last executing test programs: 24.948785159s ago: executing program 3 (id=32): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001140)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340)=[@mss={0x2, 0x4099a234}, @timestamp], 0x2) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYRES64], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x4040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) io_uring_setup(0x4c0c, &(0x7f0000000140)={0x0, 0x2637, 0x3c00, 0x2, 0x10001d4}) 24.605401686s ago: executing program 3 (id=45): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='\v\x00\x00\x00\b\x00\x00\x00\f'], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x7, [@struct={0x9, 0x3, 0x0, 0x4, 0x0, 0x0, [{0x6, 0x1, 0xffff}, {0x9, 0x0, 0x1}, {0xb, 0x4, 0x7}]}, @typedef={0x8, 0x0, 0x0, 0x8, 0x3}]}, {0x0, [0x61, 0x5f, 0x30, 0x2e, 0x71]}}, &(0x7f00000002c0)=""/90, 0x5b, 0x5a, 0x0, 0xfffffff7, 0x10000}, 0x28) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)={0x34, r3, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 24.540029047s ago: executing program 3 (id=49): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x11, &(0x7f00000004c0)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6}, @ringbuf_query, @map_idx={0x18, 0xb, 0x5, 0x0, 0xa}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f00000003c0)='syzkaller\x00', 0x40b7, 0xf1, &(0x7f0000000580)=""/241, 0x41100, 0x50, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x0, 0x0, 0x89, 0x2}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000900)=[{0x0, 0x3, 0xc, 0xb}, {0x1, 0x5, 0x10, 0x8}, {0x4, 0x4, 0x9, 0xa}, {0x5, 0x4, 0x0, 0x1}, {0x4, 0x1, 0x3, 0x8}, {0x3, 0x2, 0x3, 0x6}, {0x3, 0x5, 0x6}, {0x0, 0x1, 0xb, 0x3}, {0x1, 0x5, 0x9, 0x830a7ced25f862d7}], 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000b00)='kmem_cache_free\x00', r2, 0x0, 0x1034}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000380)=[{0x200000000006, 0x1, 0x7, 0x7ffc1ffb}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c, 0x800) 24.479470059s ago: executing program 3 (id=53): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x40, 0x7ffc1ff8}]}) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) fchown(r1, 0x0, 0xee01) r2 = open_tree(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x89901) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f00000001c0)='./file0\x00', 0x800000, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1, 0x373, &(0x7f00000006c0)="$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") r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x8200, 0x1aa) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r3, 0x40047211, &(0x7f00000000c0)) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x110) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000240)={0x9bc9, {{0xa, 0x4e22, 0x850, @dev={0xfe, 0x80, '\x00', 0x15}, 0x8}}}, 0x88) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000004c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4c, &(0x7f00000005c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x1f, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x19, 0x5, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000780)='GPL\x00', 0x22, 0x5b, &(0x7f0000000900)=""/91, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x2, 0xe, 0x6, 0x1000}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x9, &(0x7f0000000a00)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff], &(0x7f0000000a40)=[{0x0, 0x1, 0x9, 0x6}, {0x3, 0x4, 0xc, 0xb}, {0x0, 0x4, 0x9, 0x6}, {0x3, 0x4, 0x2, 0x9}, {0x1, 0x3, 0xc, 0x1}, {0x3, 0x1, 0x0, 0x7}, {0x5, 0x2, 0xe, 0xb}, {0x5, 0x1, 0x4, 0x5}, {0x3, 0x3, 0x0, 0x8}], 0x10, 0x435d}, 0x94) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0xc0802, 0x0) ioctl$PPPIOCNEWUNIT(r6, 0xc004743e, &(0x7f00000000c0)) pwritev(r6, &(0x7f0000000180)=[{&(0x7f0000000380)="00214717a7", 0x5}], 0x1, 0xee, 0x1) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000d00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xbdb, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=@base={0x10, 0x6, 0x5, 0x9, 0x8, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x5, 0x17, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e59}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x998}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x7fff, 0x0, 0x0, 0x40f00, 0x2a, '\x00', 0x0, @fallback=0x12, r2, 0x8, &(0x7f00000001c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x8, 0x7, 0x1ff}, 0x10, r4, r5, 0x1, &(0x7f0000000bc0)=[r7, r8, r9], &(0x7f0000000e00)=[{0x3, 0x1, 0xd, 0x3}], 0x10, 0xfffff268}, 0x94) sendmsg$inet(r0, &(0x7f0000000680)={&(0x7f0000000140)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000180)='W', 0x1}], 0x1}, 0x0) r10 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="5c00000014006b03000000d86e6c1d00028400000000564500004e23e3f58e76110165f450e71b0075e3002500028d459e37000f0000000000bf9367b47e51f60a64c9f4d4938037e786a6d0bdd700"/92, 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x20008010) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0xc0, 0x1, 0x0, 0x0, 0x0, 0x10001, 0x40000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffff, 0x4, @perf_config_ext={0xa, 0x7}, 0x5100, 0x7, 0x3a25, 0x5, 0x0, 0x5, 0xfffb, 0x0, 0xfffffffe, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r11) 23.602611166s ago: executing program 3 (id=68): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0xa, 0x0}, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYRES8=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x400000001fb, 0x101301) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f0000000880)={[{@nomblk_io_submit}, {@debug}, {@errors_continue}, {@sysvgroups}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@resuid}, {@jqfmt_vfsv1}, {@acl}, {@jqfmt_vfsv1}]}, 0xfc, 0x587, &(0x7f0000002100)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) symlink(0x0, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 23.219447093s ago: executing program 3 (id=81): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0x100}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/cgroup.procs\x00', 0xe02, 0x1c0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r3, r2, 0x0, 0x3a) 23.193615734s ago: executing program 32 (id=81): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0x100}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/cgroup.procs\x00', 0xe02, 0x1c0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r3, r2, 0x0, 0x3a) 2.279061584s ago: executing program 1 (id=481): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000200)={@private0, 0x800, 0x0, 0x1, 0x1, 0x0, 0x4}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0x1, 0x23) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfffffffe, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3a, 0x1, 0x8, 0x0, 0x0, 0x5, 0x9284, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0x2}, 0x1320, 0x1, 0xf2, 0x8, 0x0, 0x800000, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], 0x0, 0x4e, 0x0, 0x1}, 0x28) socket$inet_tcp(0x2, 0x1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001140)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000340)=[@mss={0x2, 0x4099a234}, @timestamp], 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) io_uring_setup(0x4c0c, &(0x7f0000000140)={0x0, 0x2637, 0x3c00, 0x2, 0x10001d4}) 1.912919052s ago: executing program 2 (id=493): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="bc01000019000100fefffffffcdbdf25fc020000000000000000000000000000000000000000000000000000000000000000000300000000020000005e000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES16=r0], 0x1bc}}, 0xc000) 1.883384212s ago: executing program 2 (id=494): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000800000000100000028"], 0x50) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x1, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x20939, 0x6003}, [@IFLA_GROUP={0x8}, @IFLA_MTU={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x40801}, 0x4000000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000020700000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3, 0x0, 0x800000000000000}, 0x18) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000000)='./bus\x00', 0x2004, &(0x7f0000000440)={[], [{@permit_directio}]}, 0x5, 0x52c, &(0x7f0000000e40)="$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") r4 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1, 0x8, 0x0, 0x401}, 0xc) setsockopt$MRT6_FLUSH(r4, 0x29, 0xd4, &(0x7f0000000080)=0xc, 0x4) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x0) sendto$packet(r4, &(0x7f00000006c0)="3661a5bbc68a5ab8f328caf890ecc386aef09fb530730a186043d68f81343467bf6116b2dc4a64034e645fdc41fd84ff38968393c0e95e3c92f1ee554fbaff632205f3f441a78b5a8df8fa11ba0ca3ecb6b26786ed5b80be2679014d217512c282954bf85cb1c139b258b8401c", 0x6d, 0x0, &(0x7f0000000740)={0x11, 0x10, r5, 0x1, 0x2b, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x14) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0xe8, 0xad, 0x5, 0x81, 0x0, 0xcb, 0x4104, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x2, 0x4}, 0x400, 0x9, 0x2, 0x2, 0x0, 0xfffffffe, 0x7f, 0x0, 0x3, 0x0, 0x8}, 0xffffffffffffffff, 0xa, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000400)='*\\\x00') r8 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r8, 0x8946, &(0x7f0000000040)={'geneve0\x00', &(0x7f0000000180)=@ethtool_drvinfo={0x3, "3b296e12d542bdfb7cec880a02de9e1d73000000000100", "aa0188a189c56a4293348f5a3995fa1e7569d23b7d5500", "31cb053e0c8f3e81062f62e0f874b078cef598cf374e31fb58665661e850abd6", "fd300200000000000000a8f4c100", "78a85ce08babb5877c9ab49084d318f3ce181dd78515c054b784f51f55030e7f", "510f13cf0000000000010001", 0xfffffffd, 0x3ffffff, 0x120000, 0x1, 0x3c}}) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000880)=ANY=[@ANYBLOB="140000001000010000000000000000000300000a2c000000060a010400000000000000000a70480a0900010073797a31000000000900020073797a320000000020000000000a01080000000000000000050000010900010073797a3100000000140000001100010000000000000000000200000a"], 0x74}, 0x1, 0x0, 0x0, 0x4008091}, 0x24000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{}, 0x0, &(0x7f0000000580)='%pS \x00'}, 0x20) socket(0x2, 0x80805, 0x0) 1.625364757s ago: executing program 0 (id=501): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) clock_gettime(0x5, &(0x7f0000000000)) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) 1.572539178s ago: executing program 2 (id=502): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = socket$pppl2tp(0x18, 0x1, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x16, 0x4, &(0x7f0000000000)=ANY=[@ANYRES64=r0], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @loopback}, 0x2, 0x4}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r3, 0x8004745a, &(0x7f0000005280)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x20000000000002b8, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x8000, 0x0, 0x0, 0x41000}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x404c080) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x24, 0x6, 0x4, 0x22b, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x50) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000001140)=@newsa={0x1a0, 0x10, 0x1, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x6c}, {@in, 0x0, 0x32}, @in=@dev={0xac, 0x14, 0x14, 0x35}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {0xfffffffffffffffd, 0x0, 0x8000000, 0x200}, {0xfffffffc, 0x0, 0x2}, 0x0, 0x400000, 0xa, 0x0, 0x0, 0xcd}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x0, 0x0, 0x0, 0x70bd2a, 0x70bd28}}, @algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0x18}}]}, 0x1a0}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x0, 0x0) accept$unix(r6, 0x0, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@deltfilter={0x24, 0x2d, 0x200, 0x70bd26, 0x25dfd9fc, {0x0, 0x0, 0x0, 0x0, {0x0, 0x10}, {0x4, 0xe}, {0xf, 0x7}}}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x14000001) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b0000000000001247db449b0372c7d0182e000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRESHEX=r4, @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r7}, 0x10) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r9}, 0x10) dup(r8) 1.450802131s ago: executing program 0 (id=503): r0 = socket$can_raw(0x1d, 0x3, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f00000002c0)=0x0) timer_create(0x1, 0x0, &(0x7f0000000000)=0x0) timer_settime(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}}, 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0)={[0xfffffeffffffffff]}, 0x0, 0x8) timer_settime(r3, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x77359400}}, 0x0) r4 = openat$selinux_policy(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000480)={'sit0\x00', &(0x7f0000000400)={'syztnl2\x00', 0x0, 0x20, 0x8, 0x3, 0x81, {{0x10, 0x4, 0x2, 0x9, 0x40, 0x64, 0x0, 0x5, 0x4, 0x0, @broadcast, @rand_addr=0x64010102, {[@ra={0x94, 0x4}, @rr={0x7, 0x27, 0xf1, [@rand_addr=0x64010101, @local, @rand_addr=0x64010101, @remote, @rand_addr=0x64010100, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @private=0xa010101]}]}}}}}) acct(&(0x7f00000001c0)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xd, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x18) acct(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r4, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[], 0x190da) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0xf00) 1.416064811s ago: executing program 1 (id=504): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$selinux_access(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="7379737465835f753a6f626a6563745f723a6c645f736f5f7420704a122f7362696e2f6468636c69656e7420"], 0x41) 1.314248104s ago: executing program 1 (id=505): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f00000002c0)=0x0) timer_create(0x1, 0x0, &(0x7f0000000000)=0x0) timer_settime(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_settime(r2, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}}, 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0)={[0xfffffeffffffffff]}, 0x0, 0x8) timer_settime(r3, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x77359400}}, 0x0) r4 = openat$selinux_policy(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000480)={'sit0\x00', &(0x7f0000000400)={'syztnl2\x00', 0x0, 0x20, 0x8, 0x3, 0x81, {{0x10, 0x4, 0x2, 0x9, 0x40, 0x64, 0x0, 0x5, 0x4, 0x0, @broadcast, @rand_addr=0x64010102, {[@ra={0x94, 0x4}, @rr={0x7, 0x27, 0xf1, [@rand_addr=0x64010101, @local, @rand_addr=0x64010101, @remote, @rand_addr=0x64010100, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @private=0xa010101]}]}}}}}) acct(&(0x7f00000001c0)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xd, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x18) acct(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r4, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[], 0x190da) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, 0x0, 0xf00) 1.160103167s ago: executing program 1 (id=506): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000001c0)={0x8, 0x9, 0x585a, 0x1, 0x4, "5ebb6ac8481e521d5cab242af5ae8c8832bb61"}) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0xfffffff9, 0x7fff, 0x16, "0062ba7d82000000000000000000f7ffffff00"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x1, 0x0, 0x97, 0x8, 0x2, "db028fe402000800052300b101000000e20367"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000140)=0x8d) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xf, 0x6, 0x7ffc1ffb}]}) r2 = socket(0x10, 0x3, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000680)={{r4, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000640)='%pI4 \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x1, 0x7ffc0002}]}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000380), 0x200000, &(0x7f0000000a00)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_L}, {@cache_readahead}, {@cache_fscache}, {@loose}, {@posixacl}, {@access_uid}, {@noxattr}], [{@uid_eq}, {@fowner_gt={'fowner>', 0xee01}}, {@subj_role={'subj_role', 0x3d, ':'}}, {@fowner_eq}, {@smackfsroot={'smackfsroot', 0x3d, '%\t.}#\'#'}}]}}) munlockall() r7 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) r8 = fsmount(r7, 0x0, 0x6) symlinkat(&(0x7f0000000400)='./file0/../file0\x00', r8, &(0x7f0000000540)='./file0\x00') readlinkat(r8, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000880)=""/182, 0xb6) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000005200010a"], 0x26}}, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x13, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="18020000fcffffff0000a4b68cdf000000000000850004004100000085000000d0"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) 1.152024846s ago: executing program 0 (id=508): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)={0x34, r2, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 1.105871407s ago: executing program 0 (id=509): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8f7ffffb702000008000000b703000000000000a5000000eeffffff95"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) syz_pidfd_open(0x0, 0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e22, @multicast1}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, &(0x7f0000003bc0)=[{0x0}, {&(0x7f0000003a00)=""/190, 0xbe}], 0x2}, 0x80000001}], 0x1, 0x40000121, 0x0) connect$inet(r2, &(0x7f0000000200)={0x2, 0x4e22, @local}, 0x10) sendmmsg$inet(r2, &(0x7f0000000900)=[{{0x0, 0x0, 0x0}}], 0x40000cf, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x4) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4, 0x0, 0x100}, 0x18) close(r3) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/cgroup.procs\x00', 0xe02, 0x1c0) sendfile(0xffffffffffffffff, r5, 0x0, 0x3a) 899.829901ms ago: executing program 0 (id=511): syz_open_dev$tty20(0xc, 0x4, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000340)={0x0, 'bond0\x00', {0x1}, 0x6}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='sys_enter\x00', r1}, 0x18) socket$packet(0x11, 0x2, 0x300) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0x800, &(0x7f0000001c00)={[{@test_dummy_encryption_v1}, {@data_writeback}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x6}}, {@resgid}, {@bsdgroups}, {@block_validity}, {@abort}, {@grpjquota}]}, 0x1, 0x476, &(0x7f0000000540)="$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") 814.686134ms ago: executing program 4 (id=513): syz_open_dev$tty20(0xc, 0x4, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000340)={0x0, 'bond0\x00', {0x1}, 0x6}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='sys_enter\x00', r1}, 0x18) socket$packet(0x11, 0x2, 0x300) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0x800, &(0x7f0000001c00)={[{@test_dummy_encryption_v1}, {@data_writeback}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x6}}, {@resgid}, {@bsdgroups}, {@block_validity}, {@abort}, {@grpjquota}]}, 0x1, 0x476, &(0x7f0000000540)="$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") 745.011855ms ago: executing program 5 (id=514): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="bc01000019000100fefffffffcdbdf25fc020000000000000000000000000000000000000000000000000000000000000000000300000000020000005e000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES16=r2], 0x1bc}}, 0xc000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1, 0x0, 0x1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x5458, &(0x7f0000000500)={0x0, 0x0, 0x20000, 0x1, 0x10004000}, &(0x7f0000000340)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000440)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, 0x0, &(0x7f00000002c0)=@IORING_OP_SHUTDOWN={0x22, 0x3f, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x1}) io_uring_enter(r3, 0x3516, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000000), 0x8) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r6}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000480)='gtp\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x7]}, 0x8, 0x800) 741.264825ms ago: executing program 0 (id=515): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000200)={@private0, 0x800, 0x0, 0x1, 0x1, 0x0, 0x4}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0x1, 0x23) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xfffffffe, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3a, 0x1, 0x8, 0x0, 0x0, 0x5, 0x9284, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0x2}, 0x1320, 0x1, 0xf2, 0x8, 0x0, 0x800000, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x12) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], 0x0, 0x4e, 0x0, 0x1}, 0x28) socket$inet_tcp(0x2, 0x1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001140)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYRES64=r1], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x4040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) io_uring_setup(0x4c0c, &(0x7f0000000140)={0x0, 0x2637, 0x3c00, 0x2, 0x10001d4}) 728.656485ms ago: executing program 4 (id=516): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="bc01000019000100fefffffffcdbdf25fc020000000000000000000000000000000000000000000000000000000000000000000300000000020000005e000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES16=r2], 0x1bc}}, 0xc000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1, 0x0, 0x1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x5458, &(0x7f0000000500)={0x0, 0x0, 0x20000, 0x1, 0x10004000}, &(0x7f0000000340)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000440)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, 0x0, &(0x7f00000002c0)=@IORING_OP_SHUTDOWN={0x22, 0x3f, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x1}) io_uring_enter(r3, 0x3516, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000000), 0x8) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r6}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000480)='gtp\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x6, 0x7ffc1ffb}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x7]}, 0x8, 0x800) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) 617.867347ms ago: executing program 2 (id=517): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r8 = socket$kcm(0x2, 0xa, 0x2) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r4) r10 = socket(0xa, 0x5, 0x0) r11 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r11, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020073797a30000000000800410073697700140033006c6f0000ffffffff"], 0xffaf}, 0x1, 0x0, 0x0, 0x854}, 0x0) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r10, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r11, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40d10401}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x1c, r12, 0x8, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r13}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x40080) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="1fbca8a1", @ANYRES16=r9, @ANYBLOB="00022bbd7000fbdbdf256500000008000300", @ANYRES32=r13, @ANYBLOB="100003800c0000800800030061000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x44010) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @broadcast}) writev(r7, &(0x7f00000003c0)=[{&(0x7f0000000080)="2e9b020007e03dd65193dfb6c575963f86dd6067", 0x14}, {&(0x7f00000002c0)="b7f1dd0f0400dee69c3679904c9187295ca4266748ada3b383d7c2bc344b", 0x1e}, {&(0x7f00000001c0)="0590909c0000000045eb421fe47490e54229aedb500c5dece67d477b", 0x1c}], 0x3) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}, 0x1, 0xfffc}, 0x4000800) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000003080)=@delchain={0x48, 0x64, 0xf31, 0xfffffffb, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xfff3, 0xffff}, {0x0, 0x1b}}, [@filter_kind_options=@f_flower={{0xb}, {0x18, 0x2, [@TCA_FLOWER_INDEV={0x14, 0x2, 'bridge_slave_0\x00'}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=@delchain={0x24, 0x11, 0x1, 0x1f, 0x0, {0x0, 0x0, 0x0, r6}}, 0x24}}, 0x0) 581.634438ms ago: executing program 5 (id=518): r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f00000002c0)=0x0) timer_create(0x1, 0x0, &(0x7f0000000000)=0x0) timer_settime(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_settime(r3, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}}, 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0)={[0xfffffeffffffffff]}, 0x0, 0x8) timer_settime(r4, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x77359400}}, 0x0) r5 = openat$selinux_policy(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000480)={'sit0\x00', &(0x7f0000000400)={'syztnl2\x00', 0x0, 0x20, 0x8, 0x3, 0x81, {{0x10, 0x4, 0x2, 0x9, 0x40, 0x64, 0x0, 0x5, 0x4, 0x0, @broadcast, @rand_addr=0x64010102, {[@ra={0x94, 0x4}, @rr={0x7, 0x27, 0xf1, [@rand_addr=0x64010101, @local, @rand_addr=0x64010101, @remote, @rand_addr=0x64010100, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @private=0xa010101]}]}}}}}) acct(&(0x7f00000001c0)='./file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xd, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x18) acct(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r5, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[], 0x190da) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0xf00) 500.60354ms ago: executing program 4 (id=519): fsopen(&(0x7f00000005c0)='ncpfs\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r0}, 0x18) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x4400, &(0x7f0000000100)=ANY=[], 0xf4, 0xa2c, &(0x7f0000001f80)="$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") bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3, 0xfd, 0x3, 0x200}}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) (fail_nth: 3) 196.429095ms ago: executing program 5 (id=520): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)={0x34, r2, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 168.084796ms ago: executing program 1 (id=521): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8f7ffffb702000008000000b703000000000000a5000000eeffffff95"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) syz_pidfd_open(0x0, 0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e22, @multicast1}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, &(0x7f0000003bc0)=[{0x0}, {&(0x7f0000003a00)=""/190, 0xbe}], 0x2}, 0x80000001}], 0x1, 0x40000121, 0x0) connect$inet(r2, &(0x7f0000000200)={0x2, 0x4e22, @local}, 0x10) sendmmsg$inet(r2, &(0x7f0000000900)=[{{0x0, 0x0, 0x0}}], 0x40000cf, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x4) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$packet(0x11, 0x3, 0x300) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4, 0x0, 0x100}, 0x18) close(r3) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/cgroup.procs\x00', 0xe02, 0x1c0) sendfile(0xffffffffffffffff, r5, 0x0, 0x3a) 167.654726ms ago: executing program 4 (id=522): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) clock_gettime(0x5, &(0x7f0000000000)) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) 138.085956ms ago: executing program 5 (id=523): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="05000000690000004300000001"], 0x50) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7}, 0x18) bpf$BPF_GET_PROG_INFO(0x4, &(0x7f0000000140)={r0, 0xe0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x8, 0x0, 0x0}}, 0x10) 115.840537ms ago: executing program 1 (id=524): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x52e, &(0x7f0000000640)="$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") r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/power/resume_offset', 0x242, 0x2bd) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000006c0)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) r3 = socket(0x2a, 0x2, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x24}}, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0500000004000000080000000c"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000002, 0x11012, 0xffffffffffffffff, 0x108000) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x1, r7}, 0x38) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000006c0)=@newtfilter={0x88, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0xfffa}, {}, {0x1c, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0x58, 0x2, [@TCA_FLOWER_ACT={0x54, 0x3, [@m_connmark={0x50, 0x1, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffff8, 0xfff, 0x0, 0x200, 0xa}, 0x3}}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}]}]}}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000004}, 0x24000000) r8 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r8, &(0x7f00000002c0), 0x40000000000009f, 0x0) 111.901737ms ago: executing program 4 (id=525): syz_open_dev$tty20(0xc, 0x4, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000340)={0x0, 'bond0\x00', {0x1}, 0x6}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='sys_enter\x00', r1}, 0x18) socket$packet(0x11, 0x2, 0x300) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0x800, &(0x7f0000001c00)={[{@test_dummy_encryption_v1}, {@data_writeback}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x6}}, {@resgid}, {@bsdgroups}, {@block_validity}, {@abort}, {@grpjquota}]}, 0x1, 0x476, &(0x7f0000000540)="$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") 110.097657ms ago: executing program 2 (id=535): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8f7ffffb702000008000000b703000000000000a5000000eeffffff95"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) syz_pidfd_open(0x0, 0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e22, @multicast1}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003e40)=[{{0x0, 0x0, &(0x7f0000003bc0)=[{0x0}, {&(0x7f0000003a00)=""/190, 0xbe}], 0x2}, 0x80000001}], 0x1, 0x40000121, 0x0) connect$inet(r2, &(0x7f0000000200)={0x2, 0x4e22, @local}, 0x10) sendmmsg$inet(r2, &(0x7f0000000900)=[{{0x0, 0x0, 0x0}}], 0x40000cf, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x4) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3, 0x0, 0x100}, 0x18) close(0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/cgroup.procs\x00', 0xe02, 0x1c0) sendfile(0xffffffffffffffff, r4, 0x0, 0x3a) 57.191018ms ago: executing program 5 (id=526): syz_open_dev$tty20(0xc, 0x4, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000340)={0x0, 'bond0\x00', {0x1}, 0x6}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='sys_enter\x00', r1}, 0x18) socket$packet(0x11, 0x2, 0x300) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0x800, &(0x7f0000001c00)={[{@test_dummy_encryption_v1}, {@data_writeback}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x6}}, {@resgid}, {@bsdgroups}, {@block_validity}, {@abort}, {@grpjquota}]}, 0x1, 0x476, &(0x7f0000000540)="$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") 53.236698ms ago: executing program 2 (id=527): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="bc01000019000100fefffffffcdbdf25fc020000000000000000000000000000000000000000000000000000000000000000000300000000020000005e000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES16=r2], 0x1bc}}, 0xc000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1, 0x0, 0x1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x5458, &(0x7f0000000500)={0x0, 0x0, 0x20000, 0x1, 0x10004000}, &(0x7f0000000340)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000440)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, 0x0, &(0x7f00000002c0)=@IORING_OP_SHUTDOWN={0x22, 0x3f, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x1}) io_uring_enter(r3, 0x3516, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000000), 0x8) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r6}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000480)='gtp\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x6, 0x7ffc1ffb}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x7]}, 0x8, 0x800) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) socket$igmp6(0xa, 0x3, 0x2) 18.015999ms ago: executing program 4 (id=528): r0 = socket$inet_sctp(0x2, 0x5, 0x84) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8001}]}, 0x24}, 0x1, 0x0, 0x0, 0x2004c854}, 0x0) (async) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8001}]}, 0x24}, 0x1, 0x0, 0x0, 0x2004c854}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x16, &(0x7f0000000180)=@raw=[@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x1}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xfffeffff}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @exit], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0xc, 0x8001, 0x9}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000340)=[{0x5, 0x5, 0x5}, {0x3, 0x1, 0x1, 0x2}, {0x1, 0x1, 0x3}, {0x3, 0x4, 0x9, 0x4}, {0x0, 0x3, 0x1, 0x1}, {0x4, 0x5, 0xb, 0x7}], 0x10, 0x3}, 0x94) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x16, &(0x7f0000000180)=@raw=[@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x1}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xfffeffff}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @exit], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0xc, 0x8001, 0x9}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000340)=[{0x5, 0x5, 0x5}, {0x3, 0x1, 0x1, 0x2}, {0x1, 0x1, 0x3}, {0x3, 0x4, 0x9, 0x4}, {0x0, 0x3, 0x1, 0x1}, {0x4, 0x5, 0xb, 0x7}], 0x10, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000140)='objagg_obj_root_create\x00', r3, 0x0, 0xa4}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x480100, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000500)={'vlan1\x00', 0xc400}) (async) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000500)={'vlan1\x00', 0xc400}) futex(&(0x7f0000000540)=0x1, 0x1, 0x2, &(0x7f0000000580)={0x77359400}, &(0x7f00000005c0), 0x2) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000600), 0x70040, 0x0) pidfd_send_signal(r5, 0x29, &(0x7f0000000640)={0x22, 0x1000, 0x7}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000006c0)) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000740)={0x3, &(0x7f0000000700)=[{0xfeff, 0x3, 0xf9, 0x400}, {0x3, 0x6, 0x2, 0xaf}, {0x0, 0x6, 0x3, 0xd8a}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000007c0)={0x8, &(0x7f0000000780)=[{0xffff, 0xbd, 0x2, 0x10001}, {0x625, 0x9, 0x1, 0x100}, {0x800, 0x2, 0x2, 0x3}, {0x5, 0x5, 0x1, 0x1}, {0x80, 0x4, 0xf9, 0x3}, {0x1f1, 0x5, 0x2, 0x6}, {0x154, 0x6, 0x80, 0x6}, {0x5cdc, 0x6, 0x6, 0x9}]}) (async) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000007c0)={0x8, &(0x7f0000000780)=[{0xffff, 0xbd, 0x2, 0x10001}, {0x625, 0x9, 0x1, 0x100}, {0x800, 0x2, 0x2, 0x3}, {0x5, 0x5, 0x1, 0x1}, {0x80, 0x4, 0xf9, 0x3}, {0x1f1, 0x5, 0x2, 0x6}, {0x154, 0x6, 0x80, 0x6}, {0x5cdc, 0x6, 0x6, 0x9}]}) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000800), &(0x7f0000000840)=0x4) syz_open_dev$tty20(0xc, 0x4, 0x1) (async) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSIG(r7, 0x40045436, 0x31) ioctl$KDSETMODE(r7, 0x4b3a, 0x0) (async) ioctl$KDSETMODE(r7, 0x4b3a, 0x0) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r8, 0x11b, 0x2, &(0x7f0000000880)=0x3, 0x4) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000900), r1) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f00000009c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x24, r9, 0x200, 0x70bd2a, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0xc, 0x3a}}}}, [@NL80211_ATTR_PRIVACY={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x4045) syncfs(r8) socket$inet6_sctp(0xa, 0x5, 0x84) (async) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000a00)={@private1, 0x0, 0x2, 0x2, 0x5, 0x9, 0xff}, 0x20) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r4, 0xf503, 0x0) r11 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000a40), 0x200082) write$sndseq(r11, &(0x7f0000000a80)=[{0x8, 0xf, 0x3, 0x6, @time={0x2, 0x43a00}, {0x3, 0x1}, {0x2, 0x20}, @time=@time={0xa8, 0x5}}], 0x1c) (async) write$sndseq(r11, &(0x7f0000000a80)=[{0x8, 0xf, 0x3, 0x6, @time={0x2, 0x43a00}, {0x3, 0x1}, {0x2, 0x20}, @time=@time={0xa8, 0x5}}], 0x1c) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f0000000ac0)={{0x1, 0x1, 0x18, r0, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r12, &(0x7f0000000c00)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x58, 0x140a, 0x400, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x4}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x20}, 0x4000014) 0s ago: executing program 5 (id=529): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) (fail_nth: 6) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.151' (ED25519) to the list of known hosts. [ 35.714881][ T29] audit: type=1400 audit(1758997327.567:62): avc: denied { mounton } for pid=3289 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 35.716157][ T3289] cgroup: Unknown subsys name 'net' [ 35.738079][ T29] audit: type=1400 audit(1758997327.567:63): avc: denied { mount } for pid=3289 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 35.766391][ T29] audit: type=1400 audit(1758997327.597:64): avc: denied { unmount } for pid=3289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 35.903571][ T3289] cgroup: Unknown subsys name 'cpuset' [ 35.911206][ T3289] cgroup: Unknown subsys name 'rlimit' [ 36.081494][ T29] audit: type=1400 audit(1758997327.927:65): avc: denied { setattr } for pid=3289 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 36.107879][ T29] audit: type=1400 audit(1758997327.937:66): avc: denied { create } for pid=3289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.129361][ T29] audit: type=1400 audit(1758997327.937:67): avc: denied { write } for pid=3289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.150953][ T29] audit: type=1400 audit(1758997327.937:68): avc: denied { read } for pid=3289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.160978][ T3292] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 36.176405][ T29] audit: type=1400 audit(1758997327.937:69): avc: denied { mounton } for pid=3289 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 36.211422][ T29] audit: type=1400 audit(1758997327.937:70): avc: denied { mount } for pid=3289 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 36.232532][ T3289] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 36.235686][ T29] audit: type=1400 audit(1758997328.047:71): avc: denied { relabelto } for pid=3292 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 38.321520][ T3300] chnl_net:caif_netlink_parms(): no params data found [ 38.331181][ T3299] chnl_net:caif_netlink_parms(): no params data found [ 38.415863][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 38.436348][ T3303] chnl_net:caif_netlink_parms(): no params data found [ 38.472094][ T3300] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.479741][ T3300] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.488302][ T3300] bridge_slave_0: entered allmulticast mode [ 38.495064][ T3300] bridge_slave_0: entered promiscuous mode [ 38.505034][ T3305] chnl_net:caif_netlink_parms(): no params data found [ 38.520799][ T3299] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.528438][ T3299] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.536360][ T3299] bridge_slave_0: entered allmulticast mode [ 38.543366][ T3299] bridge_slave_0: entered promiscuous mode [ 38.557386][ T3300] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.564792][ T3300] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.572146][ T3300] bridge_slave_1: entered allmulticast mode [ 38.579234][ T3300] bridge_slave_1: entered promiscuous mode [ 38.593747][ T3299] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.601328][ T3299] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.608913][ T3299] bridge_slave_1: entered allmulticast mode [ 38.615607][ T3299] bridge_slave_1: entered promiscuous mode [ 38.663728][ T3299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.679406][ T3300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.690136][ T3300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.714086][ T3299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.723321][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.730517][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.738094][ T3306] bridge_slave_0: entered allmulticast mode [ 38.744815][ T3306] bridge_slave_0: entered promiscuous mode [ 38.774619][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.781976][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.790205][ T3306] bridge_slave_1: entered allmulticast mode [ 38.796624][ T3306] bridge_slave_1: entered promiscuous mode [ 38.803041][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.810234][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.817535][ T3303] bridge_slave_0: entered allmulticast mode [ 38.824052][ T3303] bridge_slave_0: entered promiscuous mode [ 38.831510][ T3300] team0: Port device team_slave_0 added [ 38.838620][ T3300] team0: Port device team_slave_1 added [ 38.871095][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.878474][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.885925][ T3303] bridge_slave_1: entered allmulticast mode [ 38.893239][ T3303] bridge_slave_1: entered promiscuous mode [ 38.904901][ T3305] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.912232][ T3305] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.919661][ T3305] bridge_slave_0: entered allmulticast mode [ 38.926541][ T3305] bridge_slave_0: entered promiscuous mode [ 38.934210][ T3299] team0: Port device team_slave_0 added [ 38.941338][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.961741][ T3305] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.969069][ T3305] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.976336][ T3305] bridge_slave_1: entered allmulticast mode [ 38.983043][ T3305] bridge_slave_1: entered promiscuous mode [ 38.990023][ T3299] team0: Port device team_slave_1 added [ 38.996914][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.012691][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.020330][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.047346][ T3300] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.075827][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.085544][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.092700][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.120132][ T3300] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.147227][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.161187][ T3305] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.171006][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.178169][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.204379][ T3299] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.216212][ T3306] team0: Port device team_slave_0 added [ 39.222305][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.229613][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.259837][ T3299] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.283460][ T3305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.298836][ T3306] team0: Port device team_slave_1 added [ 39.319354][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.326668][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.353436][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.365117][ T3303] team0: Port device team_slave_0 added [ 39.371451][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.378499][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.405315][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.421780][ T3305] team0: Port device team_slave_0 added [ 39.429184][ T3305] team0: Port device team_slave_1 added [ 39.452012][ T3303] team0: Port device team_slave_1 added [ 39.483951][ T3300] hsr_slave_0: entered promiscuous mode [ 39.490149][ T3300] hsr_slave_1: entered promiscuous mode [ 39.502529][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.509688][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.536214][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.547804][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.554906][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.582995][ T3305] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.595473][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.602830][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.629325][ T3305] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.646271][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.653322][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.679895][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.707084][ T3299] hsr_slave_0: entered promiscuous mode [ 39.714087][ T3299] hsr_slave_1: entered promiscuous mode [ 39.720301][ T3299] debugfs: 'hsr0' already exists in 'hsr' [ 39.726509][ T3299] Cannot create hsr debugfs directory [ 39.753590][ T3306] hsr_slave_0: entered promiscuous mode [ 39.759788][ T3306] hsr_slave_1: entered promiscuous mode [ 39.765918][ T3306] debugfs: 'hsr0' already exists in 'hsr' [ 39.771701][ T3306] Cannot create hsr debugfs directory [ 39.803744][ T3305] hsr_slave_0: entered promiscuous mode [ 39.810041][ T3305] hsr_slave_1: entered promiscuous mode [ 39.815968][ T3305] debugfs: 'hsr0' already exists in 'hsr' [ 39.821934][ T3305] Cannot create hsr debugfs directory [ 39.848514][ T3303] hsr_slave_0: entered promiscuous mode [ 39.854916][ T3303] hsr_slave_1: entered promiscuous mode [ 39.861047][ T3303] debugfs: 'hsr0' already exists in 'hsr' [ 39.866841][ T3303] Cannot create hsr debugfs directory [ 40.052931][ T3300] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 40.064511][ T3300] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 40.073620][ T3300] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 40.085075][ T3300] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 40.109979][ T3306] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 40.119453][ T3306] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 40.133840][ T3306] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 40.145920][ T3306] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 40.165775][ T3305] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 40.175455][ T3305] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 40.191325][ T3305] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 40.201992][ T3305] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 40.236577][ T3303] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 40.253351][ T3303] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 40.263582][ T3303] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 40.276972][ T3303] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 40.309039][ T3300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.335555][ T3300] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.345831][ T3299] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 40.358936][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.366083][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.382379][ T3299] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 40.391409][ T3299] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 40.400387][ T3299] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 40.425745][ T393] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.433117][ T393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.465208][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.479954][ T3305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.491109][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.509725][ T393] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.516985][ T393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.533502][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.544493][ T393] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.551819][ T393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.578008][ T3305] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.596646][ T1679] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.604831][ T1679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.619982][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.630014][ T3306] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.647900][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.655304][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.670962][ T3299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.683400][ T393] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.691488][ T393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.710724][ T393] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.718878][ T393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.735977][ T3299] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.751121][ T3303] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 40.762021][ T3303] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.793707][ T1679] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.801490][ T1679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.819654][ T1679] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.827823][ T1679] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.856698][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.879991][ T3299] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 40.891388][ T3299] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.918495][ T3300] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.941490][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.040615][ T3299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.071909][ T3305] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.099398][ T3306] veth0_vlan: entered promiscuous mode [ 41.128966][ T3306] veth1_vlan: entered promiscuous mode [ 41.159831][ T3303] veth0_vlan: entered promiscuous mode [ 41.171473][ T3300] veth0_vlan: entered promiscuous mode [ 41.190347][ T3303] veth1_vlan: entered promiscuous mode [ 41.199519][ T3300] veth1_vlan: entered promiscuous mode [ 41.224938][ T3300] veth0_macvtap: entered promiscuous mode [ 41.238625][ T3300] veth1_macvtap: entered promiscuous mode [ 41.249479][ T3303] veth0_macvtap: entered promiscuous mode [ 41.270673][ T3303] veth1_macvtap: entered promiscuous mode [ 41.281067][ T3306] veth0_macvtap: entered promiscuous mode [ 41.307361][ T3305] veth0_vlan: entered promiscuous mode [ 41.315799][ T3306] veth1_macvtap: entered promiscuous mode [ 41.324196][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.338442][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.347923][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.361248][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.370907][ T3305] veth1_vlan: entered promiscuous mode [ 41.382245][ T123] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.395988][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.406624][ T393] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.423442][ T393] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.440764][ T393] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.453271][ T3305] veth0_macvtap: entered promiscuous mode [ 41.460854][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.479381][ T3299] veth0_vlan: entered promiscuous mode [ 41.485500][ T393] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.494501][ T393] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.504811][ T393] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.520909][ T393] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.530593][ T3305] veth1_macvtap: entered promiscuous mode [ 41.541181][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 41.541196][ T29] audit: type=1400 audit(1758997333.387:81): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/root/syzkaller.6MZUTi/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 41.573145][ T29] audit: type=1400 audit(1758997333.387:82): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 41.595856][ T29] audit: type=1400 audit(1758997333.387:83): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/root/syzkaller.Gf4PP1/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 41.621663][ T29] audit: type=1400 audit(1758997333.387:84): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 41.643661][ T29] audit: type=1400 audit(1758997333.387:85): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/root/syzkaller.Gf4PP1/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 41.671026][ T29] audit: type=1400 audit(1758997333.387:86): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/root/syzkaller.Gf4PP1/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4308 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 41.699109][ T29] audit: type=1400 audit(1758997333.387:87): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 41.722055][ T3299] veth1_vlan: entered promiscuous mode [ 41.722307][ T29] audit: type=1400 audit(1758997333.427:88): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 41.744285][ T393] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.752460][ T29] audit: type=1400 audit(1758997333.427:89): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="gadgetfs" ino=4317 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 41.766928][ T393] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.799459][ T3303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 41.800100][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.837436][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.845227][ T393] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.856526][ T393] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.876465][ T3299] veth0_macvtap: entered promiscuous mode [ 41.884264][ T29] audit: type=1400 audit(1758997333.727:90): avc: denied { read write } for pid=3300 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 41.933052][ T393] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.964228][ T3299] veth1_macvtap: entered promiscuous mode [ 41.995147][ T393] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.011755][ T393] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.039797][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.065126][ T393] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.086860][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.133449][ T393] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.155079][ T3386] Process accounting resumed [ 42.195003][ T393] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.204973][ T393] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.230839][ T3483] SELinux: failed to load policy [ 42.236896][ T393] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.682118][ T3503] SELinux: failed to load policy [ 42.736261][ T3514] serio: Serial port ptm0 [ 43.083129][ T23] Process accounting resumed [ 43.090094][ T3518] SELinux: policydb magic number 0x1 does not match expected magic number 0xf97cff8c [ 43.146330][ T3518] SELinux: failed to load policy [ 43.161520][ T23] Process accounting resumed [ 43.206806][ T3520] SELinux: policydb magic number 0x1 does not match expected magic number 0xf97cff8c [ 43.245521][ T3520] SELinux: failed to load policy [ 43.427899][ T3535] 9pnet_virtio: no channels available for device 127.0.0.1 [ 44.462859][ T3386] Process accounting resumed [ 44.541485][ T3546] serio: Serial port ptm0 [ 44.546920][ T3545] serio: Serial port ptm1 [ 44.601619][ T3548] SELinux: failed to load policy [ 44.698909][ C0] vcan0: j1939_tp_rxtimer: 0xffff88811ac84c00: rx timeout, send abort [ 44.707478][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff88811ac84c00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 44.752141][ T3411] Process accounting resumed [ 44.796201][ T3562] SELinux: failed to load policy [ 44.891662][ T3573] netlink: 8 bytes leftover after parsing attributes in process `syz.1.34'. [ 45.251820][ T23] Process accounting resumed [ 45.278800][ T3612] loop3: detected capacity change from 0 to 512 [ 45.294203][ T3612] FAT-fs (loop3): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 45.300361][ T3606] SELinux: failed to load policy [ 45.317182][ T3386] Process accounting resumed [ 45.322815][ T3619] SELinux: policydb magic number 0x1 does not match expected magic number 0xf97cff8c [ 45.332862][ T3619] SELinux: failed to load policy [ 45.360391][ T3612] FAT-fs (loop3): error, invalid access to FAT (entry 0x0fffff00) [ 45.377097][ T3612] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start 22000003) [ 45.462026][ T3628] syz.0.60 (3628) used greatest stack depth: 10816 bytes left [ 45.486981][ T3629] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start 22000003) [ 45.565945][ T3402] Process accounting resumed [ 45.589502][ T3637] SELinux: failed to load policy [ 45.604475][ T3402] Process accounting resumed [ 45.609705][ T3640] SELinux: policydb magic number 0x1 does not match expected magic number 0xf97cff8c [ 45.619633][ T3640] SELinux: failed to load policy [ 45.678330][ T3642] serio: Serial port ptm0 [ 45.902411][ T1036] Process accounting resumed [ 46.096395][ T3306] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start 22000003) [ 46.120321][ T3306] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start 22000003) [ 46.287905][ T3656] syz.4.72 (3656) used greatest stack depth: 10768 bytes left [ 46.402383][ T9] Process accounting resumed [ 46.407785][ T3670] SELinux: policydb magic number 0x1 does not match expected magic number 0xf97cff8c [ 46.453710][ T3677] netlink: 52 bytes leftover after parsing attributes in process `syz.1.80'. [ 46.463606][ T3678] serio: Serial port ptm0 [ 46.487991][ T3427] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 46.546077][ T3427] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 46.566436][ T29] kauditd_printk_skb: 187 callbacks suppressed [ 46.566455][ T29] audit: type=1400 audit(1758997338.417:278): avc: denied { read } for pid=3689 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 46.594367][ T29] audit: type=1400 audit(1758997338.417:279): avc: denied { open } for pid=3689 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 46.651838][ T29] audit: type=1400 audit(1758997338.417:280): avc: denied { mounton } for pid=3689 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 46.680526][ T3427] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 46.719705][ T9] Process accounting resumed [ 46.819912][ T3427] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 46.887429][ T3709] loop1: detected capacity change from 0 to 1024 [ 46.896610][ T3709] EXT4-fs: Ignoring removed nomblk_io_submit option [ 46.917010][ T3709] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=a842c018, mo2=0002] [ 46.941479][ T3427] bridge_slave_1: left allmulticast mode [ 46.942805][ T3709] System zones: 0-1 [ 46.947200][ T3427] bridge_slave_1: left promiscuous mode [ 46.947206][ T3709] , 3-12 [ 46.947353][ T3427] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.951038][ T3709] [ 46.957141][ T3709] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 46.982724][ T3427] bridge_slave_0: left allmulticast mode [ 46.988478][ T3427] bridge_slave_0: left promiscuous mode [ 46.994514][ T3427] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.996174][ T29] audit: type=1400 audit(1758997338.837:281): avc: denied { mount } for pid=3708 comm="syz.1.92" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 47.025669][ T29] audit: type=1400 audit(1758997338.877:282): avc: denied { unmount } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 47.047899][ T3300] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 47.146610][ T3427] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 47.158143][ T3427] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 47.168251][ T3427] bond0 (unregistering): Released all slaves [ 47.204696][ T29] audit: type=1400 audit(1758997339.057:283): avc: denied { read } for pid=3028 comm="dhcpcd" name="n25" dev="tmpfs" ino=878 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 47.227194][ T29] audit: type=1400 audit(1758997339.057:284): avc: denied { open } for pid=3028 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=878 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 47.250213][ T29] audit: type=1400 audit(1758997339.057:285): avc: denied { getattr } for pid=3028 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=878 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 47.307989][ T3395] Process accounting resumed [ 47.353948][ T3427] hsr_slave_0: left promiscuous mode [ 47.361654][ T3719] sel_write_load: 5 callbacks suppressed [ 47.361674][ T3719] SELinux: failed to load policy [ 47.399010][ T3427] hsr_slave_1: left promiscuous mode [ 47.408571][ T3427] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 47.416441][ T3427] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 47.424184][ T29] audit: type=1400 audit(1758997339.207:286): avc: denied { search } for pid=3723 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 47.446935][ T29] audit: type=1400 audit(1758997339.237:287): avc: denied { read open } for pid=3731 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 47.476494][ T3427] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 47.484592][ T3427] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 47.517922][ T3427] veth1_macvtap: left promiscuous mode [ 47.523931][ T3427] veth0_macvtap: left promiscuous mode [ 47.543977][ T3427] veth1_vlan: left promiscuous mode [ 47.549583][ T3427] veth0_vlan: left promiscuous mode [ 47.728295][ T3748] serio: Serial port ptm0 [ 47.856598][ T3427] team0 (unregistering): Port device team_slave_1 removed [ 47.870699][ T3427] team0 (unregistering): Port device team_slave_0 removed [ 47.967814][ T3689] chnl_net:caif_netlink_parms(): no params data found [ 48.118327][ T3753] SELinux: policydb magic number 0x1 does not match expected magic number 0xf97cff8c [ 48.128387][ T3753] SELinux: failed to load policy [ 48.131638][ T10] Process accounting resumed [ 48.189062][ T3752] SELinux: failed to load policy [ 48.203054][ T3689] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.210273][ T3689] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.319072][ T3778] loop0: detected capacity change from 0 to 512 [ 48.334713][ T3778] EXT4-fs: test_dummy_encryption option not supported [ 48.346671][ T3689] bridge_slave_0: entered allmulticast mode [ 48.366743][ T3689] bridge_slave_0: entered promiscuous mode [ 48.378193][ T3689] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.385638][ T3689] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.395187][ T3689] bridge_slave_1: entered allmulticast mode [ 48.403012][ T3689] bridge_slave_1: entered promiscuous mode [ 48.468310][ T3689] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 48.480526][ T3689] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 48.613462][ T3689] team0: Port device team_slave_0 added [ 48.620567][ T3689] team0: Port device team_slave_1 added [ 48.677941][ T3802] SELinux: failed to load policy [ 48.698292][ T3689] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 48.705680][ T3689] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 48.733044][ T3689] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 48.756351][ T3689] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 48.763472][ T3689] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 48.789641][ T3689] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 48.814048][ T3816] serio: Serial port ptm0 [ 48.867614][ T3689] hsr_slave_0: entered promiscuous mode [ 48.887536][ T3689] hsr_slave_1: entered promiscuous mode [ 48.909289][ T3689] debugfs: 'hsr0' already exists in 'hsr' [ 48.915390][ T3689] Cannot create hsr debugfs directory [ 49.179687][ T3689] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 49.221952][ T3689] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 49.250534][ T3689] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 49.266055][ T3689] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 49.368185][ T3861] SELinux: failed to load policy [ 49.378061][ T3689] 8021q: adding VLAN 0 to HW filter on device bond0 [ 49.408022][ T3689] 8021q: adding VLAN 0 to HW filter on device team0 [ 49.444585][ T3427] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.452168][ T3427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 49.472381][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.479963][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 49.680797][ T3689] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 50.015057][ T3947] netlink: 8 bytes leftover after parsing attributes in process `syz.2.142'. [ 50.042409][ T3689] veth0_vlan: entered promiscuous mode [ 50.067369][ T3689] veth1_vlan: entered promiscuous mode [ 50.095266][ T3689] veth0_macvtap: entered promiscuous mode [ 50.136556][ T3689] veth1_macvtap: entered promiscuous mode [ 50.182576][ T3689] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 50.232520][ T3689] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 50.280263][ T12] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.329386][ T12] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.360786][ T12] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.388468][ T12] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.417808][ T3974] SELinux: failed to load policy [ 50.660679][ T9] Process accounting resumed [ 50.696446][ T3991] SELinux: failed to load policy [ 50.735021][ T3995] serio: Serial port ptm0 [ 50.811649][ T3997] serio: Serial port ptm1 [ 51.295870][ T4011] 9pnet_virtio: no channels available for device 127.0.0.1 [ 51.465876][ T4016] loop2: detected capacity change from 0 to 512 [ 51.473776][ T4016] EXT4-fs: test_dummy_encryption option not supported [ 51.904446][ T4037] loop0: detected capacity change from 0 to 512 [ 51.911030][ T4037] EXT4-fs: test_dummy_encryption option not supported [ 52.019847][ T4048] loop4: detected capacity change from 0 to 512 [ 52.027141][ T4048] EXT4-fs: test_dummy_encryption option not supported [ 52.050548][ T4045] SELinux: failed to load policy [ 52.146769][ T1036] Process accounting resumed [ 52.173704][ T4055] SELinux: failed to load policy [ 52.225864][ T1036] Process accounting resumed [ 52.243507][ T4058] SELinux: failed to load policy [ 52.263106][ T4060] serio: Serial port ptm0 [ 52.405307][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 52.405324][ T29] audit: type=1326 audit(1758997344.237:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4066 comm="syz.2.191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ac1feeec9 code=0x7ffc0000 [ 52.435799][ T29] audit: type=1326 audit(1758997344.237:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4066 comm="syz.2.191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=288 compat=0 ip=0x7f7ac1feeec9 code=0x7ffc0000 [ 52.459656][ T29] audit: type=1326 audit(1758997344.237:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4066 comm="syz.2.191" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ac1feeec9 code=0x7ffc0000 [ 52.533804][ T4074] loop1: detected capacity change from 0 to 512 [ 52.540496][ T4074] EXT4-fs: test_dummy_encryption option not supported [ 52.576130][ C0] vcan0: j1939_tp_rxtimer: 0xffff8881197a2400: rx timeout, send abort [ 52.588177][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff8881197a2400: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 52.671679][ T4080] sel_write_load: 1 callbacks suppressed [ 52.671700][ T4080] SELinux: failed to load policy [ 52.776921][ T1036] Process accounting resumed [ 52.801982][ T4093] loop4: detected capacity change from 0 to 1024 [ 52.820629][ T4090] loop5: detected capacity change from 0 to 1024 [ 52.822397][ T4088] SELinux: failed to load policy [ 52.834088][ T4093] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 52.845242][ T4093] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 52.860134][ T4093] JBD2: no valid journal superblock found [ 52.866414][ T4093] EXT4-fs (loop4): Could not load journal inode [ 52.895778][ T4090] EXT4-fs: Ignoring removed bh option [ 52.901484][ T4090] EXT4-fs: inline encryption not supported [ 52.968548][ T4090] EXT4-fs (loop5): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 52.979409][ T4096] FAULT_INJECTION: forcing a failure. [ 52.979409][ T4096] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 52.993128][ T4096] CPU: 1 UID: 0 PID: 4096 Comm: syz.2.203 Not tainted syzkaller #0 PREEMPT(voluntary) [ 52.993162][ T4096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 52.993177][ T4096] Call Trace: [ 52.993184][ T4096] [ 52.993194][ T4096] __dump_stack+0x1d/0x30 [ 52.993228][ T4096] dump_stack_lvl+0xe8/0x140 [ 52.993247][ T4096] dump_stack+0x15/0x1b [ 52.993263][ T4096] should_fail_ex+0x265/0x280 [ 52.993294][ T4096] should_fail+0xb/0x20 [ 52.993329][ T4096] should_fail_usercopy+0x1a/0x20 [ 52.993423][ T4096] strncpy_from_user+0x25/0x230 [ 52.993462][ T4096] ? __kmalloc_cache_noprof+0x189/0x320 [ 52.993579][ T4096] __se_sys_memfd_create+0x1ff/0x590 [ 52.993609][ T4096] __x64_sys_memfd_create+0x31/0x40 [ 52.993638][ T4096] x64_sys_call+0x2abe/0x2ff0 [ 52.993664][ T4096] do_syscall_64+0xd2/0x200 [ 52.993749][ T4096] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 52.993774][ T4096] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 52.993811][ T4096] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 52.993883][ T4096] RIP: 0033:0x7f7ac1feeec9 [ 52.993903][ T4096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.993927][ T4096] RSP: 002b:00007f7ac0a4ee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 52.993972][ T4096] RAX: ffffffffffffffda RBX: 00000000000005ad RCX: 00007f7ac1feeec9 [ 52.993985][ T4096] RDX: 00007f7ac0a4eef0 RSI: 0000000000000000 RDI: 00007f7ac2072960 [ 52.993998][ T4096] RBP: 0000200000000180 R08: 00007f7ac0a4ebb7 R09: 00007f7ac0a4ee40 [ 52.994011][ T4096] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000040 [ 52.994023][ T4096] R13: 00007f7ac0a4eef0 R14: 00007f7ac0a4eeb0 R15: 0000200000000940 [ 52.994048][ T4096] [ 52.997566][ T29] audit: type=1400 audit(1758997344.847:313): avc: denied { bind } for pid=4097 comm="syz.1.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 53.119956][ T4103] loop4: detected capacity change from 0 to 512 [ 53.127479][ T29] audit: type=1400 audit(1758997344.847:314): avc: denied { write } for pid=4097 comm="syz.1.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 53.199860][ T4103] EXT4-fs: test_dummy_encryption option not supported [ 53.254218][ T4107] loop2: detected capacity change from 0 to 512 [ 53.262336][ T4090] EXT4-fs error (device loop5): ext4_map_blocks:778: inode #3: block 2: comm syz.5.201: lblock 2 mapped to illegal pblock 2 (length 1) [ 53.292986][ T4107] EXT4-fs: test_dummy_encryption option not supported [ 53.301810][ T4090] Quota error (device loop5): qtree_write_dquot: dquota write failed [ 53.311874][ T4090] EXT4-fs error (device loop5): ext4_map_blocks:778: inode #3: block 48: comm syz.5.201: lblock 0 mapped to illegal pblock 48 (length 1) [ 53.358505][ T4090] Quota error (device loop5): v2_write_file_info: Can't write info structure [ 53.367665][ T4090] EXT4-fs error (device loop5): ext4_acquire_dquot:6937: comm syz.5.201: Failed to acquire dquot type 0 [ 53.382171][ T29] audit: type=1400 audit(1758997345.237:315): avc: denied { setopt } for pid=4114 comm="syz.2.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 53.408021][ T29] audit: type=1400 audit(1758997345.237:316): avc: denied { listen } for pid=4114 comm="syz.2.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 53.428241][ T29] audit: type=1400 audit(1758997345.237:317): avc: denied { create } for pid=4114 comm="syz.2.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 53.471690][ T4090] EXT4-fs error (device loop5) in ext4_reserve_inode_write:6334: Corrupt filesystem [ 53.483337][ T4090] EXT4-fs error (device loop5): ext4_evict_inode:254: inode #11: comm syz.5.201: mark_inode_dirty error [ 53.507551][ T4117] SELinux: failed to load policy [ 53.513691][ T4090] EXT4-fs warning (device loop5): ext4_evict_inode:257: couldn't mark inode dirty (err -117) [ 53.527061][ T4121] loop1: detected capacity change from 0 to 512 [ 53.533941][ T4121] EXT4-fs: test_dummy_encryption option not supported [ 53.545603][ T4090] EXT4-fs (loop5): 1 orphan inode deleted [ 53.558961][ T4090] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 53.573673][ T3427] EXT4-fs error (device loop5): ext4_map_blocks:778: inode #3: block 1: comm kworker/u8:7: lblock 1 mapped to illegal pblock 1 (length 1) [ 53.598472][ T4115] bond1: entered promiscuous mode [ 53.603689][ T4115] bond1: entered allmulticast mode [ 53.642772][ T3427] EXT4-fs error (device loop5): ext4_release_dquot:6973: comm kworker/u8:7: Failed to release dquot type 0 [ 53.652869][ T4115] 8021q: adding VLAN 0 to HW filter on device bond1 [ 53.667413][ T4090] EXT4-fs error (device loop5): ext4_map_blocks:778: inode #2: block 16: comm syz.5.201: lblock 0 mapped to illegal pblock 16 (length 1) [ 53.693174][ T4115] bond1 (unregistering): Released all slaves [ 53.715298][ T4090] netlink: 'syz.5.201': attribute type 1 has an invalid length. [ 53.724430][ T4090] netlink: 224 bytes leftover after parsing attributes in process `syz.5.201'. [ 53.766397][ T4132] FAULT_INJECTION: forcing a failure. [ 53.766397][ T4132] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 53.780374][ T4132] CPU: 0 UID: 0 PID: 4132 Comm: syz.0.218 Not tainted syzkaller #0 PREEMPT(voluntary) [ 53.780483][ T4132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 53.780500][ T4132] Call Trace: [ 53.780588][ T4132] [ 53.780598][ T4132] __dump_stack+0x1d/0x30 [ 53.780625][ T4132] dump_stack_lvl+0xe8/0x140 [ 53.780651][ T4132] dump_stack+0x15/0x1b [ 53.780711][ T4132] should_fail_ex+0x265/0x280 [ 53.780743][ T4132] should_fail+0xb/0x20 [ 53.780770][ T4132] should_fail_usercopy+0x1a/0x20 [ 53.780841][ T4132] _copy_to_user+0x20/0xa0 [ 53.780877][ T4132] simple_read_from_buffer+0xb5/0x130 [ 53.780902][ T4132] proc_fail_nth_read+0x10e/0x150 [ 53.780973][ T4132] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 53.781030][ T4132] vfs_read+0x1a5/0x770 [ 53.781053][ T4132] ? __rcu_read_unlock+0x4f/0x70 [ 53.781082][ T4132] ? __fget_files+0x184/0x1c0 [ 53.781148][ T4132] ksys_read+0xda/0x1a0 [ 53.781230][ T4132] __x64_sys_read+0x40/0x50 [ 53.781254][ T4132] x64_sys_call+0x27bc/0x2ff0 [ 53.781279][ T4132] do_syscall_64+0xd2/0x200 [ 53.781392][ T4132] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 53.781418][ T4132] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 53.781485][ T4132] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 53.781509][ T4132] RIP: 0033:0x7f0d5838d8dc [ 53.781525][ T4132] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 53.781544][ T4132] RSP: 002b:00007f0d56def030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 53.781564][ T4132] RAX: ffffffffffffffda RBX: 00007f0d585e5fa0 RCX: 00007f0d5838d8dc [ 53.781620][ T4132] RDX: 000000000000000f RSI: 00007f0d56def0a0 RDI: 0000000000000004 [ 53.781633][ T4132] RBP: 00007f0d56def090 R08: 0000000000000000 R09: 0000000000000000 [ 53.781646][ T4132] R10: 0000000000000140 R11: 0000000000000246 R12: 0000000000000001 [ 53.781658][ T4132] R13: 00007f0d585e6038 R14: 00007f0d585e5fa0 R15: 00007fff7192c1a8 [ 53.781679][ T4132] [ 53.994909][ T4137] EXT4-fs error (device loop5): ext4_map_blocks:778: inode #2: block 16: comm syz.5.201: lblock 0 mapped to illegal pblock 16 (length 1) [ 54.016772][ T4136] Driver unsupported XDP return value 0 on prog (id 146) dev N/A, expect packet loss! [ 54.035557][ T4136] vhci_hcd: invalid port number 96 [ 54.041026][ T4136] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 54.102252][ T4143] loop4: detected capacity change from 0 to 512 [ 54.109197][ T4143] EXT4-fs: test_dummy_encryption option not supported [ 54.496716][ T3689] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 54.514395][ T3689] EXT4-fs error (device loop5): __ext4_get_inode_loc:4861: comm syz-executor: Invalid inode table block 1 in block_group 0 [ 54.534651][ T3689] EXT4-fs error (device loop5) in ext4_reserve_inode_write:6334: Corrupt filesystem [ 54.536667][ T4149] SELinux: failed to load policy [ 54.548473][ T3689] EXT4-fs error (device loop5): ext4_quota_off:7221: inode #3: comm syz-executor: mark_inode_dirty error [ 54.568810][ T4161] FAULT_INJECTION: forcing a failure. [ 54.568810][ T4161] name failslab, interval 1, probability 0, space 0, times 1 [ 54.581632][ T4161] CPU: 0 UID: 0 PID: 4161 Comm: syz.0.231 Not tainted syzkaller #0 PREEMPT(voluntary) [ 54.581693][ T4161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 54.581709][ T4161] Call Trace: [ 54.581718][ T4161] [ 54.581728][ T4161] __dump_stack+0x1d/0x30 [ 54.581755][ T4161] dump_stack_lvl+0xe8/0x140 [ 54.581780][ T4161] dump_stack+0x15/0x1b [ 54.581802][ T4161] should_fail_ex+0x265/0x280 [ 54.581832][ T4161] should_failslab+0x8c/0xb0 [ 54.581901][ T4161] kmem_cache_alloc_noprof+0x50/0x310 [ 54.581939][ T4161] ? getname_flags+0x80/0x3b0 [ 54.581972][ T4161] getname_flags+0x80/0x3b0 [ 54.582014][ T4161] user_path_at+0x28/0x130 [ 54.582068][ T4161] __se_sys_mount_setattr+0x136/0x240 [ 54.582109][ T4161] __x64_sys_mount_setattr+0x67/0x80 [ 54.582139][ T4161] x64_sys_call+0x19ab/0x2ff0 [ 54.582164][ T4161] do_syscall_64+0xd2/0x200 [ 54.582221][ T4161] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 54.582247][ T4161] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 54.582279][ T4161] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 54.582307][ T4161] RIP: 0033:0x7f0d5838eec9 [ 54.582327][ T4161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.582424][ T4161] RSP: 002b:00007f0d56def038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ba [ 54.582449][ T4161] RAX: ffffffffffffffda RBX: 00007f0d585e5fa0 RCX: 00007f0d5838eec9 [ 54.582466][ T4161] RDX: 0000000000009800 RSI: 0000200000000180 RDI: ffffffffffffff9c [ 54.582549][ T4161] RBP: 00007f0d56def090 R08: 0000000000000020 R09: 0000000000000000 [ 54.582561][ T4161] R10: 0000200000001dc0 R11: 0000000000000246 R12: 0000000000000001 [ 54.582635][ T4161] R13: 00007f0d585e6038 R14: 00007f0d585e5fa0 R15: 00007fff7192c1a8 [ 54.582660][ T4161] [ 54.844417][ T4169] serio: Serial port ptm0 [ 55.055817][ T4183] loop4: detected capacity change from 0 to 512 [ 55.081418][ T4183] EXT4-fs: test_dummy_encryption option not supported [ 55.107170][ T4188] loop5: detected capacity change from 0 to 1024 [ 55.131736][ T4190] loop0: detected capacity change from 0 to 512 [ 55.152839][ T4188] EXT4-fs: Ignoring removed bh option [ 55.158391][ T4188] EXT4-fs: inline encryption not supported [ 55.176570][ T4190] EXT4-fs: test_dummy_encryption option not supported [ 55.247706][ T4188] EXT4-fs (loop5): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 55.288841][ T4188] EXT4-fs error (device loop5): ext4_map_blocks:778: inode #3: block 2: comm syz.5.241: lblock 2 mapped to illegal pblock 2 (length 1) [ 55.323581][ T4188] EXT4-fs error (device loop5): ext4_map_blocks:778: inode #3: block 48: comm syz.5.241: lblock 0 mapped to illegal pblock 48 (length 1) [ 55.373549][ T4188] EXT4-fs error (device loop5): ext4_acquire_dquot:6937: comm syz.5.241: Failed to acquire dquot type 0 [ 55.398104][ T4188] EXT4-fs error (device loop5) in ext4_reserve_inode_write:6334: Corrupt filesystem [ 55.413224][ T4188] EXT4-fs error (device loop5): ext4_evict_inode:254: inode #11: comm syz.5.241: mark_inode_dirty error [ 55.425889][ T4188] EXT4-fs warning (device loop5): ext4_evict_inode:257: couldn't mark inode dirty (err -117) [ 55.438466][ T4188] EXT4-fs (loop5): 1 orphan inode deleted [ 55.448098][ T4188] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 55.461603][ T36] EXT4-fs error (device loop5): ext4_map_blocks:778: inode #3: block 1: comm kworker/u8:2: lblock 1 mapped to illegal pblock 1 (length 1) [ 55.481838][ T4188] EXT4-fs error (device loop5): ext4_map_blocks:778: inode #2: block 16: comm syz.5.241: lblock 0 mapped to illegal pblock 16 (length 1) [ 55.498085][ T36] EXT4-fs error (device loop5): ext4_release_dquot:6973: comm kworker/u8:2: Failed to release dquot type 0 [ 55.510436][ T4188] netlink: 'syz.5.241': attribute type 1 has an invalid length. [ 55.518150][ T4188] netlink: 224 bytes leftover after parsing attributes in process `syz.5.241'. [ 55.518611][ T4196] SELinux: failed to load policy [ 55.531757][ T4188] EXT4-fs error (device loop5): ext4_map_blocks:778: inode #2: block 16: comm syz.5.241: lblock 0 mapped to illegal pblock 16 (length 1) [ 55.717028][ T4202] netlink: 'syz.1.245': attribute type 1 has an invalid length. [ 56.173956][ T3689] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 56.207970][ T4223] FAULT_INJECTION: forcing a failure. [ 56.207970][ T4223] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 56.221285][ T4223] CPU: 0 UID: 0 PID: 4223 Comm: syz.0.251 Not tainted syzkaller #0 PREEMPT(voluntary) [ 56.221315][ T4223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 56.221330][ T4223] Call Trace: [ 56.221337][ T4223] [ 56.221345][ T4223] __dump_stack+0x1d/0x30 [ 56.221366][ T4223] dump_stack_lvl+0xe8/0x140 [ 56.221385][ T4223] dump_stack+0x15/0x1b [ 56.221481][ T4223] should_fail_ex+0x265/0x280 [ 56.221508][ T4223] should_fail+0xb/0x20 [ 56.221533][ T4223] should_fail_usercopy+0x1a/0x20 [ 56.221565][ T4223] _copy_to_user+0x20/0xa0 [ 56.221649][ T4223] simple_read_from_buffer+0xb5/0x130 [ 56.221675][ T4223] proc_fail_nth_read+0x10e/0x150 [ 56.221703][ T4223] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 56.221738][ T4223] vfs_read+0x1a5/0x770 [ 56.221774][ T4223] ? __rcu_read_unlock+0x4f/0x70 [ 56.221801][ T4223] ? __fget_files+0x184/0x1c0 [ 56.221846][ T4223] ksys_read+0xda/0x1a0 [ 56.221945][ T4223] __x64_sys_read+0x40/0x50 [ 56.221967][ T4223] x64_sys_call+0x27bc/0x2ff0 [ 56.222030][ T4223] do_syscall_64+0xd2/0x200 [ 56.222069][ T4223] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 56.222134][ T4223] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 56.222162][ T4223] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 56.222190][ T4223] RIP: 0033:0x7f0d5838d8dc [ 56.222210][ T4223] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 56.222264][ T4223] RSP: 002b:00007f0d56def030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 56.222289][ T4223] RAX: ffffffffffffffda RBX: 00007f0d585e5fa0 RCX: 00007f0d5838d8dc [ 56.222302][ T4223] RDX: 000000000000000f RSI: 00007f0d56def0a0 RDI: 0000000000000006 [ 56.222466][ T4223] RBP: 00007f0d56def090 R08: 0000000000000000 R09: 0000000000000000 [ 56.222482][ T4223] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 56.222498][ T4223] R13: 00007f0d585e6038 R14: 00007f0d585e5fa0 R15: 00007fff7192c1a8 [ 56.222523][ T4223] [ 56.635318][ T3689] EXT4-fs error (device loop5): __ext4_get_inode_loc:4861: comm syz-executor: Invalid inode table block 1 in block_group 0 [ 56.660861][ T3689] EXT4-fs error (device loop5) in ext4_reserve_inode_write:6334: Corrupt filesystem [ 56.692838][ T3689] EXT4-fs error (device loop5): ext4_quota_off:7221: inode #3: comm syz-executor: mark_inode_dirty error [ 56.825239][ T4248] loop0: detected capacity change from 0 to 1024 [ 56.832281][ T4248] EXT4-fs: Ignoring removed bh option [ 56.882421][ T4248] EXT4-fs: inline encryption not supported [ 56.892845][ T4253] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 56.904771][ T4255] serio: Serial port ptm0 [ 56.916089][ T4250] loop5: detected capacity change from 0 to 512 [ 56.922901][ T4253] SELinux: failed to load policy [ 56.924864][ T4250] EXT4-fs: test_dummy_encryption option not supported [ 56.940996][ T4248] EXT4-fs (loop0): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 56.974592][ T4248] EXT4-fs error (device loop0): ext4_map_blocks:778: inode #3: block 2: comm syz.0.263: lblock 2 mapped to illegal pblock 2 (length 1) [ 57.106527][ T4248] EXT4-fs error (device loop0): ext4_map_blocks:778: inode #3: block 48: comm syz.0.263: lblock 0 mapped to illegal pblock 48 (length 1) [ 57.142358][ T4265] FAULT_INJECTION: forcing a failure. [ 57.142358][ T4265] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 57.156501][ T4265] CPU: 0 UID: 0 PID: 4265 Comm: syz.5.266 Not tainted syzkaller #0 PREEMPT(voluntary) [ 57.156537][ T4265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 57.156595][ T4265] Call Trace: [ 57.156604][ T4265] [ 57.156612][ T4265] __dump_stack+0x1d/0x30 [ 57.156685][ T4265] dump_stack_lvl+0xe8/0x140 [ 57.156711][ T4265] dump_stack+0x15/0x1b [ 57.156733][ T4265] should_fail_ex+0x265/0x280 [ 57.156765][ T4265] should_fail+0xb/0x20 [ 57.156793][ T4265] should_fail_usercopy+0x1a/0x20 [ 57.156827][ T4265] _copy_from_user+0x1c/0xb0 [ 57.156867][ T4265] ___sys_sendmsg+0xc1/0x1d0 [ 57.156944][ T4265] __x64_sys_sendmsg+0xd4/0x160 [ 57.156974][ T4265] x64_sys_call+0x191e/0x2ff0 [ 57.157052][ T4265] do_syscall_64+0xd2/0x200 [ 57.157087][ T4265] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 57.157172][ T4265] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 57.157210][ T4265] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 57.157237][ T4265] RIP: 0033:0x7fa61128eec9 [ 57.157318][ T4265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.157342][ T4265] RSP: 002b:00007fa60fcef038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 57.157367][ T4265] RAX: ffffffffffffffda RBX: 00007fa6114e5fa0 RCX: 00007fa61128eec9 [ 57.157384][ T4265] RDX: 0000000020000000 RSI: 0000200000000600 RDI: 0000000000000006 [ 57.157407][ T4265] RBP: 00007fa60fcef090 R08: 0000000000000000 R09: 0000000000000000 [ 57.157419][ T4265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 57.157431][ T4265] R13: 00007fa6114e6038 R14: 00007fa6114e5fa0 R15: 00007fffe2788288 [ 57.157534][ T4265] [ 57.157632][ T4248] EXT4-fs error (device loop0): ext4_acquire_dquot:6937: comm syz.0.263: Failed to acquire dquot type 0 [ 57.244250][ T4269] FAULT_INJECTION: forcing a failure. [ 57.244250][ T4269] name failslab, interval 1, probability 0, space 0, times 0 [ 57.357761][ T4269] CPU: 0 UID: 0 PID: 4269 Comm: syz.5.269 Not tainted syzkaller #0 PREEMPT(voluntary) [ 57.357797][ T4269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 57.357905][ T4269] Call Trace: [ 57.357912][ T4269] [ 57.357921][ T4269] __dump_stack+0x1d/0x30 [ 57.357957][ T4269] dump_stack_lvl+0xe8/0x140 [ 57.358055][ T4269] dump_stack+0x15/0x1b [ 57.358143][ T4269] should_fail_ex+0x265/0x280 [ 57.358300][ T4269] should_failslab+0x8c/0xb0 [ 57.358429][ T4269] kmem_cache_alloc_noprof+0x50/0x310 [ 57.358468][ T4269] ? audit_log_start+0x365/0x6c0 [ 57.358563][ T4269] audit_log_start+0x365/0x6c0 [ 57.358607][ T4269] audit_seccomp+0x48/0x100 [ 57.358670][ T4269] ? __seccomp_filter+0x68c/0x10d0 [ 57.358699][ T4269] __seccomp_filter+0x69d/0x10d0 [ 57.358728][ T4269] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 57.358906][ T4269] ? vfs_write+0x7e8/0x960 [ 57.358935][ T4269] __secure_computing+0x82/0x150 [ 57.358957][ T4269] syscall_trace_enter+0xcf/0x1e0 [ 57.359056][ T4269] do_syscall_64+0xac/0x200 [ 57.359089][ T4269] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 57.359124][ T4269] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 57.359211][ T4269] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 57.359317][ T4269] RIP: 0033:0x7fa61128eec9 [ 57.359335][ T4269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.359359][ T4269] RSP: 002b:00007fa60fcef038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 57.359461][ T4269] RAX: ffffffffffffffda RBX: 00007fa6114e5fa0 RCX: 00007fa61128eec9 [ 57.359474][ T4269] RDX: 0000200000000200 RSI: 000000001e9d52ea RDI: 000000000000001d [ 57.359487][ T4269] RBP: 00007fa60fcef090 R08: 0000000000000000 R09: 0000000000000000 [ 57.359499][ T4269] R10: 00002000000002c0 R11: 0000000000000246 R12: 0000000000000001 [ 57.359514][ T4269] R13: 00007fa6114e6038 R14: 00007fa6114e5fa0 R15: 00007fffe2788288 [ 57.359540][ T4269] [ 57.361802][ T4248] EXT4-fs error (device loop0) in ext4_reserve_inode_write:6334: Corrupt filesystem [ 57.591158][ T4248] EXT4-fs error (device loop0): ext4_evict_inode:254: inode #11: comm syz.0.263: mark_inode_dirty error [ 57.604402][ T4267] vhci_hcd: invalid port number 96 [ 57.610182][ T4267] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 57.633534][ T4248] EXT4-fs warning (device loop0): ext4_evict_inode:257: couldn't mark inode dirty (err -117) [ 57.651605][ T4248] EXT4-fs (loop0): 1 orphan inode deleted [ 57.658927][ T4248] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 57.672117][ T123] EXT4-fs error (device loop0): ext4_map_blocks:778: inode #3: block 1: comm kworker/u8:4: lblock 1 mapped to illegal pblock 1 (length 1) [ 57.686923][ T123] __quota_error: 48 callbacks suppressed [ 57.686940][ T123] Quota error (device loop0): remove_tree: Can't read quota data block 1 [ 57.699168][ T4248] EXT4-fs error (device loop0): ext4_map_blocks:778: inode #2: block 16: comm syz.0.263: lblock 0 mapped to illegal pblock 16 (length 1) [ 57.701233][ T123] EXT4-fs error (device loop0): ext4_release_dquot:6973: comm kworker/u8:4: Failed to release dquot type 0 [ 57.735154][ T4248] netlink: 'syz.0.263': attribute type 1 has an invalid length. [ 57.743120][ T4248] netlink: 224 bytes leftover after parsing attributes in process `syz.0.263'. [ 57.755502][ T4248] EXT4-fs error (device loop0): ext4_map_blocks:778: inode #2: block 16: comm syz.0.263: lblock 0 mapped to illegal pblock 16 (length 1) [ 57.872330][ T4279] SELinux: failed to load policy [ 57.919143][ T29] audit: type=1326 audit(1758997349.767:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4285 comm="syz.1.275" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a7ee0eec9 code=0x7ffc0000 [ 57.976210][ T29] audit: type=1326 audit(1758997349.807:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4285 comm="syz.1.275" exe="/root/syz-executor" sig=0 arch=c000003e syscall=288 compat=0 ip=0x7f5a7ee0eec9 code=0x7ffc0000 [ 58.000293][ T29] audit: type=1326 audit(1758997349.807:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4285 comm="syz.1.275" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a7ee0eec9 code=0x7ffc0000 [ 58.023860][ T29] audit: type=1326 audit(1758997349.807:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4285 comm="syz.1.275" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a7ee0eec9 code=0x7ffc0000 [ 58.321386][ T4291] loop1: detected capacity change from 0 to 512 [ 58.376768][ T4295] netlink: 'syz.2.278': attribute type 30 has an invalid length. [ 58.388855][ T4291] EXT4-fs: test_dummy_encryption option not supported [ 58.474499][ T29] audit: type=1326 audit(1758997350.147:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4292 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0a4879eec9 code=0x7ffc0000 [ 58.475820][ T3303] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 58.498219][ T29] audit: type=1326 audit(1758997350.147:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4292 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0a4879eec9 code=0x7ffc0000 [ 58.498324][ T29] audit: type=1326 audit(1758997350.147:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4292 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7f0a4879eec9 code=0x7ffc0000 [ 58.554387][ T29] audit: type=1326 audit(1758997350.147:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4292 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0a4879eec9 code=0x7ffc0000 [ 58.578478][ T29] audit: type=1326 audit(1758997350.147:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4292 comm="syz.4.279" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0a4879eec9 code=0x7ffc0000 [ 58.609605][ T3303] EXT4-fs error (device loop0): __ext4_get_inode_loc:4861: comm syz-executor: Invalid inode table block 1 in block_group 0 [ 58.634721][ T3303] EXT4-fs error (device loop0) in ext4_reserve_inode_write:6334: Corrupt filesystem [ 58.652851][ T3303] EXT4-fs error (device loop0): ext4_quota_off:7221: inode #3: comm syz-executor: mark_inode_dirty error [ 58.797931][ T4310] SELinux: failed to load policy [ 58.812412][ T4312] loop0: detected capacity change from 0 to 1024 [ 58.824680][ T4312] ======================================================= [ 58.824680][ T4312] WARNING: The mand mount option has been deprecated and [ 58.824680][ T4312] and is ignored by this kernel. Remove the mand [ 58.824680][ T4312] option from the mount to silence this warning. [ 58.824680][ T4312] ======================================================= [ 58.860757][ T4312] EXT4-fs: Ignoring removed oldalloc option [ 58.880092][ T4312] EXT4-fs (loop0): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. [ 58.898321][ T4312] ext4 filesystem being mounted at /58/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 58.936229][ T4322] serio: Serial port ptm0 [ 58.995536][ T3303] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 59.018667][ T4326] loop4: detected capacity change from 0 to 512 [ 59.032950][ T4326] EXT4-fs: test_dummy_encryption option not supported [ 59.055095][ T4329] loop2: detected capacity change from 0 to 1024 [ 59.062277][ T4329] EXT4-fs: Ignoring removed bh option [ 59.068074][ T4329] EXT4-fs: inline encryption not supported [ 59.078786][ T4329] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 59.111299][ T4329] EXT4-fs error (device loop2): ext4_map_blocks:778: inode #3: block 2: comm syz.2.293: lblock 2 mapped to illegal pblock 2 (length 1) [ 59.128146][ T4329] EXT4-fs error (device loop2): ext4_map_blocks:778: inode #3: block 48: comm syz.2.293: lblock 0 mapped to illegal pblock 48 (length 1) [ 59.144563][ T4329] EXT4-fs error (device loop2): ext4_acquire_dquot:6937: comm syz.2.293: Failed to acquire dquot type 0 [ 59.156696][ T4329] EXT4-fs error (device loop2) in ext4_reserve_inode_write:6334: Corrupt filesystem [ 59.169178][ T4329] EXT4-fs error (device loop2): ext4_evict_inode:254: inode #11: comm syz.2.293: mark_inode_dirty error [ 59.181494][ T4329] EXT4-fs warning (device loop2): ext4_evict_inode:257: couldn't mark inode dirty (err -117) [ 59.213381][ T4329] EXT4-fs (loop2): 1 orphan inode deleted [ 59.229944][ T4329] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 59.247434][ T3427] EXT4-fs error (device loop2): ext4_map_blocks:778: inode #3: block 1: comm kworker/u8:7: lblock 1 mapped to illegal pblock 1 (length 1) [ 59.297940][ T3427] EXT4-fs error (device loop2): ext4_release_dquot:6973: comm kworker/u8:7: Failed to release dquot type 0 [ 59.318002][ T4329] EXT4-fs error (device loop2): ext4_map_blocks:778: inode #2: block 16: comm syz.2.293: lblock 0 mapped to illegal pblock 16 (length 1) [ 59.343612][ T4340] netlink: 4 bytes leftover after parsing attributes in process `syz.4.296'. [ 59.347104][ T4339] infiniband syz!: set active [ 59.357431][ T4339] infiniband syz!: added team_slave_0 [ 59.370720][ T4340] loop4: detected capacity change from 0 to 512 [ 59.378133][ T4340] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 59.389748][ T4329] netlink: 'syz.2.293': attribute type 1 has an invalid length. [ 59.397745][ T4329] netlink: 224 bytes leftover after parsing attributes in process `syz.2.293'. [ 59.437785][ T4329] EXT4-fs error (device loop2): ext4_map_blocks:778: inode #2: block 16: comm syz.2.293: lblock 0 mapped to illegal pblock 16 (length 1) [ 59.438452][ T4340] EXT4-fs error (device loop4): ext4_acquire_dquot:6937: comm syz.4.296: Failed to acquire dquot type 1 [ 59.466380][ T4339] RDS/IB: syz!: added [ 59.471194][ T4339] smc: adding ib device syz! with port count 1 [ 59.482238][ T4339] smc: ib device syz! port 1 has pnetid [ 59.502535][ T4340] EXT4-fs (loop4): 1 truncate cleaned up [ 59.518710][ T4340] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 59.564786][ T4340] EXT4-fs error (device loop4): ext4_lookup:1791: inode #2: comm syz.4.296: deleted inode referenced: 12 [ 60.001510][ T4339] syz.4.296 (4339) used greatest stack depth: 10616 bytes left [ 60.108414][ T3299] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.148654][ T4350] loop1: detected capacity change from 0 to 1024 [ 60.160822][ T3305] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.171509][ T3305] EXT4-fs error (device loop2): __ext4_get_inode_loc:4861: comm syz-executor: Invalid inode table block 1 in block_group 0 [ 60.186107][ T3305] EXT4-fs error (device loop2) in ext4_reserve_inode_write:6334: Corrupt filesystem [ 60.196739][ T4350] EXT4-fs (loop1): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. [ 60.209877][ T4350] ext4 filesystem being mounted at /76/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 60.239546][ T3305] EXT4-fs error (device loop2): ext4_quota_off:7221: inode #3: comm syz-executor: mark_inode_dirty error [ 60.265185][ T4362] loop4: detected capacity change from 0 to 512 [ 60.274738][ T3300] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 60.310890][ T4362] EXT4-fs (loop4): orphan cleanup on readonly fs [ 60.319723][ T4362] EXT4-fs error (device loop4): ext4_orphan_get:1392: inode #15: comm syz.4.304: iget: bad extended attribute block 1 [ 60.362762][ T4362] EXT4-fs error (device loop4): ext4_orphan_get:1397: comm syz.4.304: couldn't read orphan inode 15 (err -117) [ 60.378523][ T4366] SELinux: failed to load policy [ 60.390363][ T4362] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 60.407893][ T4370] loop1: detected capacity change from 0 to 1024 [ 60.426089][ T4370] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 60.442580][ T4362] can0: slcan on ttyS3. [ 60.482516][ T3300] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.483253][ T4380] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 60.493201][ T4362] can0 (unregistered): slcan off ttyS3. [ 60.510493][ T4383] can0: slcan on ttyS3. [ 60.513247][ T4380] netlink: 4 bytes leftover after parsing attributes in process `syz.2.310'. [ 60.533251][ T4380] loop2: detected capacity change from 0 to 512 [ 60.540540][ T4380] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 60.554955][ T4362] EXT4-fs error (device loop4): ext4_map_blocks:778: inode #2: block 13: comm syz.4.304: lblock 0 mapped to illegal pblock 13 (length 1) [ 60.555973][ T4387] mmap: syz.1.311 (4387) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 60.569328][ T4380] EXT4-fs error (device loop2): ext4_acquire_dquot:6937: comm syz.2.310: Failed to acquire dquot type 1 [ 60.597198][ T4380] EXT4-fs (loop2): 1 truncate cleaned up [ 60.612688][ T4380] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 60.636535][ T4380] EXT4-fs error (device loop2): ext4_lookup:1791: inode #2: comm syz.2.310: deleted inode referenced: 12 [ 60.665527][ T4393] loop1: detected capacity change from 0 to 1024 [ 60.674747][ T4393] EXT4-fs: Ignoring removed bh option [ 60.680815][ T4393] EXT4-fs: inline encryption not supported [ 60.687061][ T4362] can0 (unregistered): slcan off ttyS3. [ 60.695583][ T4393] EXT4-fs (loop1): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 60.706632][ T3299] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.726654][ T4393] EXT4-fs error (device loop1): ext4_map_blocks:778: inode #3: block 2: comm syz.1.315: lblock 2 mapped to illegal pblock 2 (length 1) [ 60.743575][ T3305] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.754496][ T4397] loop5: detected capacity change from 0 to 512 [ 60.754534][ T4393] EXT4-fs error (device loop1): ext4_map_blocks:778: inode #3: block 48: comm syz.1.315: lblock 0 mapped to illegal pblock 48 (length 1) [ 60.778958][ T4393] EXT4-fs error (device loop1): ext4_acquire_dquot:6937: comm syz.1.315: Failed to acquire dquot type 0 [ 60.791499][ T4393] EXT4-fs error (device loop1) in ext4_reserve_inode_write:6334: Corrupt filesystem [ 60.801702][ T4393] EXT4-fs error (device loop1): ext4_evict_inode:254: inode #11: comm syz.1.315: mark_inode_dirty error [ 60.807033][ T4397] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 60.816482][ T4393] EXT4-fs warning (device loop1): ext4_evict_inode:257: couldn't mark inode dirty (err -117) [ 60.827808][ T4397] ext4 filesystem being mounted at /26/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 60.855810][ T4393] EXT4-fs (loop1): 1 orphan inode deleted [ 60.862357][ T4393] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 60.875426][ T3427] EXT4-fs error (device loop1): ext4_map_blocks:778: inode #3: block 1: comm kworker/u8:7: lblock 1 mapped to illegal pblock 1 (length 1) [ 60.891860][ T3427] EXT4-fs error (device loop1): ext4_release_dquot:6973: comm kworker/u8:7: Failed to release dquot type 0 [ 60.916882][ T4393] EXT4-fs error (device loop1): ext4_map_blocks:778: inode #2: block 16: comm syz.1.315: lblock 0 mapped to illegal pblock 16 (length 1) [ 60.932074][ T3689] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.944228][ T4393] netlink: 'syz.1.315': attribute type 1 has an invalid length. [ 60.952100][ T4393] netlink: 224 bytes leftover after parsing attributes in process `syz.1.315'. [ 60.968415][ T4393] EXT4-fs error (device loop1): ext4_map_blocks:778: inode #2: block 16: comm syz.1.315: lblock 0 mapped to illegal pblock 16 (length 1) [ 61.080154][ T4419] loop0: detected capacity change from 0 to 512 [ 61.088414][ T4419] EXT4-fs: test_dummy_encryption option not supported [ 61.140278][ T4425] loop0: detected capacity change from 0 to 512 [ 61.158518][ T4423] loop2: detected capacity change from 0 to 128 [ 61.205857][ T4427] netlink: 260 bytes leftover after parsing attributes in process `syz.5.327'. [ 61.216287][ T4425] EXT4-fs warning (device loop0): ext4_enable_quotas:7172: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 61.235394][ T4425] EXT4-fs (loop0): mount failed [ 61.347521][ C1] hrtimer: interrupt took 44784 ns [ 61.457659][ T4433] loop0: detected capacity change from 0 to 1024 [ 61.744911][ T4433] EXT4-fs (loop0): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. [ 61.768697][ T4434] ªªªªªª: renamed from vlan0 (while UP) [ 61.773962][ T4433] ext4 filesystem being mounted at /67/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 61.786561][ T3300] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.806784][ T3300] EXT4-fs error (device loop1): __ext4_get_inode_loc:4861: comm syz-executor: Invalid inode table block 1 in block_group 0 [ 61.832931][ T3300] EXT4-fs error (device loop1) in ext4_reserve_inode_write:6334: Corrupt filesystem [ 61.868271][ T3300] EXT4-fs error (device loop1): ext4_quota_off:7221: inode #3: comm syz-executor: mark_inode_dirty error [ 61.909878][ T4447] loop4: detected capacity change from 0 to 512 [ 61.921085][ T4444] loop5: detected capacity change from 0 to 512 [ 61.928201][ T4444] ext4: Unknown parameter './file0/file0' [ 61.939637][ T4444] loop5: detected capacity change from 0 to 512 [ 61.950182][ T4448] EXT4-fs error (device loop0): ext4_map_blocks:814: inode #15: block 3: comm syz.0.329: lblock 3 mapped to illegal pblock 3 (length 3) [ 61.961122][ T4447] EXT4-fs: test_dummy_encryption option not supported [ 61.965065][ T4448] EXT4-fs (loop0): Delayed block allocation failed for inode 15 at logical offset 3 with max blocks 3 with error 117 [ 61.984073][ T4448] EXT4-fs (loop0): This should not happen!! Data will be lost [ 61.984073][ T4448] [ 61.994616][ T4444] ext4: Unknown parameter './file0/file0' [ 62.000595][ T4448] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 62.020148][ T4444] loop5: detected capacity change from 0 to 512 [ 62.035247][ T4444] ext4: Unknown parameter './file0/file0' [ 62.045056][ T4444] loop5: detected capacity change from 0 to 512 [ 62.051771][ T4444] ext4: Unknown parameter './file0/file0' [ 62.088327][ T4444] loop5: detected capacity change from 0 to 512 [ 62.099711][ T4444] ext4: Unknown parameter './file0/file0' [ 62.110011][ T4444] loop5: detected capacity change from 0 to 512 [ 62.116818][ T4444] ext4: Unknown parameter './file0/file0' [ 62.127009][ T4444] loop5: detected capacity change from 0 to 512 [ 62.134488][ T4444] ext4: Unknown parameter './file0/file0' [ 62.144526][ T4465] FAULT_INJECTION: forcing a failure. [ 62.144526][ T4465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 62.158267][ T4465] CPU: 0 UID: 0 PID: 4465 Comm: syz.4.343 Not tainted syzkaller #0 PREEMPT(voluntary) [ 62.158301][ T4465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 62.158317][ T4465] Call Trace: [ 62.158324][ T4465] [ 62.158438][ T4465] __dump_stack+0x1d/0x30 [ 62.158464][ T4465] dump_stack_lvl+0xe8/0x140 [ 62.158556][ T4465] dump_stack+0x15/0x1b [ 62.158575][ T4465] should_fail_ex+0x265/0x280 [ 62.158605][ T4465] should_fail+0xb/0x20 [ 62.158696][ T4465] should_fail_usercopy+0x1a/0x20 [ 62.158730][ T4465] _copy_from_iter+0xd2/0xe80 [ 62.158830][ T4465] ? __build_skb_around+0x1a0/0x200 [ 62.158858][ T4465] ? __alloc_skb+0x223/0x320 [ 62.158887][ T4465] netlink_sendmsg+0x471/0x6b0 [ 62.158923][ T4465] ? __pfx_netlink_sendmsg+0x10/0x10 [ 62.159011][ T4465] __sock_sendmsg+0x145/0x180 [ 62.159052][ T4465] ____sys_sendmsg+0x31e/0x4e0 [ 62.159086][ T4465] ___sys_sendmsg+0x17b/0x1d0 [ 62.159135][ T4465] __x64_sys_sendmsg+0xd4/0x160 [ 62.159213][ T4465] x64_sys_call+0x191e/0x2ff0 [ 62.159299][ T4465] do_syscall_64+0xd2/0x200 [ 62.159337][ T4465] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 62.159412][ T4465] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 62.159480][ T4465] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 62.159515][ T4465] RIP: 0033:0x7f0a4879eec9 [ 62.159531][ T4465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 62.159550][ T4465] RSP: 002b:00007f0a47207038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 62.159571][ T4465] RAX: ffffffffffffffda RBX: 00007f0a489f5fa0 RCX: 00007f0a4879eec9 [ 62.159584][ T4465] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 62.159598][ T4465] RBP: 00007f0a47207090 R08: 0000000000000000 R09: 0000000000000000 [ 62.159610][ T4465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 62.159658][ T4465] R13: 00007f0a489f6038 R14: 00007f0a489f5fa0 R15: 00007ffe6935c388 [ 62.159679][ T4465] [ 62.160489][ T4469] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 62.170860][ T4444] loop5: detected capacity change from 0 to 512 [ 62.187349][ T4469] netlink: 4 bytes leftover after parsing attributes in process `syz.1.341'. [ 62.217475][ T4444] ext4: Unknown parameter './file0/file0' [ 62.267826][ T4471] loop1: detected capacity change from 0 to 512 [ 62.417071][ T4444] loop5: detected capacity change from 0 to 512 [ 62.426200][ T123] EXT4-fs error (device loop0): ext4_map_blocks:814: inode #15: block 8: comm kworker/u8:4: lblock 8 mapped to illegal pblock 8 (length 8) [ 62.442566][ T4444] ext4: Unknown parameter './file0/file0' [ 62.451242][ T4471] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 62.461066][ T4444] loop5: detected capacity change from 0 to 512 [ 62.469624][ T123] EXT4-fs (loop0): Delayed block allocation failed for inode 15 at logical offset 8 with max blocks 8 with error 117 [ 62.482392][ T123] EXT4-fs (loop0): This should not happen!! Data will be lost [ 62.482392][ T123] [ 62.492507][ T4444] ext4: Unknown parameter './file0/file0' [ 62.502451][ T4444] loop5: detected capacity change from 0 to 512 [ 62.509132][ T4444] ext4: Unknown parameter './file0/file0' [ 62.518699][ T4444] loop5: detected capacity change from 0 to 512 [ 62.525264][ T4444] ext4: Unknown parameter './file0/file0' [ 62.534674][ T4444] loop5: detected capacity change from 0 to 512 [ 62.541446][ T4444] ext4: Unknown parameter './file0/file0' [ 62.550904][ T4444] loop5: detected capacity change from 0 to 512 [ 62.557706][ T4444] ext4: Unknown parameter './file0/file0' [ 62.567132][ T4444] loop5: detected capacity change from 0 to 512 [ 62.573635][ T4444] ext4: Unknown parameter './file0/file0' [ 62.583340][ T4444] loop5: detected capacity change from 0 to 512 [ 62.590235][ T4444] ext4: Unknown parameter './file0/file0' [ 62.600121][ T4444] loop5: detected capacity change from 0 to 512 [ 62.606804][ T4444] ext4: Unknown parameter './file0/file0' [ 62.616239][ T4444] loop5: detected capacity change from 0 to 512 [ 62.616353][ T4484] loop2: detected capacity change from 0 to 512 [ 62.622996][ T4444] ext4: Unknown parameter './file0/file0' [ 62.627011][ T4444] loop5: detected capacity change from 0 to 512 [ 62.630299][ T4484] EXT4-fs: test_dummy_encryption option not supported [ 62.637306][ T4444] ext4: Unknown parameter './file0/file0' [ 62.647248][ T4471] EXT4-fs error (device loop1): ext4_acquire_dquot:6937: comm syz.1.341: Failed to acquire dquot type 1 [ 62.669275][ T3303] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 62.681473][ T4444] loop5: detected capacity change from 0 to 512 [ 62.688003][ T4471] EXT4-fs (loop1): 1 truncate cleaned up [ 62.694176][ T4471] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 62.712846][ T4444] ext4: Unknown parameter './file0/file0' [ 62.724382][ T4444] loop5: detected capacity change from 0 to 512 [ 62.735579][ T4469] EXT4-fs error (device loop1): ext4_lookup:1791: inode #2: comm syz.1.341: deleted inode referenced: 12 [ 62.782411][ T4499] loop4: detected capacity change from 0 to 512 [ 62.813631][ T4504] netlink: 28 bytes leftover after parsing attributes in process `syz.2.356'. [ 62.822698][ T4504] netlink: 28 bytes leftover after parsing attributes in process `syz.2.356'. [ 62.822742][ T4506] loop5: detected capacity change from 0 to 2048 [ 62.855875][ T3300] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 62.927845][ T4513] loop5: detected capacity change from 0 to 512 [ 62.979433][ T4519] loop1: detected capacity change from 0 to 512 [ 62.986868][ T4513] __quota_error: 907 callbacks suppressed [ 62.986890][ T4513] Quota error (device loop5): v2_read_file_info: Free block number 1 out of range (1, 6). [ 63.009348][ T29] audit: type=1400 audit(1758997360.860:1261): avc: denied { write } for pid=4524 comm="syz.4.366" name="fib_trie" dev="proc" ino=4026532417 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 63.026152][ T4519] EXT4-fs: test_dummy_encryption option not supported [ 63.041338][ T4525] random: crng reseeded on system resumption [ 63.047944][ T29] audit: type=1400 audit(1758997360.890:1262): avc: denied { write } for pid=4524 comm="syz.4.366" name="mISDNtimer" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.059258][ T4513] EXT4-fs warning (device loop5): ext4_enable_quotas:7172: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 63.071791][ T29] audit: type=1400 audit(1758997360.890:1263): avc: denied { open } for pid=4524 comm="syz.4.366" path="/dev/mISDNtimer" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.106921][ T4513] EXT4-fs (loop5): mount failed [ 63.110896][ T29] audit: type=1400 audit(1758997360.890:1264): avc: denied { ioctl } for pid=4524 comm="syz.4.366" path="/dev/mISDNtimer" dev="devtmpfs" ino=250 ioctlcmd=0x4940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.141303][ T29] audit: type=1400 audit(1758997360.890:1265): avc: denied { write } for pid=4524 comm="syz.4.366" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 63.165075][ T29] audit: type=1400 audit(1758997360.890:1266): avc: denied { open } for pid=4524 comm="syz.4.366" path="/dev/snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 63.290845][ T29] audit: type=1326 audit(1758997361.130:1267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4533 comm="syz.4.371" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0a4879eec9 code=0x7ffc0000 [ 63.314776][ T29] audit: type=1326 audit(1758997361.140:1268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4533 comm="syz.4.371" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0a4879eec9 code=0x7ffc0000 [ 63.338575][ T29] audit: type=1326 audit(1758997361.140:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4533 comm="syz.4.371" exe="/root/syz-executor" sig=0 arch=c000003e syscall=88 compat=0 ip=0x7f0a4879eec9 code=0x7ffc0000 [ 63.365690][ T4534] 9pnet_fd: Insufficient options for proto=fd [ 63.431655][ T4536] bond1: entered promiscuous mode [ 63.436971][ T4536] bond1: entered allmulticast mode [ 63.443293][ T4536] 8021q: adding VLAN 0 to HW filter on device bond1 [ 63.458873][ T4536] bond1 (unregistering): Released all slaves [ 63.467982][ T10] IPVS: starting estimator thread 0... [ 63.479124][ T4553] netlink: 'syz.1.370': attribute type 21 has an invalid length. [ 63.487169][ T4553] netlink: 156 bytes leftover after parsing attributes in process `syz.1.370'. [ 63.498741][ T4553] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47 sclass=netlink_route_socket pid=4553 comm=syz.1.370 [ 63.528262][ T4551] loop2: detected capacity change from 0 to 1764 [ 63.572146][ T4557] loop4: detected capacity change from 0 to 512 [ 63.583312][ T4549] IPVS: using max 2304 ests per chain, 115200 per kthread [ 63.598130][ T4561] FAULT_INJECTION: forcing a failure. [ 63.598130][ T4561] name failslab, interval 1, probability 0, space 0, times 0 [ 63.603177][ T4557] EXT4-fs: test_dummy_encryption option not supported [ 63.611127][ T4561] CPU: 0 UID: 0 PID: 4561 Comm: syz.2.381 Not tainted syzkaller #0 PREEMPT(voluntary) [ 63.611168][ T4561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 63.611186][ T4561] Call Trace: [ 63.611195][ T4561] [ 63.611209][ T4561] __dump_stack+0x1d/0x30 [ 63.611268][ T4561] dump_stack_lvl+0xe8/0x140 [ 63.611295][ T4561] dump_stack+0x15/0x1b [ 63.611320][ T4561] should_fail_ex+0x265/0x280 [ 63.611356][ T4561] should_failslab+0x8c/0xb0 [ 63.611392][ T4561] __kmalloc_noprof+0xa5/0x3e0 [ 63.611467][ T4561] ? bpf_test_init+0xa9/0x160 [ 63.611563][ T4561] bpf_test_init+0xa9/0x160 [ 63.611594][ T4561] bpf_prog_test_run_xdp+0x274/0x910 [ 63.611626][ T4561] ? kstrtouint+0x76/0xc0 [ 63.611739][ T4561] ? __rcu_read_unlock+0x4f/0x70 [ 63.611777][ T4561] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 63.611846][ T4561] bpf_prog_test_run+0x22a/0x390 [ 63.611892][ T4561] __sys_bpf+0x4b9/0x7b0 [ 63.611943][ T4561] __x64_sys_bpf+0x41/0x50 [ 63.612054][ T4561] x64_sys_call+0x2aea/0x2ff0 [ 63.612084][ T4561] do_syscall_64+0xd2/0x200 [ 63.612129][ T4561] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 63.612251][ T4561] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 63.612287][ T4561] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 63.612309][ T4561] RIP: 0033:0x7f7ac1feeec9 [ 63.612324][ T4561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 63.612346][ T4561] RSP: 002b:00007f7ac0a4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 63.612373][ T4561] RAX: ffffffffffffffda RBX: 00007f7ac2245fa0 RCX: 00007f7ac1feeec9 [ 63.612410][ T4561] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 63.612428][ T4561] RBP: 00007f7ac0a4f090 R08: 0000000000000000 R09: 0000000000000000 [ 63.612444][ T4561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 63.612462][ T4561] R13: 00007f7ac2246038 R14: 00007f7ac2245fa0 R15: 00007fffdd1fd618 [ 63.612490][ T4561] [ 63.711909][ T4565] random: crng reseeded on system resumption [ 63.867606][ T4575] loop1: detected capacity change from 0 to 512 [ 63.903755][ T4575] EXT4-fs warning (device loop1): ext4_enable_quotas:7172: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 63.936085][ T4575] EXT4-fs (loop1): mount failed [ 63.947032][ T4574] loop0: detected capacity change from 0 to 8192 [ 63.982679][ T4590] FAULT_INJECTION: forcing a failure. [ 63.982679][ T4590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 63.996457][ T4590] CPU: 0 UID: 0 PID: 4590 Comm: syz.5.390 Not tainted syzkaller #0 PREEMPT(voluntary) [ 63.996498][ T4590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 63.996514][ T4590] Call Trace: [ 63.996521][ T4590] [ 63.996529][ T4590] __dump_stack+0x1d/0x30 [ 63.996575][ T4590] dump_stack_lvl+0xe8/0x140 [ 63.996597][ T4590] dump_stack+0x15/0x1b [ 63.996615][ T4590] should_fail_ex+0x265/0x280 [ 63.996655][ T4590] should_fail+0xb/0x20 [ 63.996679][ T4590] should_fail_usercopy+0x1a/0x20 [ 63.996776][ T4590] _copy_to_user+0x20/0xa0 [ 63.996903][ T4590] simple_read_from_buffer+0xb5/0x130 [ 63.996935][ T4590] proc_fail_nth_read+0x10e/0x150 [ 63.996975][ T4590] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 63.997018][ T4590] vfs_read+0x1a5/0x770 [ 63.997109][ T4590] ? __rcu_read_unlock+0x4f/0x70 [ 63.997136][ T4590] ? __fget_files+0x184/0x1c0 [ 63.997174][ T4590] ksys_read+0xda/0x1a0 [ 63.997200][ T4590] __x64_sys_read+0x40/0x50 [ 63.997262][ T4590] x64_sys_call+0x27bc/0x2ff0 [ 63.997293][ T4590] do_syscall_64+0xd2/0x200 [ 63.997339][ T4590] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 63.997366][ T4590] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 63.997406][ T4590] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 63.997437][ T4590] RIP: 0033:0x7fa61128d8dc [ 63.997455][ T4590] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 63.997477][ T4590] RSP: 002b:00007fa60fcef030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 63.997512][ T4590] RAX: ffffffffffffffda RBX: 00007fa6114e5fa0 RCX: 00007fa61128d8dc [ 63.997530][ T4590] RDX: 000000000000000f RSI: 00007fa60fcef0a0 RDI: 0000000000000006 [ 63.997548][ T4590] RBP: 00007fa60fcef090 R08: 0000000000000000 R09: 0000000000000000 [ 63.997566][ T4590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 63.997651][ T4590] R13: 00007fa6114e6038 R14: 00007fa6114e5fa0 R15: 00007fffe2788288 [ 63.997730][ T4590] [ 64.015752][ T4574] loop0: detected capacity change from 0 to 128 [ 64.220084][ T4596] loop4: detected capacity change from 0 to 128 [ 64.226672][ T4588] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 64.265130][ T4592] FAULT_INJECTION: forcing a failure. [ 64.265130][ T4592] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 64.278570][ T4592] CPU: 0 UID: 0 PID: 4592 Comm: syz.5.391 Not tainted syzkaller #0 PREEMPT(voluntary) [ 64.278603][ T4592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 64.278619][ T4592] Call Trace: [ 64.278626][ T4592] [ 64.278635][ T4592] __dump_stack+0x1d/0x30 [ 64.278691][ T4592] dump_stack_lvl+0xe8/0x140 [ 64.278765][ T4592] dump_stack+0x15/0x1b [ 64.278859][ T4592] should_fail_ex+0x265/0x280 [ 64.278890][ T4592] should_fail+0xb/0x20 [ 64.278913][ T4592] should_fail_usercopy+0x1a/0x20 [ 64.279024][ T4592] _copy_to_user+0x20/0xa0 [ 64.279141][ T4592] simple_read_from_buffer+0xb5/0x130 [ 64.279166][ T4592] proc_fail_nth_read+0x10e/0x150 [ 64.279236][ T4592] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 64.279265][ T4592] vfs_read+0x1a5/0x770 [ 64.279287][ T4592] ? __rcu_read_unlock+0x4f/0x70 [ 64.279365][ T4592] ? __fget_files+0x184/0x1c0 [ 64.279427][ T4592] ksys_read+0xda/0x1a0 [ 64.279495][ T4592] __x64_sys_read+0x40/0x50 [ 64.279519][ T4592] x64_sys_call+0x27bc/0x2ff0 [ 64.279621][ T4592] do_syscall_64+0xd2/0x200 [ 64.279655][ T4592] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 64.279734][ T4592] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 64.279764][ T4592] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 64.279787][ T4592] RIP: 0033:0x7fa61128d8dc [ 64.279895][ T4592] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 64.279914][ T4592] RSP: 002b:00007fa60fcef030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 64.279935][ T4592] RAX: ffffffffffffffda RBX: 00007fa6114e5fa0 RCX: 00007fa61128d8dc [ 64.279948][ T4592] RDX: 000000000000000f RSI: 00007fa60fcef0a0 RDI: 0000000000000006 [ 64.279961][ T4592] RBP: 00007fa60fcef090 R08: 0000000000000000 R09: 0000000000000000 [ 64.279974][ T4592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 64.279986][ T4592] R13: 00007fa6114e6038 R14: 00007fa6114e5fa0 R15: 00007fffe2788288 [ 64.280007][ T4592] [ 64.589988][ T4615] random: crng reseeded on system resumption [ 64.596584][ T4613] loop0: detected capacity change from 0 to 2048 [ 64.662907][ T4617] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 64.665943][ T4613] Alternate GPT is invalid, using primary GPT. [ 64.681923][ T4613] loop0: p1 p2 p3 [ 64.685684][ T4613] loop0: partition table partially beyond EOD, truncated [ 64.726205][ T4619] SELinux: failed to load policy [ 64.735753][ T4622] netlink: 260 bytes leftover after parsing attributes in process `syz.1.403'. [ 64.805681][ T4626] FAULT_INJECTION: forcing a failure. [ 64.805681][ T4626] name failslab, interval 1, probability 0, space 0, times 0 [ 64.809360][ T4624] SELinux: Context system_u:object_r:systemd_tmpfiles_exec_t:s0 is not valid (left unmapped). [ 64.818874][ T4626] CPU: 1 UID: 0 PID: 4626 Comm: syz.2.407 Not tainted syzkaller #0 PREEMPT(voluntary) [ 64.818967][ T4626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 64.818987][ T4626] Call Trace: [ 64.818997][ T4626] [ 64.819008][ T4626] __dump_stack+0x1d/0x30 [ 64.819039][ T4626] dump_stack_lvl+0xe8/0x140 [ 64.819068][ T4626] dump_stack+0x15/0x1b [ 64.819165][ T4626] should_fail_ex+0x265/0x280 [ 64.819201][ T4626] should_failslab+0x8c/0xb0 [ 64.819238][ T4626] kmem_cache_alloc_noprof+0x50/0x310 [ 64.819312][ T4626] ? audit_log_start+0x365/0x6c0 [ 64.819431][ T4626] audit_log_start+0x365/0x6c0 [ 64.819479][ T4626] audit_seccomp+0x48/0x100 [ 64.819569][ T4626] ? __seccomp_filter+0x68c/0x10d0 [ 64.819653][ T4626] __seccomp_filter+0x69d/0x10d0 [ 64.819687][ T4626] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 64.819727][ T4626] ? vfs_write+0x7e8/0x960 [ 64.819760][ T4626] ? __rcu_read_unlock+0x4f/0x70 [ 64.819799][ T4626] ? __fget_files+0x184/0x1c0 [ 64.819856][ T4626] __secure_computing+0x82/0x150 [ 64.819886][ T4626] syscall_trace_enter+0xcf/0x1e0 [ 64.819922][ T4626] do_syscall_64+0xac/0x200 [ 64.820003][ T4626] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 64.820038][ T4626] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 64.820080][ T4626] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 64.820110][ T4626] RIP: 0033:0x7f7ac1feeec9 [ 64.820210][ T4626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 64.820236][ T4626] RSP: 002b:00007f7ac0a4f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 64.820262][ T4626] RAX: ffffffffffffffda RBX: 00007f7ac2245fa0 RCX: 00007f7ac1feeec9 [ 64.820280][ T4626] RDX: 0000200000000200 RSI: 000000002553a722 RDI: 000000000000001d [ 64.820306][ T4626] RBP: 00007f7ac0a4f090 R08: 0000000000000000 R09: 0000000000000000 [ 64.820323][ T4626] R10: 00002000000002c0 R11: 0000000000000246 R12: 0000000000000001 [ 64.820353][ T4626] R13: 00007f7ac2246038 R14: 00007f7ac2245fa0 R15: 00007fffdd1fd618 [ 64.820473][ T4626] [ 65.055662][ T4624] process 'syz.0.404' launched './file0' with NULL argv: empty string added [ 65.092494][ T4631] Zero length message leads to an empty skb [ 65.109642][ T4622] ªªªªªª: renamed from vlan0 (while UP) [ 65.228111][ T4644] loop0: detected capacity change from 0 to 512 [ 65.243267][ T4644] EXT4-fs: test_dummy_encryption option not supported [ 65.440769][ T4665] SELinux: failed to load policy [ 65.494815][ T4676] loop1: detected capacity change from 0 to 128 [ 65.536984][ T4678] loop0: detected capacity change from 0 to 1024 [ 65.549860][ T4680] loop5: detected capacity change from 0 to 512 [ 65.560759][ T4682] netlink: 260 bytes leftover after parsing attributes in process `syz.2.430'. [ 65.570338][ T4680] EXT4-fs: test_dummy_encryption option not supported [ 65.571154][ T4678] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 65.637309][ T3303] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 65.686726][ T4688] netlink: 260 bytes leftover after parsing attributes in process `syz.5.433'. [ 65.805171][ T4682] ªªªªªª: renamed from vlan0 (while UP) [ 65.834432][ T4696] netlink: 260 bytes leftover after parsing attributes in process `syz.1.434'. [ 65.935542][ T4706] loop5: detected capacity change from 0 to 512 [ 65.945422][ T4706] EXT4-fs: test_dummy_encryption option not supported [ 66.006902][ T4702] SELinux: failed to load policy [ 66.086972][ T4718] loop1: detected capacity change from 0 to 512 [ 66.106002][ T4718] EXT4-fs warning (device loop1): ext4_enable_quotas:7172: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 66.137446][ T4718] EXT4-fs (loop1): mount failed [ 66.293706][ T4727] loop0: detected capacity change from 0 to 128 [ 66.316901][ T4736] random: crng reseeded on system resumption [ 66.398547][ T4740] loop5: detected capacity change from 0 to 512 [ 66.407007][ T4740] EXT4-fs: test_dummy_encryption option not supported [ 66.539304][ T4755] loop0: detected capacity change from 0 to 512 [ 66.566707][ T4755] EXT4-fs warning (device loop0): ext4_enable_quotas:7172: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 66.586102][ T4755] EXT4-fs (loop0): mount failed [ 66.657596][ T4767] random: crng reseeded on system resumption [ 66.675010][ T4762] SELinux: failed to load policy [ 66.754211][ T4769] serio: Serial port ptm0 [ 66.764479][ T4771] loop1: detected capacity change from 0 to 512 [ 66.781977][ T4771] EXT4-fs: test_dummy_encryption option not supported [ 66.864672][ T4776] SELinux: failed to load policy [ 66.926150][ T4777] syz.0.478 uses obsolete (PF_INET,SOCK_PACKET) [ 66.935369][ T4777] lo speed is unknown, defaulting to 1000 [ 66.947693][ T4781] netlink: 260 bytes leftover after parsing attributes in process `syz.2.470'. [ 66.957748][ T4777] lo speed is unknown, defaulting to 1000 [ 66.976649][ T4777] lo speed is unknown, defaulting to 1000 [ 67.002735][ T4777] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 67.037758][ T4777] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 67.066339][ T4787] syzkaller1: entered promiscuous mode [ 67.072184][ T4787] syzkaller1: entered allmulticast mode [ 67.112483][ T4787] netlink: 24 bytes leftover after parsing attributes in process `syz.0.478'. [ 67.216551][ T4777] lo speed is unknown, defaulting to 1000 [ 67.225394][ T4800] loop4: detected capacity change from 0 to 512 [ 67.246623][ T4782] netlink: 4 bytes leftover after parsing attributes in process `syz.0.478'. [ 67.274663][ T4777] lo speed is unknown, defaulting to 1000 [ 67.282241][ T4800] EXT4-fs warning (device loop4): ext4_enable_quotas:7172: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 67.307362][ T4777] lo speed is unknown, defaulting to 1000 [ 67.313755][ T4777] lo speed is unknown, defaulting to 1000 [ 67.322899][ T4800] EXT4-fs (loop4): mount failed [ 67.328310][ T4777] lo speed is unknown, defaulting to 1000 [ 67.348108][ T4807] loop2: detected capacity change from 0 to 512 [ 67.379969][ T4807] EXT4-fs: test_dummy_encryption option not supported [ 67.463318][ T4818] random: crng reseeded on system resumption [ 67.529497][ T4819] SELinux: failed to load policy [ 67.558929][ T4823] SELinux: policydb magic number 0x1 does not match expected magic number 0xf97cff8c [ 67.586691][ T4823] SELinux: failed to load policy [ 67.709349][ T4837] loop4: detected capacity change from 0 to 512 [ 67.742419][ T4840] netlink: 260 bytes leftover after parsing attributes in process `syz.2.493'. [ 67.755701][ T4837] EXT4-fs warning (device loop4): ext4_enable_quotas:7172: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 67.800168][ T4837] EXT4-fs (loop4): mount failed [ 67.824037][ T4829] netlink: 4 bytes leftover after parsing attributes in process `syz.0.489'. [ 67.857780][ T4844] loop2: detected capacity change from 0 to 512 [ 67.869559][ T4844] pim6reg: entered allmulticast mode [ 67.876376][ T4844] pim6reg: left allmulticast mode [ 67.944590][ T4851] serio: Serial port ptm0 [ 67.957242][ T4847] siw: device registration error -23 [ 67.974402][ T4844] syz.2.494 (4844) used greatest stack depth: 10608 bytes left [ 67.986291][ T4854] random: crng reseeded on system resumption [ 68.086449][ T29] kauditd_printk_skb: 278 callbacks suppressed [ 68.086465][ T29] audit: type=1400 audit(1758997395.937:1541): avc: denied { create } for pid=4862 comm="syz.2.502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 68.147221][ T29] audit: type=1400 audit(1758997395.967:1542): avc: denied { connect } for pid=4862 comm="syz.2.502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 68.167138][ T29] audit: type=1400 audit(1758997395.967:1543): avc: denied { ioctl } for pid=4862 comm="syz.2.502" path="socket:[8975]" dev="sockfs" ino=8975 ioctlcmd=0x745a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 68.201003][ T29] audit: type=1400 audit(1758997396.047:1544): avc: denied { accept } for pid=4862 comm="syz.2.502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 68.246294][ T4847] syzkaller1: entered promiscuous mode [ 68.252168][ T4847] syzkaller1: entered allmulticast mode [ 68.284250][ T4847] netlink: 24 bytes leftover after parsing attributes in process `syz.4.495'. [ 68.367334][ T4864] netlink: 4 bytes leftover after parsing attributes in process `syz.4.495'. [ 68.431468][ T4873] SELinux: failed to load policy [ 68.447751][ T4876] SELinux: policydb magic number 0x1 does not match expected magic number 0xf97cff8c [ 68.467631][ T4876] SELinux: failed to load policy [ 68.620736][ T29] audit: type=1326 audit(1758997396.467:1545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a7ee0eec9 code=0x7ffc0000 [ 68.622935][ T4898] random: crng reseeded on system resumption [ 68.644697][ T29] audit: type=1326 audit(1758997396.467:1546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a7ee0eec9 code=0x7ffc0000 [ 68.693934][ T29] audit: type=1326 audit(1758997396.527:1547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5a7ee0eec9 code=0x7ffc0000 [ 68.717963][ T29] audit: type=1326 audit(1758997396.527:1548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a7ee0eec9 code=0x7ffc0000 [ 68.742369][ T29] audit: type=1326 audit(1758997396.527:1549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5a7ee0eec9 code=0x7ffc0000 [ 68.766203][ T29] audit: type=1326 audit(1758997396.527:1550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5a7ee0eec9 code=0x7ffc0000 [ 68.841041][ T4907] loop0: detected capacity change from 0 to 512 [ 68.847934][ T4907] EXT4-fs: test_dummy_encryption option not supported [ 68.889326][ T4912] loop4: detected capacity change from 0 to 512 [ 68.896146][ T4912] EXT4-fs: test_dummy_encryption option not supported [ 68.919052][ T4914] netlink: 260 bytes leftover after parsing attributes in process `syz.5.514'. [ 68.968501][ T4918] netlink: 260 bytes leftover after parsing attributes in process `syz.4.516'. [ 69.114631][ T4921] siw: device registration error -23 [ 69.175928][ T4929] syzkaller1: entered promiscuous mode [ 69.181502][ T4929] syzkaller1: entered allmulticast mode [ 69.195918][ T4929] netlink: 24 bytes leftover after parsing attributes in process `syz.2.517'. [ 69.253159][ T4926] SELinux: failed to load policy [ 69.259631][ T4931] loop4: detected capacity change from 0 to 1764 [ 69.278550][ T4931] FAULT_INJECTION: forcing a failure. [ 69.278550][ T4931] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 69.292153][ T4931] CPU: 0 UID: 0 PID: 4931 Comm: syz.4.519 Not tainted syzkaller #0 PREEMPT(voluntary) [ 69.292196][ T4931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 69.292213][ T4931] Call Trace: [ 69.292222][ T4931] [ 69.292248][ T4931] __dump_stack+0x1d/0x30 [ 69.292275][ T4931] dump_stack_lvl+0xe8/0x140 [ 69.292320][ T4931] dump_stack+0x15/0x1b [ 69.292386][ T4931] should_fail_ex+0x265/0x280 [ 69.292418][ T4931] should_fail+0xb/0x20 [ 69.292439][ T4931] should_fail_usercopy+0x1a/0x20 [ 69.292501][ T4931] _copy_from_user+0x1c/0xb0 [ 69.292540][ T4931] memdup_user+0x5e/0xd0 [ 69.292572][ T4931] autofs_dev_ioctl+0x167/0x6a0 [ 69.292686][ T4931] ? __pfx_autofs_dev_ioctl+0x10/0x10 [ 69.292737][ T4931] __se_sys_ioctl+0xce/0x140 [ 69.292764][ T4931] __x64_sys_ioctl+0x43/0x50 [ 69.292864][ T4931] x64_sys_call+0x1816/0x2ff0 [ 69.292886][ T4931] do_syscall_64+0xd2/0x200 [ 69.292921][ T4931] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 69.292953][ T4931] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 69.293011][ T4931] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.293040][ T4931] RIP: 0033:0x7f0a4879eec9 [ 69.293057][ T4931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.293079][ T4931] RSP: 002b:00007f0a47207038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 69.293142][ T4931] RAX: ffffffffffffffda RBX: 00007f0a489f5fa0 RCX: 00007f0a4879eec9 [ 69.293155][ T4931] RDX: 0000200000000200 RSI: 00000000c018937e RDI: 0000000000000007 [ 69.293182][ T4931] RBP: 00007f0a47207090 R08: 0000000000000000 R09: 0000000000000000 [ 69.293202][ T4931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.293218][ T4931] R13: 00007f0a489f6038 R14: 00007f0a489f5fa0 R15: 00007ffe6935c388 [ 69.293243][ T4931] [ 69.566535][ T4929] syz.2.517 (4929) used greatest stack depth: 10400 bytes left [ 69.599179][ T4944] loop1: detected capacity change from 0 to 512 [ 69.599188][ T4946] loop4: detected capacity change from 0 to 512 [ 69.614474][ T4946] EXT4-fs: test_dummy_encryption option not supported [ 69.629819][ T4949] loop5: detected capacity change from 0 to 512 [ 69.646307][ T4949] EXT4-fs: test_dummy_encryption option not supported [ 69.656376][ T4944] EXT4-fs warning (device loop1): ext4_enable_quotas:7172: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 69.675728][ T4944] EXT4-fs (loop1): mount failed [ 69.691267][ T4956] ================================================================== [ 69.699422][ T4956] BUG: KCSAN: data-race in selinux_inode_permission / selinux_inode_permission [ 69.699483][ T4956] [ 69.699489][ T4956] read to 0xffff8881020dfd20 of 4 bytes by task 4957 on cpu 0: [ 69.699506][ T4956] selinux_inode_permission+0x334/0x740 [ 69.699541][ T4956] security_inode_permission+0x6d/0xb0 [ 69.699573][ T4956] inode_permission+0x106/0x310 [ 69.699602][ T4956] link_path_walk+0x162/0x900 [ 69.699629][ T4956] path_openat+0x1de/0x2170 [ 69.699646][ T4956] do_filp_open+0x109/0x230 [ 69.699664][ T4956] do_sys_openat2+0xa6/0x110 [ 69.699698][ T4956] __x64_sys_openat+0xf2/0x120 [ 69.699730][ T4956] x64_sys_call+0x2e9c/0x2ff0 [ 69.699752][ T4956] do_syscall_64+0xd2/0x200 [ 69.699784][ T4956] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.699805][ T4956] [ 69.699810][ T4956] write to 0xffff8881020dfd20 of 4 bytes by task 4956 on cpu 1: [ 69.699826][ T4956] selinux_inode_permission+0x3ac/0x740 [ 69.699862][ T4956] security_inode_permission+0x6d/0xb0 [ 69.699893][ T4956] inode_permission+0x106/0x310 [ 69.699922][ T4956] link_path_walk+0x162/0x900 [ 69.699948][ T4956] path_openat+0x1de/0x2170 [ 69.699965][ T4956] do_filp_open+0x109/0x230 [ 69.699983][ T4956] do_sys_openat2+0xa6/0x110 [ 69.700015][ T4956] __x64_sys_openat+0xf2/0x120 [ 69.700047][ T4956] x64_sys_call+0x2e9c/0x2ff0 [ 69.700069][ T4956] do_syscall_64+0xd2/0x200 [ 69.700109][ T4956] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.700130][ T4956] [ 69.700134][ T4956] value changed: 0x00000002 -> 0x00000003 [ 69.700145][ T4956] [ 69.700148][ T4956] Reported by Kernel Concurrency Sanitizer on: [ 69.700159][ T4956] CPU: 1 UID: 0 PID: 4956 Comm: syz.4.528 Not tainted syzkaller #0 PREEMPT(voluntary) [ 69.700185][ T4956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 69.700198][ T4956] ================================================================== [ 69.717073][ T4959] FAULT_INJECTION: forcing a failure. [ 69.717073][ T4959] name failslab, interval 1, probability 0, space 0, times 0 [ 69.904293][ T4959] CPU: 1 UID: 0 PID: 4959 Comm: syz.5.529 Not tainted syzkaller #0 PREEMPT(voluntary) [ 69.904325][ T4959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 69.904340][ T4959] Call Trace: [ 69.904349][ T4959] [ 69.904359][ T4959] __dump_stack+0x1d/0x30 [ 69.904458][ T4959] dump_stack_lvl+0xe8/0x140 [ 69.904483][ T4959] dump_stack+0x15/0x1b [ 69.904504][ T4959] should_fail_ex+0x265/0x280 [ 69.904584][ T4959] ? get_mountpoint+0x17e/0x370 [ 69.904615][ T4959] should_failslab+0x8c/0xb0 [ 69.904671][ T4959] __kmalloc_cache_noprof+0x4c/0x320 [ 69.904718][ T4959] get_mountpoint+0x17e/0x370 [ 69.904750][ T4959] do_lock_mount+0x1e4/0x380 [ 69.904871][ T4959] do_loopback+0x17c/0x2a0 [ 69.904913][ T4959] path_mount+0x3dc/0xb20 [ 69.904945][ T4959] ? user_path_at+0x109/0x130 [ 69.904993][ T4959] __se_sys_mount+0x28f/0x2e0 [ 69.905094][ T4959] ? fput+0x8f/0xc0 [ 69.905233][ T4959] __x64_sys_mount+0x67/0x80 [ 69.905267][ T4959] x64_sys_call+0x2b4d/0x2ff0 [ 69.905298][ T4959] do_syscall_64+0xd2/0x200 [ 69.905342][ T4959] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 69.905446][ T4959] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 69.905488][ T4959] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.905519][ T4959] RIP: 0033:0x7fa61128eec9 [ 69.905539][ T4959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.905641][ T4959] RSP: 002b:00007fa60fcef038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 69.905669][ T4959] RAX: ffffffffffffffda RBX: 00007fa6114e5fa0 RCX: 00007fa61128eec9 [ 69.905687][ T4959] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 00002000000002c0 [ 69.905705][ T4959] RBP: 00007fa60fcef090 R08: 0000000000000000 R09: 0000000000000000 [ 69.905723][ T4959] R10: 0000000000101091 R11: 0000000000000246 R12: 0000000000000001 [ 69.905741][ T4959] R13: 00007fa6114e6038 R14: 00007fa6114e5fa0 R15: 00007fffe2788288 [ 69.905771][ T4959]