnt supports timestamps until 2038 (0x7fffffff) [ 1463.372995][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1463.377192][T22351] loop1: detected capacity change from 0 to 128 [ 1463.386825][T22351] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1463.392840][T22329] loop3: detected capacity change from 0 to 40427 [ 1463.400197][T22329] F2FS-fs (loop3): Wrong NAT boundary, start(2560) end(462336) blocks(1024) [ 1463.414824][T22329] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1463.434900][T22351] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1463.449419][T22351] ext4 filesystem being mounted at /12/mnt supports timestamps until 2038 (0x7fffffff) [ 1463.488124][T22329] F2FS-fs (loop3): Found nat_bits in checkpoint [ 1463.536361][T22329] F2FS-fs (loop3): Try to recover 1th superblock, ret: 0 [ 1465.102749][T22352] bridge0: port 1(bridge_slave_0) entered blocking state [ 1465.116022][T22329] F2FS-fs (loop3): Mounted with checkpoint version = 48b305e5 [ 1465.123060][T22352] bridge0: port 1(bridge_slave_0) entered disabled state [ 1465.133252][T22352] device bridge_slave_0 entered promiscuous mode [ 1465.191866][T22064] EXT4-fs (loop1): unmounting filesystem. [ 1465.224025][T22352] bridge0: port 2(bridge_slave_1) entered blocking state [ 1465.276288][T22352] bridge0: port 2(bridge_slave_1) entered disabled state [ 1465.316106][T22352] device bridge_slave_1 entered promiscuous mode [ 1465.329492][ T380] device bridge_slave_1 left promiscuous mode [ 1465.337668][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 1465.359160][ T380] device bridge_slave_0 left promiscuous mode [ 1465.391183][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 1465.516597][ T380] device veth1_macvtap left promiscuous mode [ 1465.522680][ T380] device veth0_vlan left promiscuous mode [ 1466.105608][T22381] loop3: detected capacity change from 0 to 40427 [ 1466.128501][T22381] F2FS-fs (loop3): Wrong NAT boundary, start(2560) end(462336) blocks(1024) [ 1466.151092][T22378] loop1: detected capacity change from 0 to 40427 [ 1466.161078][T22381] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1466.179875][T22378] F2FS-fs (loop1): Wrong NAT boundary, start(2560) end(462336) blocks(1024) [ 1466.195774][T22378] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 1466.204369][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1466.213088][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1466.221875][T22381] F2FS-fs (loop3): Found nat_bits in checkpoint [ 1466.231529][T22378] F2FS-fs (loop1): Found nat_bits in checkpoint [ 1466.257493][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1466.266230][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1466.274258][ T667] bridge0: port 1(bridge_slave_0) entered blocking state [ 1466.281147][ T667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1466.350990][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1466.363605][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1466.372226][T22381] F2FS-fs (loop3): Try to recover 1th superblock, ret: 0 [ 1466.379225][T22381] F2FS-fs (loop3): Mounted with checkpoint version = 48b305e5 [ 1466.387111][ T667] bridge0: port 2(bridge_slave_1) entered blocking state [ 1466.393953][ T667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1466.405180][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1466.417112][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1466.453669][T22352] device veth0_vlan entered promiscuous mode [ 1466.503134][T22378] F2FS-fs (loop1): Try to recover 1th superblock, ret: 0 [ 1466.508108][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1466.533379][T22378] F2FS-fs (loop1): Mounted with checkpoint version = 48b305e5 [ 1466.555210][T22404] loop0: detected capacity change from 0 to 128 [ 1466.926385][T22404] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1467.008748][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1467.017273][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1467.025509][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1467.033454][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1467.045613][T22405] device veth0_vlan left promiscuous mode [ 1467.052398][T22405] device veth0_vlan entered promiscuous mode [ 1467.060486][T22404] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1467.070212][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1467.077848][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1467.093709][T22404] ext4 filesystem being mounted at /41/mnt supports timestamps until 2038 (0x7fffffff) [ 1467.103449][T22352] device veth1_macvtap entered promiscuous mode [ 1467.147034][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1467.155590][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1467.163933][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1467.176027][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1467.184124][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1467.192631][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1467.211929][ T666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1467.283599][T22414] loop2: detected capacity change from 0 to 1024 [ 1467.291114][T22414] JBD2: no valid journal superblock found [ 1467.296738][T22414] EXT4-fs (loop2): error loading journal [ 1467.310113][T22417] loop4: detected capacity change from 0 to 128 [ 1467.422812][T22064] F2FS-fs (loop1): access invalid blkaddr:2048 [ 1468.384173][T22064] CPU: 0 PID: 22064 Comm: syz-executor Not tainted 6.1.93-syzkaller-00068-gb5e374dda921 #0 [ 1468.394004][T22064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1468.403896][T22064] Call Trace: [ 1468.407021][T22064] [ 1468.409798][T22064] dump_stack_lvl+0x151/0x1b7 [ 1468.414310][T22064] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1468.419607][T22064] ? f2fs_get_next_page_offset+0x770/0x770 [ 1468.425245][T22064] ? __switch_to+0x62c/0x1190 [ 1468.429759][T22064] dump_stack+0x15/0x1c [ 1468.433748][T22064] __f2fs_is_valid_blkaddr+0xda6/0x1450 [ 1468.439134][T22064] f2fs_is_valid_blkaddr+0x25/0x30 [ 1468.444078][T22064] f2fs_map_blocks+0xd32/0x43a0 [ 1468.448779][T22064] ? f2fs_map_lock+0x260/0x260 [ 1468.453364][T22064] ? xa_load+0x1a1/0x210 [ 1468.457446][T22064] ? xas_find_conflict+0x8c0/0x8c0 [ 1468.462393][T22064] ? f2fs_mpage_readpages+0xd4c/0x20f0 [ 1468.467689][T22064] f2fs_mpage_readpages+0xc65/0x20f0 [ 1468.472812][T22064] ? dquot_release_reservation_block+0xa0/0xa0 [ 1468.478793][T22064] ? asm_sysvec_reschedule_ipi+0x1b/0x20 [ 1468.484269][T22064] f2fs_readahead+0xfd/0x250 [ 1468.488689][T22064] ? blk_start_plug+0x9c/0x130 [ 1468.493378][T22064] read_pages+0x1be/0xd40 [ 1468.497540][T22064] ? workingset_activation+0x430/0x430 [ 1468.502840][T22064] ? folio_add_lru+0x280/0x3f0 [ 1468.507442][T22064] ? page_cache_ra_unbounded+0x690/0x690 [ 1468.512904][T22064] ? filemap_add_folio+0x18f/0x200 [ 1468.517948][T22064] ? __filemap_add_folio+0xd10/0xd10 [ 1468.523060][T22064] page_cache_ra_unbounded+0x4c1/0x690 [ 1468.528354][T22064] ? readahead_gfp_mask+0x190/0x190 [ 1468.533392][T22064] ? __kasan_check_read+0x11/0x20 [ 1468.538253][T22064] page_cache_ra_order+0x987/0xc40 [ 1468.543199][T22064] ? asm_sysvec_reschedule_ipi+0x1b/0x20 [ 1468.548664][T22064] ? do_page_cache_ra+0x110/0x110 [ 1468.553523][T22064] ? ondemand_readahead+0x6c0/0xee0 [ 1468.558558][T22064] ondemand_readahead+0x91a/0xee0 [ 1468.563421][T22064] ? raw_irqentry_exit_cond_resched+0x2a/0x30 [ 1468.569321][T22064] ? page_cache_sync_ra+0x450/0x450 [ 1468.574540][T22064] ? blk_cgroup_congested+0x132/0x150 [ 1468.579742][T22064] page_cache_sync_ra+0x3d6/0x450 [ 1468.584626][T22064] f2fs_readdir+0x599/0xc10 [ 1468.588948][T22064] ? f2fs_fill_dentries+0xd00/0xd00 [ 1468.594090][T22064] ? __this_cpu_preempt_check+0x13/0x20 [ 1468.599475][T22064] ? security_file_permission+0x86/0xb0 [ 1468.604849][T22064] iterate_dir+0x265/0x610 [ 1468.609109][T22064] ? f2fs_fill_dentries+0xd00/0xd00 [ 1468.614135][T22064] __se_sys_getdents64+0x1c1/0x460 [ 1468.619092][T22064] ? __x64_sys_getdents64+0x90/0x90 [ 1468.624117][T22064] ? filldir+0x670/0x670 [ 1468.628192][T22064] ? __kasan_check_write+0x14/0x20 [ 1468.633150][T22064] ? fpregs_restore_userregs+0x130/0x290 [ 1468.638646][T22064] ? switch_fpu_return+0xe/0x10 [ 1468.643320][T22064] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 1468.648885][T22064] __x64_sys_getdents64+0x7b/0x90 [ 1468.653742][T22064] x64_sys_call+0x5ae/0x9a0 [ 1468.658083][T22064] do_syscall_64+0x3b/0xb0 [ 1468.662417][T22064] ? clear_bhb_loop+0x55/0xb0 [ 1468.666930][T22064] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1468.672661][T22064] RIP: 0033:0x7fb0ea9ac053 [ 1468.676912][T22064] Code: c1 66 0f 1f 44 00 00 48 83 c4 08 48 89 ef 5b 5d e9 62 43 f8 ff 66 90 b8 ff ff ff 7f 48 39 c2 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 c7 c2 a8 ff ff ff f7 d8 [ 1468.696570][T22064] RSP: 002b:00007ffca3a4f498 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9 [ 1468.704817][T22064] RAX: ffffffffffffffda RBX: 0000555556c504e0 RCX: 00007fb0ea9ac053 [ 1468.712638][T22064] RDX: 0000000000008000 RSI: 0000555556c504e0 RDI: 0000000000000005 [ 1468.720431][T22064] RBP: 0000555556c504b4 R08: 0000000000000000 R09: 0000000000000000 [ 1468.728241][T22064] R10: 0000000000001000 R11: 0000000000000293 R12: ffffffffffffffa8 [ 1468.736053][T22064] R13: 0000000000000010 R14: 0000555556c504b0 R15: 00007ffca3a51740 [ 1468.743869][T22064] [ 1468.748343][T22417] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1468.756078][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1468.761737][T17554] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1468.790202][T22064] syz-executor: attempt to access beyond end of device [ 1468.790202][T22064] loop1: rw=524288, sector=45064, nr_sectors = 8 limit=40427 [ 1468.804670][T22064] syz-executor: attempt to access beyond end of device [ 1468.804670][T22064] loop1: rw=0, sector=45064, nr_sectors = 8 limit=40427 [ 1468.832792][T22064] syz-executor: attempt to access beyond end of device [ 1468.832792][T22064] loop1: rw=2049, sector=45096, nr_sectors = 8 limit=40427 [ 1468.846354][T22417] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1468.855520][T22417] ext4 filesystem being mounted at /16/mnt supports timestamps until 2038 (0x7fffffff) [ 1471.220665][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1471.288696][T22446] loop0: detected capacity change from 0 to 128 [ 1471.295549][T22446] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1471.312901][T22446] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1471.321732][T22446] ext4 filesystem being mounted at /43/mnt supports timestamps until 2038 (0x7fffffff) [ 1473.141137][T22461] device veth0_vlan left promiscuous mode [ 1473.149597][T22461] device veth0_vlan entered promiscuous mode [ 1473.512369][T22467] loop3: detected capacity change from 0 to 1024 [ 1473.519860][T22467] JBD2: no valid journal superblock found [ 1473.525450][T22467] EXT4-fs (loop3): error loading journal [ 1473.645748][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1475.180585][T22487] loop4: detected capacity change from 0 to 128 [ 1475.195652][T22487] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1475.205439][T22487] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1475.242603][T22487] ext4 filesystem being mounted at /19/mnt supports timestamps until 2038 (0x7fffffff) [ 1475.289536][T22469] bridge0: port 1(bridge_slave_0) entered blocking state [ 1475.296549][T22469] bridge0: port 1(bridge_slave_0) entered disabled state [ 1475.304031][T22469] device bridge_slave_0 entered promiscuous mode [ 1475.314370][T22469] bridge0: port 2(bridge_slave_1) entered blocking state [ 1475.321624][T22469] bridge0: port 2(bridge_slave_1) entered disabled state [ 1475.329407][T22469] device bridge_slave_1 entered promiscuous mode [ 1477.257005][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 1477.257026][ T28] audit: type=1326 audit(1725094956.676:5339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22488 comm="syz.3.4921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1477.557031][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1477.563916][ T28] audit: type=1326 audit(1725094956.676:5340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22488 comm="syz.3.4921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1477.575548][T22508] loop3: detected capacity change from 0 to 128 [ 1477.587757][ T28] audit: type=1326 audit(1725094956.696:5341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22488 comm="syz.3.4921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1477.621017][T22508] EXT4-fs (loop3): Test dummy encryption mode enabled [ 1477.628283][ T28] audit: type=1326 audit(1725094956.706:5342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22488 comm="syz.3.4921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1477.660338][T22508] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1477.669221][T22508] ext4 filesystem being mounted at /52/mnt supports timestamps until 2038 (0x7fffffff) [ 1477.736195][ T28] audit: type=1326 audit(1725094956.716:5343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22488 comm="syz.3.4921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1478.858261][ T28] audit: type=1326 audit(1725094956.716:5344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22488 comm="syz.3.4921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1478.916429][ T28] audit: type=1326 audit(1725094956.716:5345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22488 comm="syz.3.4921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1478.947796][ T28] audit: type=1326 audit(1725094956.716:5346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22488 comm="syz.3.4921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1480.212756][ T28] audit: type=1326 audit(1725094956.716:5347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22488 comm="syz.3.4921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1480.282710][ T380] device bridge_slave_1 left promiscuous mode [ 1480.356268][ T28] audit: type=1326 audit(1725094956.716:5348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22488 comm="syz.3.4921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1480.391299][T22527] loop4: detected capacity change from 0 to 128 [ 1480.408013][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 1480.416068][T22527] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1480.417474][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1480.432314][ T380] device bridge_slave_0 left promiscuous mode [ 1480.438405][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 1480.448114][T22527] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1480.456679][T22527] ext4 filesystem being mounted at /21/mnt supports timestamps until 2038 (0x7fffffff) [ 1480.518810][ T380] device veth1_macvtap left promiscuous mode [ 1480.524673][ T380] device veth0_vlan left promiscuous mode [ 1482.729303][T22541] device veth0_vlan left promiscuous mode [ 1482.735399][T22541] device veth0_vlan entered promiscuous mode [ 1482.781357][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1482.832986][T22552] loop0: detected capacity change from 0 to 128 [ 1482.841550][T22552] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1482.853956][T22552] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1483.216005][ T28] kauditd_printk_skb: 28 callbacks suppressed [ 1483.216087][ T28] audit: type=1326 audit(1725094963.866:5377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22546 comm="syz.3.4931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1483.248503][T22552] ext4 filesystem being mounted at /46/mnt supports timestamps until 2038 (0x7fffffff) [ 1483.266081][ T28] audit: type=1326 audit(1725094963.876:5378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22546 comm="syz.3.4931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1483.310351][ T28] audit: type=1326 audit(1725094963.896:5379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22546 comm="syz.3.4931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1483.346648][ T28] audit: type=1326 audit(1725094963.906:5380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22546 comm="syz.3.4931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1483.381258][ T28] audit: type=1326 audit(1725094963.906:5381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22546 comm="syz.3.4931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1483.425610][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1483.433755][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1483.446703][ T28] audit: type=1326 audit(1725094963.956:5382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22546 comm="syz.3.4931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1483.880266][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1483.881440][ T28] audit: type=1326 audit(1725094963.966:5383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22546 comm="syz.3.4931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1483.909473][ T28] audit: type=1326 audit(1725094963.966:5384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22546 comm="syz.3.4931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1483.932899][ T28] audit: type=1326 audit(1725094963.976:5385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22546 comm="syz.3.4931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1483.972011][ T28] audit: type=1326 audit(1725094963.976:5386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22546 comm="syz.3.4931" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1484.016454][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1484.024772][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1484.033923][T13147] bridge0: port 1(bridge_slave_0) entered blocking state [ 1484.040801][T13147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1484.056450][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1484.071687][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1484.086012][T13147] bridge0: port 2(bridge_slave_1) entered blocking state [ 1484.092898][T13147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1484.110427][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1484.128678][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1484.146211][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1484.154203][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1484.170784][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1484.215806][T22565] device veth0_vlan left promiscuous mode [ 1484.267411][T22565] device veth0_vlan entered promiscuous mode [ 1485.001970][T22469] device veth0_vlan entered promiscuous mode [ 1485.015142][T22469] device veth1_macvtap entered promiscuous mode [ 1485.043985][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1485.058272][T22576] loop2: detected capacity change from 0 to 128 [ 1485.076170][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1485.083440][T22576] EXT4-fs (loop2): Test dummy encryption mode enabled [ 1485.090945][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1485.106220][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1485.114474][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1485.123309][T22576] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1485.136095][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1485.152286][T22576] ext4 filesystem being mounted at /9/mnt supports timestamps until 2038 (0x7fffffff) [ 1485.154031][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1485.169711][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1485.177763][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1485.185833][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1485.193301][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1485.201472][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1485.215190][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1485.223624][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1485.244815][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1485.252229][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1485.332357][T22563] loop3: detected capacity change from 0 to 40427 [ 1485.379408][T22563] F2FS-fs (loop3): Wrong NAT boundary, start(2560) end(462336) blocks(1024) [ 1485.388020][T22563] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1485.398659][T22563] F2FS-fs (loop3): Found nat_bits in checkpoint [ 1487.376355][T22352] EXT4-fs (loop2): unmounting filesystem. [ 1488.800778][T22608] device veth0_vlan left promiscuous mode [ 1488.808026][T22608] device veth0_vlan entered promiscuous mode [ 1489.347672][ T5640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1489.357648][ T5640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1489.365047][ T5640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1489.516713][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 1489.516737][ T28] audit: type=1326 audit(1725094970.376:5402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.0.4941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbda6779eb9 code=0x7ffc0000 [ 1489.866096][ T28] audit: type=1326 audit(1725094970.486:5403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.0.4941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbda6779eb9 code=0x7ffc0000 [ 1489.905292][ T28] audit: type=1326 audit(1725094970.506:5404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.0.4941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbda6779eb9 code=0x7ffc0000 [ 1490.719835][ T28] audit: type=1326 audit(1725094970.516:5405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.0.4941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbda6779eb9 code=0x7ffc0000 [ 1490.752531][ T28] audit: type=1326 audit(1725094970.516:5406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.0.4941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbda6779eb9 code=0x7ffc0000 [ 1490.776282][ T28] audit: type=1326 audit(1725094970.516:5407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.0.4941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fbda6779eb9 code=0x7ffc0000 [ 1490.799842][ T28] audit: type=1326 audit(1725094970.526:5408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.0.4941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbda6779eb9 code=0x7ffc0000 [ 1490.827250][T22628] loop0: detected capacity change from 0 to 2048 [ 1490.856275][ T28] audit: type=1326 audit(1725094970.526:5409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.0.4941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fbda6778850 code=0x7ffc0000 [ 1490.889341][ T28] audit: type=1326 audit(1725094970.536:5410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.0.4941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbda6779eb9 code=0x7ffc0000 [ 1490.948807][T22628] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1492.045174][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1492.087975][ T28] audit: type=1326 audit(1725094970.536:5411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.0.4941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fbda6779eb9 code=0x7ffc0000 [ 1492.111367][T22626] device veth0_vlan left promiscuous mode [ 1492.117742][T22626] device veth0_vlan entered promiscuous mode [ 1492.138338][T22653] loop0: detected capacity change from 0 to 128 [ 1492.514174][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1492.553068][T22653] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1492.715645][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1492.757889][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1492.771701][T22653] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1492.808107][T22653] ext4 filesystem being mounted at /51/mnt supports timestamps until 2038 (0x7fffffff) [ 1492.984363][T22664] loop3: detected capacity change from 0 to 128 [ 1493.018247][T22661] loop2: detected capacity change from 0 to 2048 [ 1493.052792][T22664] EXT4-fs (loop3): Test dummy encryption mode enabled [ 1493.079699][T22664] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1493.092263][T22664] ext4 filesystem being mounted at /59/mnt supports timestamps until 2038 (0x7fffffff) [ 1493.540603][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1493.619803][T22661] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1493.675916][T22677] loop0: detected capacity change from 0 to 128 [ 1493.696867][T22677] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1493.709106][T22677] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1493.718614][T22677] ext4 filesystem being mounted at /52/mnt supports timestamps until 2038 (0x7fffffff) [ 1493.771193][T22352] EXT4-fs (loop2): unmounting filesystem. [ 1493.841693][T22682] device veth0_vlan left promiscuous mode [ 1493.847586][T22682] device veth0_vlan entered promiscuous mode [ 1493.854483][ T5640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1493.865228][ T5640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1493.872002][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1493.872760][ T5640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1495.978292][ T28] kauditd_printk_skb: 24 callbacks suppressed [ 1495.978312][ T28] audit: type=1326 audit(1725094976.546:5436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22687 comm="syz.3.4959" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1496.011101][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1496.048163][ T28] audit: type=1326 audit(1725094976.546:5437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22687 comm="syz.3.4959" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1496.100233][T22696] loop0: detected capacity change from 0 to 128 [ 1496.118242][T22696] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1496.141320][T22696] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1496.188034][T22696] ext4 filesystem being mounted at /53/mnt supports timestamps until 2038 (0x7fffffff) [ 1496.961497][ T28] audit: type=1326 audit(1725094976.576:5438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22687 comm="syz.3.4959" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1496.998921][T22706] loop4: detected capacity change from 0 to 128 [ 1497.007300][ T28] audit: type=1326 audit(1725094976.586:5439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22687 comm="syz.3.4959" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1497.034612][T22706] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1497.045757][ T28] audit: type=1326 audit(1725094976.586:5440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22687 comm="syz.3.4959" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1497.105618][ T28] audit: type=1326 audit(1725094976.666:5441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22687 comm="syz.3.4959" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1497.176659][T22706] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1497.188299][ T28] audit: type=1326 audit(1725094976.666:5442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22687 comm="syz.3.4959" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1497.220064][T22707] device veth0_vlan left promiscuous mode [ 1497.225963][T22707] device veth0_vlan entered promiscuous mode [ 1497.242545][ T28] audit: type=1326 audit(1725094976.666:5443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22687 comm="syz.3.4959" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1497.266291][ T28] audit: type=1326 audit(1725094976.686:5444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22687 comm="syz.3.4959" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1497.296442][ T28] audit: type=1326 audit(1725094976.686:5445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22687 comm="syz.3.4959" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f390b579eb9 code=0x7ffc0000 [ 1497.363039][T22706] ext4 filesystem being mounted at /28/mnt supports timestamps until 2038 (0x7fffffff) [ 1497.419601][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1497.428004][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1497.435416][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1498.485785][T22717] device veth0_vlan left promiscuous mode [ 1498.491997][T22717] device veth0_vlan entered promiscuous mode [ 1498.867690][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1498.980785][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1500.545790][T22735] device veth0_vlan left promiscuous mode [ 1500.551999][T22735] device veth0_vlan entered promiscuous mode [ 1500.951069][T22729] loop0: detected capacity change from 0 to 2048 [ 1501.026202][T22729] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1501.049225][T22745] loop4: detected capacity change from 0 to 2048 [ 1502.034775][T22755] loop1: detected capacity change from 0 to 128 [ 1502.063028][T22745] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1502.072556][T22755] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1502.091658][T22755] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1502.110766][T22755] ext4 filesystem being mounted at /6/mnt supports timestamps until 2038 (0x7fffffff) [ 1502.150648][T22764] loop3: detected capacity change from 0 to 128 [ 1502.172234][T22764] EXT4-fs (loop3): Test dummy encryption mode enabled [ 1502.180421][T22764] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1502.189297][T22764] ext4 filesystem being mounted at /62/mnt supports timestamps until 2038 (0x7fffffff) [ 1502.230333][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1503.170657][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1503.177197][T22469] EXT4-fs (loop1): unmounting filesystem. [ 1503.234398][T22779] loop1: detected capacity change from 0 to 2048 [ 1503.248095][T22779] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1503.264809][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1503.333961][T22469] EXT4-fs (loop1): unmounting filesystem. [ 1504.303173][T22790] device veth0_vlan left promiscuous mode [ 1504.314741][T22790] device veth0_vlan entered promiscuous mode [ 1504.402944][T22792] device veth0_vlan left promiscuous mode [ 1504.410440][T22792] device veth0_vlan entered promiscuous mode [ 1505.325812][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1505.334077][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1506.505996][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 1506.506077][ T28] audit: type=1326 audit(1725094986.876:5456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22799 comm="syz.0.4980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbda6779eb9 code=0x7ffc0000 [ 1506.810873][ T7118] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1506.830296][ T28] audit: type=1326 audit(1725094986.876:5457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22799 comm="syz.0.4980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbda6779eb9 code=0x7ffc0000 [ 1506.854202][ T28] audit: type=1326 audit(1725094987.146:5458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22799 comm="syz.0.4980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbda6779eb9 code=0x7ffc0000 [ 1506.877783][ T28] audit: type=1326 audit(1725094987.156:5459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22799 comm="syz.0.4980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbda6779eb9 code=0x7ffc0000 [ 1506.971284][ T28] audit: type=1326 audit(1725094987.156:5460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22799 comm="syz.0.4980" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbda6779eb9 code=0x7ffc0000 [ 1507.061387][ T28] audit: type=1326 audit(1725094987.326:5461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22805 comm="syz.2.4982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f97c9b79eb9 code=0x7ffc0000 [ 1507.161352][ T28] audit: type=1326 audit(1725094987.326:5462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22805 comm="syz.2.4982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f97c9b79eb9 code=0x7ffc0000 [ 1507.340858][ T28] audit: type=1326 audit(1725094987.326:5463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22805 comm="syz.2.4982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f97c9b79eb9 code=0x7ffc0000 [ 1507.368815][ T28] audit: type=1326 audit(1725094987.326:5464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22805 comm="syz.2.4982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f97c9b79eb9 code=0x7ffc0000 [ 1507.421243][ T28] audit: type=1326 audit(1725094987.326:5465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22805 comm="syz.2.4982" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f97c9b79eb9 code=0x7ffc0000 [ 1507.564343][T22833] device veth0_vlan left promiscuous mode [ 1507.598921][T22833] device veth0_vlan entered promiscuous mode [ 1507.638968][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1507.842323][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1507.849815][T13147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1508.145731][T22844] device veth0_vlan left promiscuous mode [ 1508.164445][T22844] device veth0_vlan entered promiscuous mode [ 1508.317703][T22848] loop4: detected capacity change from 0 to 2048 [ 1508.327462][T22842] device veth0_vlan left promiscuous mode [ 1508.343877][T22842] device veth0_vlan entered promiscuous mode [ 1508.393008][T22851] loop2: detected capacity change from 0 to 128 [ 1508.436014][T22851] EXT4-fs (loop2): Test dummy encryption mode enabled [ 1508.446309][T22848] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1508.494106][T22851] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1508.532896][T22851] ext4 filesystem being mounted at /22/mnt supports timestamps until 2038 (0x7fffffff) [ 1508.669484][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1509.318405][T22352] EXT4-fs (loop2): unmounting filesystem. [ 1509.340766][T22866] loop2: detected capacity change from 0 to 128 [ 1509.351044][T22866] EXT4-fs (loop2): Test dummy encryption mode enabled [ 1509.376377][T22866] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1509.415835][T22866] ext4 filesystem being mounted at /23/mnt supports timestamps until 2038 (0x7fffffff) [ 1510.966903][T22352] EXT4-fs (loop2): unmounting filesystem. [ 1510.988180][T22884] loop0: detected capacity change from 0 to 128 [ 1510.996640][T22883] loop3: detected capacity change from 0 to 128 [ 1511.027679][T22883] EXT4-fs (loop3): Test dummy encryption mode enabled [ 1511.034465][T22884] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1511.048674][T22886] loop2: detected capacity change from 0 to 1024 [ 1511.056940][T22886] JBD2: no valid journal superblock found [ 1511.062506][T22886] EXT4-fs (loop2): error loading journal [ 1511.075374][T22884] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1511.090528][T22884] ext4 filesystem being mounted at /59/mnt supports timestamps until 2038 (0x7fffffff) [ 1511.217508][T22883] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1511.236069][T22883] ext4 filesystem being mounted at /67/mnt supports timestamps until 2038 (0x7fffffff) [ 1512.595292][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1512.776750][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1512.809713][T22907] loop1: detected capacity change from 0 to 2048 [ 1512.813037][T22911] loop3: detected capacity change from 0 to 1024 [ 1512.823332][T22911] JBD2: no valid journal superblock found [ 1512.829340][T22911] EXT4-fs (loop3): error loading journal [ 1512.946839][T22907] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1513.526203][T22924] loop4: detected capacity change from 0 to 128 [ 1513.543405][T22924] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1513.551018][T22469] EXT4-fs (loop1): unmounting filesystem. [ 1513.558602][T22924] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1513.575571][T22924] ext4 filesystem being mounted at /36/mnt supports timestamps until 2038 (0x7fffffff) [ 1513.692270][T22930] loop1: detected capacity change from 0 to 128 [ 1513.703097][T22929] loop3: detected capacity change from 0 to 2048 [ 1513.806258][T22930] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1513.920687][T22930] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1513.946993][T22929] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1514.010663][T22930] ext4 filesystem being mounted at /12/mnt supports timestamps until 2038 (0x7fffffff) [ 1514.048921][T22933] device veth0_vlan left promiscuous mode [ 1514.058924][T22933] device veth0_vlan entered promiscuous mode [ 1514.074275][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1514.084561][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1514.100145][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1514.271387][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1514.517122][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1514.593349][T22948] loop0: detected capacity change from 0 to 128 [ 1514.637617][T22469] EXT4-fs (loop1): unmounting filesystem. [ 1514.653522][T22948] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1514.706180][T22948] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1514.715407][T22948] ext4 filesystem being mounted at /63/mnt supports timestamps until 2038 (0x7fffffff) [ 1515.321362][T22963] loop2: detected capacity change from 0 to 128 [ 1515.343192][T22963] EXT4-fs (loop2): Test dummy encryption mode enabled [ 1515.351402][T22963] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1515.455451][T22963] ext4 filesystem being mounted at /27/mnt supports timestamps until 2038 (0x7fffffff) [ 1516.172067][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1517.302501][T22352] EXT4-fs (loop2): unmounting filesystem. [ 1517.311704][T22981] loop0: detected capacity change from 0 to 128 [ 1517.382432][T22981] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1517.461490][T22981] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1517.478657][T22981] ext4 filesystem being mounted at /65/mnt supports timestamps until 2038 (0x7fffffff) [ 1518.867048][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1518.902384][T23004] loop0: detected capacity change from 0 to 128 [ 1518.940498][T23004] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1518.986720][T23004] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1519.015462][T23004] ext4 filesystem being mounted at /66/mnt supports timestamps until 2038 (0x7fffffff) [ 1519.547835][T23016] loop1: detected capacity change from 0 to 128 [ 1519.571054][T23016] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1519.592253][T23016] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1519.604033][T23016] ext4 filesystem being mounted at /15/mnt supports timestamps until 2038 (0x7fffffff) [ 1519.781663][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1520.088215][T23022] loop0: detected capacity change from 0 to 128 [ 1520.145882][T23022] EXT4-fs (loop0): Test dummy encryption mode enabled [ 1520.168279][T23022] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 1520.187292][T23022] ext4 filesystem being mounted at /67/mnt supports timestamps until 2038 (0x7fffffff) [ 1520.241530][T23026] loop3: detected capacity change from 0 to 1024 [ 1520.249682][T23026] JBD2: no valid journal superblock found [ 1520.255255][T23026] EXT4-fs (loop3): error loading journal [ 1520.663308][T22469] EXT4-fs (loop1): unmounting filesystem. [ 1521.908671][T21388] EXT4-fs (loop0): unmounting filesystem. [ 1521.983313][T23041] device veth0_vlan left promiscuous mode [ 1521.996052][T23041] device veth0_vlan entered promiscuous mode [ 1522.004025][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1522.039091][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1522.359943][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1522.402134][T23051] loop4: detected capacity change from 0 to 1024 [ 1522.414091][T23051] JBD2: no valid journal superblock found [ 1522.420263][T23051] EXT4-fs (loop4): error loading journal [ 1522.515780][ T6] usb 4-1: new high-speed USB device number 75 using dummy_hcd [ 1522.582757][T23053] device veth0_vlan left promiscuous mode [ 1522.589058][T23053] device veth0_vlan entered promiscuous mode [ 1523.008707][T23058] loop1: detected capacity change from 0 to 128 [ 1523.113265][T23058] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1523.156228][T23058] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1523.167896][T23058] ext4 filesystem being mounted at /18/mnt supports timestamps until 2038 (0x7fffffff) [ 1523.274497][T23067] loop4: detected capacity change from 0 to 128 [ 1523.296572][T23067] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1523.304522][T23067] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1523.935823][T23067] ext4 filesystem being mounted at /41/mnt supports timestamps until 2038 (0x7fffffff) [ 1524.196095][T22469] EXT4-fs (loop1): unmounting filesystem. [ 1524.233672][T23078] loop1: detected capacity change from 0 to 1024 [ 1524.241410][T23078] JBD2: no valid journal superblock found [ 1524.247010][T23078] EXT4-fs (loop1): error loading journal [ 1524.325860][ T6] usb 4-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1524.345815][ T6] usb 4-1: New USB device found, idVendor=046d, idProduct=08c1, bcdDevice=ee.8d [ 1524.360720][ T6] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1524.699585][ T6] usb 4-1: config 0 descriptor?? [ 1524.738369][ T324] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1524.748888][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1524.786927][ T6] usb 4-1: Found UVC 0.00 device (046d:08c1) [ 1524.795981][ T6] usb 4-1: No valid video chain found. [ 1524.858946][T23085] loop4: detected capacity change from 0 to 512 [ 1524.875071][T23085] EXT4-fs (loop4): 1 truncate cleaned up [ 1524.880914][T23085] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1525.119410][ T666] usb 4-1: USB disconnect, device number 75 [ 1525.781798][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1525.828027][T23092] loop1: detected capacity change from 0 to 128 [ 1525.843933][T23092] EXT4-fs (loop1): Test dummy encryption mode enabled [ 1525.852418][T23092] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1525.890587][T23102] loop4: detected capacity change from 0 to 1024 [ 1525.900856][T23102] JBD2: no valid journal superblock found [ 1525.906996][T23102] EXT4-fs (loop4): error loading journal [ 1525.921130][T23092] ext4 filesystem being mounted at /20/mnt supports timestamps until 2038 (0x7fffffff) [ 1527.535735][T23114] loop2: detected capacity change from 0 to 2048 [ 1527.547911][T23114] journal_path: Lookup failure for './file0' [ 1527.553899][T23114] EXT4-fs: error: could not find journal device path [ 1528.258524][T22469] EXT4-fs (loop1): unmounting filesystem. [ 1528.387395][T23125] FAULT_INJECTION: forcing a failure. [ 1528.387395][T23125] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1528.434515][T23125] CPU: 0 PID: 23125 Comm: syz.0.5046 Not tainted 6.1.93-syzkaller-00068-gb5e374dda921 #0 [ 1528.444166][T23125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1528.454059][T23125] Call Trace: [ 1528.457185][T23125] [ 1528.459959][T23125] dump_stack_lvl+0x151/0x1b7 [ 1528.464483][T23125] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1528.469770][T23125] ? __kasan_check_write+0x14/0x20 [ 1528.474719][T23125] dump_stack+0x15/0x1c [ 1528.478707][T23125] should_fail_ex+0x3d0/0x520 [ 1528.479858][T23131] loop2: detected capacity change from 0 to 128 [ 1528.483216][T23125] should_fail_alloc_page+0x68/0x90 [ 1528.483243][T23125] __alloc_pages+0x1f4/0x780 [ 1528.498766][T23125] ? __kasan_check_write+0x14/0x20 [ 1528.503743][T23125] ? prep_new_page+0x110/0x110 [ 1528.508309][T23125] __folio_alloc+0x15/0x40 [ 1528.512556][T23125] handle_mm_fault+0x1cf7/0x30e0 [ 1528.517336][T23125] ? numa_migrate_prep+0xe0/0xe0 [ 1528.522121][T23125] ? lock_vma_under_rcu+0x4aa/0x590 [ 1528.527234][T23125] ? debug_smp_processor_id+0x17/0x20 [ 1528.528299][T23131] EXT4-fs (loop2): Test dummy encryption mode enabled [ 1528.532430][T23125] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1528.532464][T23125] exc_page_fault+0x3b3/0x6d0 [ 1528.549450][T23125] asm_exc_page_fault+0x27/0x30 [ 1528.554132][T23125] RIP: 0033:0x7fbda66452eb [ 1528.558388][T23125] Code: 00 00 00 48 8d 3d 9d 28 19 00 48 89 c1 31 c0 e8 8b 5b ff ff eb d2 66 0f 1f 84 00 00 00 00 00 55 31 c0 53 48 81 ec 68 10 00 00 <48> 89 7c 24 08 48 8d 3d d1 28 19 00 48 89 34 24 48 8b 14 24 48 8b [ 1528.578095][T23125] RSP: 002b:00007fbda7551fb0 EFLAGS: 00010202 [ 1528.584075][T23125] RAX: 0000000000000000 RBX: 00007fbda6916130 RCX: 0000000000000000 [ 1528.591891][T23125] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 1528.599704][T23125] RBP: 00007fbda7553090 R08: 0000000000000000 R09: 0000000000000000 [ 1528.607510][T23125] R10: 0000000020000000 R11: 0000000000000000 R12: 0000000000000001 [ 1528.615331][T23125] R13: 0000000000000000 R14: 00007fbda6916130 R15: 00007fff9c6a15f8 [ 1528.623142][T23125] [ 1528.643518][T23125] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 1528.746230][T23131] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 1528.764060][T23131] ext4 filesystem being mounted at /35/mnt supports timestamps until 2038 (0x7fffffff) [ 1528.829275][T23139] tc_dump_action: action bad kind [ 1528.851777][T23139] random: crng reseeded on system resumption [ 1529.677110][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 1529.677130][ T28] audit: type=1400 audit(1725095009.716:5484): avc: denied { write } for pid=23133 comm="syz.4.5050" name="snapshot" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1529.754486][ T28] audit: type=1400 audit(1725095009.716:5485): avc: denied { open } for pid=23133 comm="syz.4.5050" path="/dev/snapshot" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1529.848134][T23146] loop4: detected capacity change from 0 to 128 [ 1530.015771][T23146] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1530.070676][T23146] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1530.080961][T22352] EXT4-fs (loop2): unmounting filesystem. [ 1530.086118][T23146] ext4 filesystem being mounted at /45/mnt supports timestamps until 2038 (0x7fffffff) [ 1530.151918][T23152] loop2: detected capacity change from 0 to 1024 [ 1530.159795][T23152] JBD2: no valid journal superblock found [ 1530.165346][T23152] EXT4-fs (loop2): error loading journal [ 1530.227362][T23150] loop3: detected capacity change from 0 to 2048 [ 1531.204708][T23150] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1531.433568][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1532.327991][T23174] loop2: detected capacity change from 0 to 256 [ 1532.342354][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1532.390247][ T324] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1532.406388][T23177] FAULT_INJECTION: forcing a failure. [ 1532.406388][T23177] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1532.420117][T23175] input: syz0 as /devices/virtual/input/input4 [ 1532.428027][T23177] CPU: 0 PID: 23177 Comm: syz.0.5060 Not tainted 6.1.93-syzkaller-00068-gb5e374dda921 #0 [ 1532.437670][T23177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1532.447569][T23177] Call Trace: [ 1532.450688][T23177] [ 1532.453474][T23177] dump_stack_lvl+0x151/0x1b7 [ 1532.457979][T23177] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1532.463277][T23177] ? do_vfs_ioctl+0xba7/0x29a0 [ 1532.467877][T23177] dump_stack+0x15/0x1c [ 1532.471867][T23177] should_fail_ex+0x3d0/0x520 [ 1532.476296][ T28] audit: type=1400 audit(1725095013.346:5486): avc: denied { read } for pid=23173 comm="syz.2.5058" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1532.476378][T23177] should_fail+0xb/0x10 [ 1532.502188][T23174] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 1532.502846][T23177] should_fail_usercopy+0x1a/0x20 [ 1532.523421][T23177] _copy_from_user+0x1e/0xc0 [ 1532.527848][T23177] evdev_ioctl_handler+0x3f6/0x2030 [ 1532.532883][T23177] ? evdev_fasync+0x60/0x60 [ 1532.537220][T23177] ? has_cap_mac_admin+0x3c0/0x3c0 [ 1532.542167][T23177] ? vfs_write+0xbb3/0xeb0 [ 1532.546425][T23177] ? selinux_file_ioctl+0x3cc/0x540 [ 1532.551455][T23177] ? __mutex_lock_slowpath+0x10/0x10 [ 1532.556578][T23177] evdev_ioctl+0x27/0x30 [ 1532.560651][T23177] ? evdev_poll+0x1f0/0x1f0 [ 1532.564992][T23177] __se_sys_ioctl+0x114/0x190 [ 1532.569505][T23177] __x64_sys_ioctl+0x7b/0x90 [ 1532.574289][T23177] x64_sys_call+0x98/0x9a0 [ 1532.578542][T23177] do_syscall_64+0x3b/0xb0 [ 1532.582792][T23177] ? clear_bhb_loop+0x55/0xb0 [ 1532.587311][T23177] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1532.593044][T23177] RIP: 0033:0x7fbda6779eb9 [ 1532.597290][T23177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1532.616732][T23177] RSP: 002b:00007fbda7595038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1532.624974][T23177] RAX: ffffffffffffffda RBX: 00007fbda6915f80 RCX: 00007fbda6779eb9 [ 1532.632785][T23177] RDX: 0000000000000000 RSI: 0000000080084504 RDI: 0000000000000003 [ 1532.640600][T23177] RBP: 00007fbda7595090 R08: 0000000000000000 R09: 0000000000000000 [ 1532.648410][T23177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1532.656222][T23177] R13: 0000000000000000 R14: 00007fbda6915f80 R15: 00007fff9c6a15f8 [ 1532.664040][T23177] [ 1532.681490][ T28] audit: type=1400 audit(1725095013.346:5487): avc: denied { open } for pid=23173 comm="syz.2.5058" path="/dev/kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1532.699550][T23181] loop3: detected capacity change from 0 to 2048 [ 1532.716514][ T28] audit: type=1400 audit(1725095013.366:5488): avc: denied { ioctl } for pid=23173 comm="syz.2.5058" path="/dev/kvm" dev="devtmpfs" ino=83 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1532.770364][T23190] loop1: detected capacity change from 0 to 512 [ 1532.781366][ T28] audit: type=1400 audit(1725095013.586:5489): avc: denied { setopt } for pid=23183 comm="syz.1.5062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1532.801546][T23181] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1532.885874][T23190] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 1532.932497][T23194] loop4: detected capacity change from 0 to 128 [ 1533.419062][T23194] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1533.449632][T23190] EXT4-fs (loop1): can't mount with data=, fs mounted w/o journal [ 1533.518000][ T28] audit: type=1400 audit(1725095014.376:5490): avc: denied { setopt } for pid=23178 comm="syz.3.5059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1533.566559][T23194] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1533.611227][T23194] ext4 filesystem being mounted at /47/mnt supports timestamps until 2038 (0x7fffffff) [ 1533.807553][ T28] audit: type=1400 audit(1725095014.386:5491): avc: denied { bind } for pid=23178 comm="syz.3.5059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1533.840166][T21313] EXT4-fs (loop3): unmounting filesystem. [ 1533.872285][T23190] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23190 comm=syz.1.5063 [ 1533.927927][ T28] audit: type=1400 audit(1725095014.796:5492): avc: denied { write } for pid=23200 comm="syz.0.5066" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1534.276947][T23201] kvm: emulating exchange as write [ 1534.297845][T23217] device veth0_vlan left promiscuous mode [ 1534.319486][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1534.382872][T23217] device veth0_vlan entered promiscuous mode [ 1534.386043][T23201] kvm: vcpu 1: requested lapic timer restore with starting count register 0x390=3343437945 (53495007120 ns) > initial count (52285443328 ns). Using initial count to start timer. [ 1534.406539][ T5640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1534.415922][T12882] usb 3-1: new high-speed USB device number 40 using dummy_hcd [ 1534.415947][ T5640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1534.512950][ T5640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1534.935764][T12882] usb 3-1: Using ep0 maxpacket: 16 [ 1534.948805][T23227] loop1: detected capacity change from 0 to 2048 [ 1534.968116][T23227] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1535.075950][T12882] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1535.430363][T12882] usb 3-1: config 0 has no interfaces? [ 1535.491077][T12882] usb 3-1: New USB device found, idVendor=1e7d, idProduct=2e22, bcdDevice= 0.00 [ 1535.494794][T23239] netlink: 40 bytes leftover after parsing attributes in process `syz.4.5072'. [ 1535.499980][T12882] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1535.517410][T12882] usb 3-1: config 0 descriptor?? [ 1535.526072][T23239] netlink: 116 bytes leftover after parsing attributes in process `syz.4.5072'. [ 1535.534947][T23239] device bridge_slave_1 left promiscuous mode [ 1535.543374][T22469] EXT4-fs (loop1): unmounting filesystem. [ 1535.555027][T23239] bridge0: port 2(bridge_slave_1) entered disabled state [ 1535.577223][T23239] device bridge_slave_0 left promiscuous mode [ 1535.587987][T23239] bridge0: port 1(bridge_slave_0) entered disabled state [ 1535.845846][ T28] audit: type=1400 audit(1725095016.696:5493): avc: denied { mounton } for pid=23246 comm="syz.1.5074" path="/27/file0" dev="tmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1535.869463][T23248] loop3: detected capacity change from 0 to 2048 [ 1535.898784][ T28] audit: type=1400 audit(1725095016.696:5494): avc: denied { ioctl } for pid=23246 comm="syz.1.5074" path="/dev/fuse" dev="devtmpfs" ino=93 ioctlcmd=0xe500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1535.926389][T23248] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: none. [ 1535.938099][T23259] loop2: detected capacity change from 0 to 256 [ 1535.958539][T23259] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 1535.970925][T23259] FAT-fs (loop2): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 1535.982581][ T28] audit: type=1400 audit(1725095016.846:5495): avc: denied { map } for pid=23247 comm="syz.3.5075" path="/79/file0/cpuacct.usage_sys" dev="loop3" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 1536.007199][T23260] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1102: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 1536.118376][T23259] loop2: detected capacity change from 0 to 256 [ 1536.248764][T23263] loop4: detected capacity change from 0 to 2048 [ 1536.267236][T23263] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1536.345622][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1536.368153][T23268] loop4: detected capacity change from 0 to 2048 [ 1536.377868][T23268] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1536.467145][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1536.486004][T23273] loop4: detected capacity change from 0 to 128 [ 1536.492883][T23273] EXT4-fs (loop4): Test dummy encryption mode enabled [ 1536.500779][T23273] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: none. [ 1536.509382][T23273] ext4 filesystem being mounted at /52/mnt supports timestamps until 2038 (0x7fffffff) [ 1536.582168][ T382] ------------[ cut here ]------------ [ 1536.587665][ T382] kernel BUG at fs/ext4/inode.c:2749! [ 1536.592930][ T382] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1536.598816][ T382] CPU: 0 PID: 382 Comm: kworker/u4:5 Not tainted 6.1.93-syzkaller-00068-gb5e374dda921 #0 [ 1536.608535][ T382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1536.618517][ T382] Workqueue: writeback wb_workfn (flush-7:3) [ 1536.624330][ T382] RIP: 0010:ext4_writepages+0x3fab/0x3fd0 [ 1536.629889][ T382] Code: 98 80 ff 31 ff 89 de e8 93 98 80 ff 45 84 f6 75 2a e8 f9 95 80 ff 49 bc 00 00 00 00 00 fc ff df e9 6e f6 ff ff e8 e5 95 80 ff <0f> 0b e8 de 95 80 ff e8 45 78 0b ff e9 46 c3 ff ff e8 cf 95 80 ff [ 1536.649329][ T382] RSP: 0018:ffffc9000dc97000 EFLAGS: 00010293 [ 1536.655231][ T382] RAX: ffffffff81f50f6b RBX: 0000008000000000 RCX: ffff88811240d100 [ 1536.663040][ T382] RDX: 0000000000000000 RSI: 0000008000000000 RDI: 0000000000000000 [ 1536.670851][ T382] RBP: ffffc9000dc97410 R08: ffffffff81f4d6cb R09: ffffed10275e789f [ 1536.678662][ T382] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88811b488000 [ 1536.686471][ T382] R13: ffff88813af3c630 R14: 000000c410000000 R15: ffffc9000dc972e0 [ 1536.694284][ T382] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1536.703052][ T382] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1536.709472][ T382] CR2: 00007f6b025ded58 CR3: 00000001290ac000 CR4: 00000000003506b0 [ 1536.717287][ T382] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1536.725095][ T382] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1536.733003][ T382] Call Trace: [ 1536.736119][ T382] [ 1536.738983][ T382] ? __die_body+0x62/0xb0 [ 1536.743148][ T382] ? die+0x88/0xb0 [ 1536.746710][ T382] ? do_trap+0x103/0x330 [ 1536.750786][ T382] ? ext4_writepages+0x3fab/0x3fd0 [ 1536.755736][ T382] ? handle_invalid_op+0x95/0xc0 [ 1536.760509][ T382] ? ext4_writepages+0x3fab/0x3fd0 [ 1536.765458][ T382] ? exc_invalid_op+0x32/0x50 [ 1536.769970][ T382] ? asm_exc_invalid_op+0x1b/0x20 [ 1536.774834][ T382] ? ext4_writepages+0x70b/0x3fd0 [ 1536.779689][ T382] ? ext4_writepages+0x3fab/0x3fd0 [ 1536.784663][ T382] ? ext4_writepages+0x3fab/0x3fd0 [ 1536.789691][ T382] ? sched_group_set_idle+0x710/0x710 [ 1536.794880][ T382] ? psi_task_change+0x1d3/0x360 [ 1536.799665][ T382] ? ext4_read_folio+0x240/0x240 [ 1536.804424][ T382] ? check_preempt_wakeup+0x7ca/0xb30 [ 1536.809658][ T382] ? cpudl_cleanup+0x40/0x40 [ 1536.814061][ T382] ? __kasan_check_write+0x14/0x20 [ 1536.819009][ T382] ? update_load_avg+0x513/0x1530 [ 1536.823881][ T382] ? ext4_read_folio+0x240/0x240 [ 1536.828651][ T382] do_writepages+0x385/0x620 [ 1536.833073][ T382] ? __writepage+0x130/0x130 [ 1536.837495][ T382] ? __kasan_check_write+0x14/0x20 [ 1536.842442][ T382] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1536.847739][ T382] ? _raw_spin_lock+0x1b0/0x1b0 [ 1536.852424][ T382] ? update_load_avg+0x513/0x1530 [ 1536.857288][ T382] ? __kasan_check_write+0x14/0x20 [ 1536.862239][ T382] __writeback_single_inode+0xdc/0xb80 [ 1536.867526][ T382] writeback_sb_inodes+0xb32/0x1910 [ 1536.872565][ T382] ? native_set_ldt+0x130/0x130 [ 1536.877249][ T382] ? _raw_spin_lock+0xa4/0x1b0 [ 1536.881913][ T382] ? queue_io+0x520/0x520 [ 1536.886099][ T382] ? __writeback_inodes_wb+0x3f0/0x3f0 [ 1536.891398][ T382] ? queue_io+0x3d0/0x520 [ 1536.895571][ T382] ? memset+0x35/0x40 [ 1536.899383][ T382] wb_writeback+0x3b9/0x9f0 [ 1536.903728][ T382] ? inode_cgwb_move_to_attached+0x3c0/0x3c0 [ 1536.909537][ T382] ? set_worker_desc+0x158/0x1c0 [ 1536.914313][ T382] ? __kasan_check_write+0x14/0x20 [ 1536.919256][ T382] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1536.924907][ T382] wb_workfn+0x399/0x1030 [ 1536.929072][ T382] ? inode_wait_for_writeback+0x280/0x280 [ 1536.934619][ T382] ? __this_cpu_preempt_check+0x13/0x20 [ 1536.940003][ T382] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 1536.946680][ T382] ? probe_sched_switch+0x60/0x80 [ 1536.951542][ T382] ? _raw_spin_unlock+0x4c/0x70 [ 1536.956314][ T382] ? finish_task_switch+0x167/0x7b0 [ 1536.961353][ T382] ? __kasan_check_read+0x11/0x20 [ 1536.966215][ T382] ? read_word_at_a_time+0x12/0x20 [ 1536.971154][ T382] ? strscpy+0x9c/0x260 [ 1536.975151][ T382] process_one_work+0x73d/0xcb0 [ 1536.979839][ T382] worker_thread+0xa60/0x1260 [ 1536.984355][ T382] kthread+0x26d/0x300 [ 1536.988253][ T382] ? worker_clr_flags+0x1a0/0x1a0 [ 1536.993117][ T382] ? kthread_blkcg+0xd0/0xd0 [ 1536.997542][ T382] ret_from_fork+0x1f/0x30 [ 1537.001808][ T382] [ 1537.004667][ T382] Modules linked in: [ 1537.194755][ T382] ---[ end trace 0000000000000000 ]--- [ 1537.294849][ T382] RIP: 0010:ext4_writepages+0x3fab/0x3fd0 SYZFAIL: failed to send rpc fd=3 want=23208 sent=0 n=-1 (errno 32: Broken pipe) [ 1537.407919][ T382] Code: 98 80 ff 31 ff 89 de e8 93 98 80 ff 45 84 f6 75 2a e8 f9 95 80 ff 49 bc 00 00 00 00 00 fc ff df e9 6e f6 ff ff e8 e5 95 80 ff <0f> 0b e8 de 95 80 ff e8 45 78 0b ff e9 46 c3 ff ff e8 cf 95 80 ff [ 1537.427573][ T382] RSP: 0018:ffffc9000dc97000 EFLAGS: 00010293 [ 1537.437488][ T382] RAX: ffffffff81f50f6b RBX: 0000008000000000 RCX: ffff88811240d100 [ 1537.454991][T23279] device veth0_vlan left promiscuous mode [ 1537.456373][ T382] RDX: 0000000000000000 RSI: 0000008000000000 RDI: 0000000000000000 [ 1537.460910][T23279] device veth0_vlan entered promiscuous mode [ 1537.468409][ T382] RBP: ffffc9000dc97410 R08: ffffffff81f4d6cb R09: ffffed10275e789f [ 1537.475990][ T5640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1537.484247][ T382] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88811b488000 [ 1537.490330][ T5640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1537.504570][T13147] usb 3-1: USB disconnect, device number 40 [ 1537.516260][T22032] EXT4-fs (loop4): unmounting filesystem. [ 1537.518902][ T382] R13: ffff88813af3c630 R14: 000000c410000000 R15: ffffc9000dc972e0 [ 1537.529976][ T382] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1537.538767][ T382] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1537.545263][ T382] CR2: 00005618838ef0c8 CR3: 000000010f9a7000 CR4: 00000000003506b0 [ 1537.553123][ T382] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1537.561491][ T382] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1537.566766][ T5640] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1537.569576][ T382] Kernel panic - not syncing: Fatal exception [ 1537.577087][ T382] Kernel Offset: disabled [ 1537.587117][ T382] Rebooting in 86400 seconds..