last executing test programs: 2.503746761s ago: executing program 3 (id=229): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=ANY=[@ANYBLOB="0b000000ffffffff010000004d5135d955e60e8c34cdc4a3bf713febe539407025d2cad0769c5531821805a313ec2d24de", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0xfc46) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000e80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000d1ad45549c6de04ae00c58c6686a49120385a7b8e8ee88bd348e718d2e5cb507c03300abc2a70ad82f67907bfd24381bd8162f47ee14433d268aca15f55a503e98165ef066cb933b7cd59703a35182d3d68cc713d648447a7c5fe36401a5bf6056733875c114c4003cae4375d5e90630fc5f99ac77deb375b8b735d9236aea76d9a118194b89fe3978637e3c6ba1ac6b11233f8454355cd4a65f5b478591ae4e5483136cb7cfa84d285f8209", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000a80)={0x0, r1}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) syz_open_dev$evdev(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000001800010800000000000000850a600000000000000500000014000500200100000000000000000300000000001c00090008000000", @ANYRES32=r3], 0x4c}}, 0x0) socket$netlink(0x10, 0x3, 0xc) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\b\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000ffff00000000000000002486a2168f82999ae9d01a60a4f6e168ce4b23ba0c5895921dd5d7916da0a0b915d3dc5afecc317a2cfb91b6a53c5a99ab037f500e9dd606fb9455ee461e5f688868a6283aace42d"], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r4, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0], 0x0, 0x13, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000740), &(0x7f0000000800), 0x8, 0xba, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b40)={&(0x7f00000009c0)=ANY=[@ANYBLOB="9feb010018000000000000009f0000009f000000060000000f0000000800000f030000000100000004000000b8380000030000005d13000040000000010000000300000005000000040000000104000008000000051000000700000004000000020000000400000005000000050000000c0000000900000004000000000800000004000072dc000c00000000000002010000000f00000001000085090000000f000000010000000000000001000000000000101000000000005f30302e00"], &(0x7f0000000ac0)=""/96, 0xbe, 0x60, 0x0, 0x3e83, 0x10000, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0xd, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="85200000200000040000007594c0ff0800008396001811", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000b60d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000075628000040000002778020004000000"], &(0x7f0000000280)='GPL\x00', 0xa, 0x5f, &(0x7f0000000340)=""/95, 0x41100, 0x8, '\x00', r6, @fallback=0x8, r7, 0x8, &(0x7f0000000b80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000bc0)={0x4, 0x4, 0x9, 0x6}, 0x10, 0x0, r4, 0x0, &(0x7f0000000c00)=[r5, 0xffffffffffffffff, r5], 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) unshare(0x4000400) r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r11, 0x2405, r10) sendmsg$tipc(r9, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) 2.070113852s ago: executing program 2 (id=232): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) r2 = open(0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r2, 0x2e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000061"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa80a010100000004"], 0x57) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) utimes(&(0x7f00000001c0)='./file0\x00', 0x0) writev(r4, &(0x7f0000000780)=[{&(0x7f0000000380)="390000001300034700bb65e1c3e4ffff010000000100000056000000250000001900040004e0144000000007fd17e5ffff0800040000000000", 0x39}], 0x1) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1) 1.542240243s ago: executing program 3 (id=242): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000200)={0x1f, 0x0, @none, 0x0, 0x1}, 0xe) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r5, 0x0, r4, 0x0, 0x10000008ebc, 0x0) splice(r3, 0x0, r6, 0x0, 0x25a5, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) eventfd(0x1000) listen(r0, 0x0) r7 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r0, &(0x7f0000000040)={0x10000000}) 1.423750664s ago: executing program 3 (id=243): r0 = socket$inet_tcp(0x2, 0x1, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_REMOVE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="0100000000000000000004000000", @ANYBLOB="00000001", @ANYRES16=r3], 0x14}, 0x1, 0xfcffffff00000000, 0x0, 0x9}, 0x20004804) symlinkat(&(0x7f0000000400)='./file0/../file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00') r4 = open(&(0x7f0000000180)='./bus\x00', 0x1492fe, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x8, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0xe6, 0x0, 0x0, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x2, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000400)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x63db, 0x6, 0x0, 0x0, 0x0, 0x0, 0x80}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x0) madvise(&(0x7f00006e8000/0x1000)=nil, 0x1000, 0xc210cad8131eb928) r7 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$selinux_access(r7, &(0x7f0000000240)=ANY=[@ANYRES64=r5, @ANYRESDEC=0x0, @ANYRES32=r2], 0x44) newfstatat(0xffffffffffffff9c, &(0x7f00000005c0)='./bus\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000680)={{0x1, 0x1, 0x18, r7, {0x0, 0xee01}}, './file0/../file0\x00'}) lchown(&(0x7f0000000480)='./bus\x00', r8, r9) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000900)=@mangle={'mangle\x00', 0x44, 0x6, 0x510, 0x0, 0x138, 0x210, 0x0, 0x138, 0x478, 0x478, 0x478, 0x478, 0x478, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x0, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @multicast2, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x570) 1.309201825s ago: executing program 4 (id=245): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000007040)={0x0, 0x0, &(0x7f0000007000)={&(0x7f0000003d00)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x2}}, [@NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x801, 0x0, 0x0, {0xa}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0x28, 0x0, 0xa, 0x3, 0x0, 0x0, {0xa}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x78}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') r2 = epoll_create1(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x13, 0xa, 0x401, 0x0, 0x0, {0x3, 0x0, 0x5}}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x40040c0) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f0000000080)=0x13) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000000)) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, &(0x7f00000006c0)=0xa) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NFC_CMD_GET_TARGET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r6, 0x1}, 0x14}}, 0x40894) syz_genetlink_get_family_id$nfc(&(0x7f0000000000), 0xffffffffffffffff) open(0x0, 0x343000, 0x12) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'hsr0\x00', 0x0}) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r10, 0x0, 0xca, &(0x7f00000000c0)={0x0, 0x8, 0x1, 0xfffffffa, @vifc_lcl_ifindex=r9, @local}, 0x10) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@dellink={0x20, 0x11, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) r11 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r11, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x43}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) mount_setattr(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000540)={0x2, 0x80}, 0x20) 1.198871775s ago: executing program 2 (id=247): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff01"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000040)=ANY=[], 0x53) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x5, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 1.197910886s ago: executing program 3 (id=248): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a5000000080000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='signal_generate\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) utimes(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_LINK_CREATE(0xa, &(0x7f0000000340)={r4, 0xffffffffffffffff, 0x24, 0x7, @val=@kprobe_multi=@addrs={0x0, 0x0, 0x0, 0x0}}, 0x30) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r6, &(0x7f0000000700)="5b04bae386a2176466df004253d901606b646524a33849c66ddeaff6dc1a5a391c45d0e8970535fec7f37b0e09890c5e005612066c795449fe2eee637e4443189f9e4af6bb4f8e7cba2d11f784d5b70300c6a1708fe0987fee7ece6f841793078800e9bfd6e2d6861a22bda4a0f7f29d34703f1d64f30917e77d", 0x7a, 0x20000815, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) socket$l2tp6(0xa, 0x2, 0x73) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x38, 0x1403, 0x1, 0x70bd2a, 0x25dfdbfe, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'bond0\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x20000000) ioctl$TUNSETIFF(r8, 0x400454ca, 0x0) socket$netlink(0x10, 0x3, 0x14) 1.160420589s ago: executing program 2 (id=249): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) open(&(0x7f0000000000)='./file0\x00', 0x84ff, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fcntl$lock(r3, 0x25, &(0x7f0000000080)) fcntl$setlease(r2, 0x400, 0x0) dup3(r3, r2, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000740), 0x75, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="060000000400005189ceb5d898a0fcbee007000f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r6, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], 0x0, 0x16, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x50, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x10, 0x17, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_val={0x18, 0x3, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xfffffff1}]}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x48, &(0x7f00000003c0)=""/72, 0x41000, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0xd, 0x10, 0x5}, 0x10, r7, r4, 0x1, &(0x7f00000005c0)=[r1], &(0x7f0000000600)=[{0x1, 0x5, 0x7, 0x7}], 0x10, 0x5c6, @void, @value}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.115259484s ago: executing program 4 (id=250): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xf0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x50) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000280)=@urb_type_control={0x2, {}, 0x4, 0x40, 0x0, 0x0, 0x20400000, 0xc, 0x0, 0x0, 0x20000, 0x0}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x11, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0xb6}}, @call={0x85, 0x0, 0x0, 0xd0}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x10, &(0x7f00000006c0)="0000000005000000", &(0x7f0000000700)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, r0, 0x4000, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, 0x0, 0x48) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) iopl(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000200)={0x1, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r7, 0x0, 0x8}, 0xc) r8 = openat$rtc(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r8, 0x7005, 0x0) readv(r8, &(0x7f0000000000)=[{&(0x7f0000000140)=""/186, 0xba}, {0x0}], 0x2) futex(&(0x7f0000000040), 0x5, 0x1, &(0x7f0000000300)={0x0, 0x3938700}, &(0x7f0000000500)=0x2, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000bc0)={0x2c, r10, 0x1, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}]}, 0x2c}}, 0x80c0) setregid(0xffffffffffffffff, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0xc00040, 0x24, 0x35}, 0x18) 1.067857078s ago: executing program 2 (id=252): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) r2 = open(0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r2, 0x2e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000061"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa80a010100000004"], 0x57) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) utimes(&(0x7f00000001c0)='./file0\x00', 0x0) writev(r4, &(0x7f0000000780)=[{&(0x7f0000000380)="390000001300034700bb65e1c3e4ffff010000000100000056000000250000001900040004e0144000000007fd17e5ffff0800040000000000", 0x39}], 0x1) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1) 994.814635ms ago: executing program 3 (id=255): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b0000000700000001000100090000", @ANYRES32], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0xb54, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) sync() 921.372292ms ago: executing program 1 (id=256): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) arch_prctl$ARCH_GET_XCOMP_SUPP(0x1021, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x101a43, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000080)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [], 0x6b}}) 912.343493ms ago: executing program 4 (id=257): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000cc0)=@newtclass={0x2c, 0x28, 0xf0b0b083df42be0, 0x8000000, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xf}, {0x0, 0xc}}, [@TCA_RATE={0x6, 0x5, {0xd3, 0xfe}}]}, 0x2c}}, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}}}, 0x30) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0x7c8) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x5, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfd', @ANYRESHEX=r2]) 879.550536ms ago: executing program 1 (id=258): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@ipv6_newnexthop={0x3c, 0x68, 0x1, 0x0, 0x25dfdbfd, {0x2}, [@NHA_ENCAP_TYPE={0x6, 0x7, 0x4}, @NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWTUNNEL_IP6_HOPLIMIT={0x5, 0x4, 0x1}}, @NHA_ID={0x8, 0x6, 0xf2}, @NHA_OIF={0x8, 0x5, r5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4402}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r8}, 0x10) syz_io_uring_setup(0x66e, &(0x7f0000000240)={0x0, 0x0, 0x10100}, &(0x7f0000000380)=0x0, &(0x7f0000000200)=0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/4, 0x4}], 0x27}) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x600}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}, 0x1, 0x2}, 0x0) 866.060628ms ago: executing program 4 (id=259): r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4001, 0x8000000, 0x238, 0xf8, 0x720d, 0x148, 0xf8, 0x148, 0x1c8, 0x240, 0x240, 0x1c8, 0x240, 0x7fffffe, 0x0, {[{{@ip={@remote, @empty, 0x0, 0x0, 'wlan1\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) sendto$inet(r0, 0x0, 0x0, 0x24000080, 0x0, 0x0) accept$inet(r0, 0x0, 0x0) 838.86709ms ago: executing program 1 (id=261): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000080)=""/40, 0x28, 0x0, &(0x7f0000000200)=""/3, 0x3}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES32=r0], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) inotify_rm_watch(0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0xffffffffffffffff}, 0x13) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000480), 0xc, 0x141341) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x26c6c8d71ade5370}, 0x0) lsm_get_self_attr(0x67, &(0x7f0000001500)={0x0, 0x0, 0x1020, 0x1000, ""/4096}, &(0x7f0000000080)=0x1020, 0x0) 699.569894ms ago: executing program 1 (id=264): r0 = socket(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRESOCT=r0, @ANYBLOB="00000000000000000000000000000000000000000000040000000000976abc947fee2e3960f4d6c3b82717934f0d15a0bbd767bafcfc8bbb4119058749c7065189adb85b7e9229344568a34866fc348df388a099f6f9d94ebb8c3eb90099c6bf8527dfe86c891c654a8305e3f4db056634109f1c4405249491a9f903aab2e34074868ddfbae694e1fe"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r2}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32], 0x48}}, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) fcntl$setflags(r2, 0x2, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @generic={0x66}, @initr0, @exit, @printk={@x={0x18, 0x9}}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$nl_xfrm(0x10, 0x3, 0x6) pwrite64(0xffffffffffffffff, &(0x7f0000000080)='2', 0xfffffffffffffea7, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write(r0, &(0x7f0000000000)="2000000011005f0414f9f40700090400810000003c0000000000000008000f00", 0x20) 637.067099ms ago: executing program 0 (id=265): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYRES8=0x0], 0x1, 0x217, &(0x7f00000004c0)="$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") io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x4000, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x5}]) r0 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c}}, 0x800) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c4600f60f000000000000000000030006000000000000000000380000000000000000191bda0000200001000000000280000000000003"], 0x69) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000140)={&(0x7f0000000040)={0x1, 0x922, 0x0, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "5c91440132bb112240fcbcc3fa9d0431575f8614d3538ce09c50eecd6ac579e8e83b944b666113f3afed71231e6653a13532f17b33515bdd7e1be14f53b9fc9b"}}, 0x80}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f0000000140)={[{@jqfmt_vfsold}, {@resgid={'resgid', 0x3d, 0xee00}}, {@bh}, {@noload}, {@data_err_ignore}, {@usrjquota}]}, 0xfe, 0x444, &(0x7f0000000980)="$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") r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r4, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@cswp={0x58, 0x114, 0x7, {{0x0, 0x1000}, &(0x7f0000000180)=0xd, 0x0, 0x3, 0x7fffffffffffffff, 0x3, 0x8000, 0x5e, 0x9}}, @cswp={0x58, 0x114, 0x7, {{0x10, 0x3}, 0x0, 0x0, 0x8, 0xe1d7, 0xd, 0x80000001, 0x17, 0x8}}], 0xb0, 0x800}, 0x0) ioctl$USBDEVFS_ALLOW_SUSPEND(0xffffffffffffffff, 0x5522) 594.796183ms ago: executing program 1 (id=266): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000040)=ANY=[], 0x53) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x5, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRESHEX=r2]) 525.51357ms ago: executing program 0 (id=267): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x25, &(0x7f0000000280)={&(0x7f0000000cc0)=@newtclass={0x3c, 0x28, 0xf0b0b083df42be0, 0x8000000, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xf}, {0x0, 0xc}}, [@TCA_RATE={0x0, 0x5, {0xd3, 0xfe}}, @tclass_kind_options=@c_skbprio]}, 0x3c}}, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2}}}, 0x30) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0x7c8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x5, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f00000006c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@nombcache}, {@noload}]}, 0x3, 0x440, &(0x7f0000000280)="$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") syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000240)='./file0\x00', 0x0, &(0x7f00000000c0), 0x0, 0x665, &(0x7f0000000600)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.dequeue\x00', 0x275a, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0x80, 0x0, 0x2, 0x100, 0xa6a, 0x4, 0x3, 0x0, 0x7}}}}]}, 0x58}}, 0x0) 516.884771ms ago: executing program 1 (id=268): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) set_mempolicy_home_node(&(0x7f0000349000/0xa000)=nil, 0xa000, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000081d000000000000000000005218000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) fsmount(0xffffffffffffffff, 0x0, 0xf) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f00000006c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x25, '\x00', 0x0, @fallback=0x35, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000202070250000000000209c207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000710000009500"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r5 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) readv(r5, &(0x7f0000000700)=[{&(0x7f0000000580)=""/52, 0x34}], 0x1) 432.328129ms ago: executing program 4 (id=269): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYRES8=0x0], 0x1, 0x217, &(0x7f00000004c0)="$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") io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x4000, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x5}]) r0 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c}}, 0x800) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c4600f60f000000000000000000030006000000000000000000380000000000000000191bda0000200001000000000280000000000003"], 0x69) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000140)={&(0x7f0000000040)={0x1, 0x922, 0x0, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "5c91440132bb112240fcbcc3fa9d0431575f8614d3538ce09c50eecd6ac579e8e83b944b666113f3afed71231e6653a13532f17b33515bdd7e1be14f53b9fc9b"}}, 0x80}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f0000000140)={[{@jqfmt_vfsold}, {@resgid={'resgid', 0x3d, 0xee00}}, {@bh}, {@noload}, {@data_err_ignore}, {@usrjquota}]}, 0xfe, 0x444, &(0x7f0000000980)="$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") r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x206, 0x8401) ioctl$USBDEVFS_ALLOW_SUSPEND(r5, 0x5522) 333.066168ms ago: executing program 0 (id=270): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = syz_create_resource$binfmt(&(0x7f00000015c0)='./file0\x00') openat$binfmt(0xffffffffffffff9c, r1, 0x41, 0x1ff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000002200), 0x0) (fail_nth: 1) 313.08664ms ago: executing program 4 (id=271): socket(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x8) futex(&(0x7f000000cffc)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0xfffffffd, 0x5, 0x2, 0x0, &(0x7f0000000040), 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800"/20, @ANYRES32=r1, @ANYRES8=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, &(0x7f00000001c0)="a6", 0x1, 0x0) inotify_init() prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39ddd8) write$binfmt_elf32(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="5402"], 0x69) close(r3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c0000005e000100"/20, @ANYRES32=r5, @ANYBLOB='i'], 0x1c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002eb0e00000000000000000105000600200000000a00000040010000000500e50000070000001f00001a000000030000a95a6e870200010000e9ff070040000200000000050005000000cc580a"], 0x80}}, 0x448d5) sendmmsg(r2, &(0x7f0000000180), 0x400008a, 0x0) 202.197661ms ago: executing program 2 (id=272): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f00000001c0)='./cgroup/../file0\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) socket$packet(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYRES64, @ANYBLOB="a1af77c62d765063fe6a34b2c43e2918d42e9a6b3e2a49be6099190f23bcf39352621fe547842c14e5fcae8f1b", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r3, &(0x7f0000000180)=')', 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x40, @remote, 0x3}, 0x1c) 52.748325ms ago: executing program 0 (id=273): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000c80)={'lo\x00'}) sendmsg$nl_route_sched(r2, &(0x7f0000001200)={0x0, 0x0, 0x0}, 0x0) 51.983165ms ago: executing program 2 (id=274): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000080)=""/40, 0x28, 0x0, &(0x7f0000000200)=""/3, 0x3}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES32=r0], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) inotify_rm_watch(0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0xffffffffffffffff}, 0x13) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000480), 0xc, 0x141341) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x26c6c8d71ade5370}, 0x0) lsm_get_self_attr(0x67, &(0x7f0000001500)={0x0, 0x0, 0x1020, 0x1000, ""/4096}, &(0x7f0000000080)=0x1020, 0x0) 19.408189ms ago: executing program 0 (id=275): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) open(&(0x7f0000000000)='./file0\x00', 0x84ff, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fcntl$lock(r3, 0x25, &(0x7f0000000080)) fcntl$setlease(r2, 0x400, 0x0) dup3(r3, r2, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000740), 0x75, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="060000000400005189ceb5d898a0fcbee007000f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r5, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f00000004c0)=[0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], 0x0, 0x16, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x50, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x10, 0x17, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_val={0x18, 0x3, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xfffffff1}]}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x48, &(0x7f00000003c0)=""/72, 0x41000, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0xd, 0x10, 0x5}, 0x10, r6, 0xffffffffffffffff, 0x1, &(0x7f00000005c0)=[r1], &(0x7f0000000600)=[{0x1, 0x5, 0x7, 0x7}], 0x10, 0x5c6, @void, @value}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 18.735549ms ago: executing program 3 (id=276): keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000440)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x8, 0x0, r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000840)={&(0x7f0000000400)=@nameseq={0x1e, 0x1, 0x1, {0x0, 0x2, 0x3}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000680)="eae68434648ed22acd0f0e806336b5cc625e347a7e42f311321962c3e2ec408258ba203dbdb1caf0242e4c2a98ebc892ffbf68f92b1d12edcc4c8a6568ca75792b502b91a2ebe76c9ff9", 0x4a}, {&(0x7f0000000740)="47077ee137f3e4c2fc26fe4ede7d02bb7f262b805730c194cdfa52aeee346cdd60615c10df0ce2a97fada3aed800ead2ec149f034f60bead5bcedf7fbeb50dacb14bb7f6386809f6e27e14b1b2625a121ab14b5e5dd7ac1febcdd43dc8ab0f1bc19e5e9ce90dd0db82402da3135a1766df534f83c6e347f508357c211c2f6db33dc1cd8283d3bf188ae7af9a63840bb45e2de8a9f130a7ade547a8829b3a9aa442dfb72d0bffe66aba1f1a8fd785904aa98c51997ff7c2170251eaa7618415f4333884087289bdb2a12e9c9df4bce8c693204bd8e243a29bbf33d92bbe3305de888f", 0xe2}], 0x2, 0x0, 0x0, 0x4008000}, 0x805) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0104000000000000", @ANYBLOB, @ANYRESDEC], 0x50}, 0x1, 0x0, 0x0, 0x840}, 0x812) sendmsg$NFT_BATCH(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001000009006000000000000000000000a3c000000090a050600000000000000000100000008000a40000000000900020073797a31000000000900010073797a3000000000080005400000001414000000110001"], 0x64}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000400)={0x1, &(0x7f0000000900)=[{0x8, 0x4, 0x1, 0x4}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0xa, 0x5, 0x7, 0xc1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r4}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r4, &(0x7f0000000340), &(0x7f00000004c0)=""/192}, 0x20) keyctl$search(0xa, r0, &(0x7f0000000880)='ceph\x00', &(0x7f00000008c0)={'syz', 0x3}, r0) sendmsg$NFT_BATCH(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000009006000000000000000000000a4f000000090a010400000000000000100100000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000014"], 0x64}}, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000100)) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5, 0x0, 0x3}, 0x18) socket(0x9, 0x1, 0x80000000) syz_emit_ethernet(0xfffffffffffffef8, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r6, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="7c000000030103000018aa00ffbf000000000000050000011c0016400000040000000005000000040000000a0000f4c8000000091c00198008000100010000000800020080000000080002000008000028000d8024000380060001004e200000060e02004e220000060002004e210000060001004e2000000800154000000004"], 0x7c}, 0x1, 0x0, 0x0, 0x40040}, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x804810, &(0x7f0000000380)={[{@mblk_io_submit}]}, 0x0, 0x62e, &(0x7f0000001ac0)="$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") open_tree(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x1901) 0s ago: executing program 0 (id=277): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) fadvise64(r1, 0x80, 0x2, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0, 0x0, 0xfffffffffffffffb}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="050000000700000000000000ed1bc829d4d6de0000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="000000000087fb00b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='sys_enter\x00', r4}, 0x18) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioprio_set$pid(0x1, 0xffffffffffffffff, 0x2000) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="28000000020605000000000000000000000000000500040000e6ffff0800020073797a3100000000"], 0x28}}, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$kcm(r6, 0x0, 0x0) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r7) ptrace$getregset(0x4205, r7, 0x202, &(0x7f0000000240)={&(0x7f0000000180)=""/120, 0xffffffffffffff28}) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) r9 = epoll_create1(0x0) epoll_wait(r9, &(0x7f000000affb)=[{}], 0x1, 0x8001) epoll_pwait(r9, &(0x7f0000000100)=[{}], 0x1, 0x100, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r9, 0x1, r8, &(0x7f0000000040)={0x20000007}) write(r6, &(0x7f0000000000)="2400000011005f0414f9f40700090400810000000d0000000000000008000f0001000000", 0x24) kernel console output (not intermixed with test programs): [ 20.556137][ T29] audit: type=1400 audit(1730697053.230:81): avc: denied { read } for pid=2999 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.1.79' (ED25519) to the list of known hosts. [ 26.661559][ T29] audit: type=1400 audit(1730697059.330:82): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.662709][ T3303] cgroup: Unknown subsys name 'net' [ 26.684336][ T29] audit: type=1400 audit(1730697059.330:83): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.711758][ T29] audit: type=1400 audit(1730697059.360:84): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.825404][ T3303] cgroup: Unknown subsys name 'cpuset' [ 26.831506][ T3303] cgroup: Unknown subsys name 'rlimit' [ 26.939498][ T29] audit: type=1400 audit(1730697059.610:85): avc: denied { setattr } for pid=3303 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.963274][ T29] audit: type=1400 audit(1730697059.610:86): avc: denied { create } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.983880][ T29] audit: type=1400 audit(1730697059.610:87): avc: denied { write } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.995886][ T3308] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 27.004254][ T29] audit: type=1400 audit(1730697059.610:88): avc: denied { read } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.033169][ T29] audit: type=1400 audit(1730697059.610:89): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.058058][ T29] audit: type=1400 audit(1730697059.610:90): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 27.081395][ T29] audit: type=1400 audit(1730697059.690:91): avc: denied { relabelto } for pid=3308 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.097069][ T3303] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.960216][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 29.028247][ T3322] chnl_net:caif_netlink_parms(): no params data found [ 29.078668][ T3324] chnl_net:caif_netlink_parms(): no params data found [ 29.089737][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.096882][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.104103][ T3314] bridge_slave_0: entered allmulticast mode [ 29.110571][ T3314] bridge_slave_0: entered promiscuous mode [ 29.119682][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.126762][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.133920][ T3314] bridge_slave_1: entered allmulticast mode [ 29.140389][ T3314] bridge_slave_1: entered promiscuous mode [ 29.150164][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 29.216607][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.228911][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.257158][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 29.275616][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.282696][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.289980][ T3322] bridge_slave_0: entered allmulticast mode [ 29.296280][ T3322] bridge_slave_0: entered promiscuous mode [ 29.315817][ T3314] team0: Port device team_slave_0 added [ 29.321549][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.328668][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.335965][ T3322] bridge_slave_1: entered allmulticast mode [ 29.342416][ T3322] bridge_slave_1: entered promiscuous mode [ 29.360133][ T3314] team0: Port device team_slave_1 added [ 29.375014][ T3324] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.382157][ T3324] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.389411][ T3324] bridge_slave_0: entered allmulticast mode [ 29.395763][ T3324] bridge_slave_0: entered promiscuous mode [ 29.418343][ T3324] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.425475][ T3324] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.432622][ T3324] bridge_slave_1: entered allmulticast mode [ 29.439162][ T3324] bridge_slave_1: entered promiscuous mode [ 29.450310][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.457473][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.464586][ T3321] bridge_slave_0: entered allmulticast mode [ 29.470942][ T3321] bridge_slave_0: entered promiscuous mode [ 29.484817][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.499742][ T3324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.508860][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.515988][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.523116][ T3321] bridge_slave_1: entered allmulticast mode [ 29.529430][ T3321] bridge_slave_1: entered promiscuous mode [ 29.535921][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.542867][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.568887][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.583056][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.597707][ T3324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.611585][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.618658][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.644613][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.677057][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.687809][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.702285][ T3322] team0: Port device team_slave_0 added [ 29.708719][ T3322] team0: Port device team_slave_1 added [ 29.728105][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.735207][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.742361][ T3316] bridge_slave_0: entered allmulticast mode [ 29.748777][ T3316] bridge_slave_0: entered promiscuous mode [ 29.755619][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.762800][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.770074][ T3316] bridge_slave_1: entered allmulticast mode [ 29.776411][ T3316] bridge_slave_1: entered promiscuous mode [ 29.792755][ T3324] team0: Port device team_slave_0 added [ 29.803461][ T3321] team0: Port device team_slave_0 added [ 29.810190][ T3321] team0: Port device team_slave_1 added [ 29.824677][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.831682][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.857721][ T3322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.869248][ T3324] team0: Port device team_slave_1 added [ 29.889790][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.899188][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.906177][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.932236][ T3322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.952246][ T3314] hsr_slave_0: entered promiscuous mode [ 29.958385][ T3314] hsr_slave_1: entered promiscuous mode [ 29.975408][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.991367][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.998339][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.024310][ T3324] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.036967][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.043997][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.069927][ T3324] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.080775][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.087785][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.113739][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.125134][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.132090][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.158018][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.201042][ T3316] team0: Port device team_slave_0 added [ 30.207564][ T3316] team0: Port device team_slave_1 added [ 30.220137][ T3322] hsr_slave_0: entered promiscuous mode [ 30.226534][ T3322] hsr_slave_1: entered promiscuous mode [ 30.232411][ T3322] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.239998][ T3322] Cannot create hsr debugfs directory [ 30.282258][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.289251][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.315240][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.330245][ T3324] hsr_slave_0: entered promiscuous mode [ 30.336405][ T3324] hsr_slave_1: entered promiscuous mode [ 30.342292][ T3324] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.349874][ T3324] Cannot create hsr debugfs directory [ 30.357728][ T3321] hsr_slave_0: entered promiscuous mode [ 30.363682][ T3321] hsr_slave_1: entered promiscuous mode [ 30.369600][ T3321] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.377255][ T3321] Cannot create hsr debugfs directory [ 30.382997][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.389988][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.415984][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.490429][ T3316] hsr_slave_0: entered promiscuous mode [ 30.496503][ T3316] hsr_slave_1: entered promiscuous mode [ 30.502330][ T3316] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.510004][ T3316] Cannot create hsr debugfs directory [ 30.585224][ T3314] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 30.604395][ T3314] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 30.628223][ T3314] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 30.641302][ T3314] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 30.692796][ T3322] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 30.702426][ T3322] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 30.716657][ T3322] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 30.725801][ T3322] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 30.755058][ T3321] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 30.763813][ T3321] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 30.772623][ T3321] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 30.785713][ T3321] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 30.798744][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.816267][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.841896][ T168] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.849009][ T168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.859612][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.866801][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.875368][ T3324] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 30.884152][ T3324] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 30.893478][ T3324] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 30.906442][ T3324] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 30.963401][ T3316] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 30.972180][ T3316] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 30.981603][ T3316] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 30.990706][ T3316] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 31.012342][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.041228][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.051742][ T3322] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.069475][ T2347] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.076560][ T2347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.085892][ T2347] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.092951][ T2347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.129906][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.156837][ T28] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.164030][ T28] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.175199][ T3324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.195885][ T168] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.202985][ T168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.227546][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.236929][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.258491][ T3324] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.277794][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.286971][ T2347] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.294041][ T2347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.306148][ T2347] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.313220][ T2347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.325620][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.332867][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.351184][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.358284][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.387101][ T3322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.398111][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.416612][ T3316] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 31.427114][ T3316] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.449597][ T3324] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 31.460028][ T3324] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.505427][ T3314] veth0_vlan: entered promiscuous mode [ 31.554819][ T3314] veth1_vlan: entered promiscuous mode [ 31.581073][ T3314] veth0_macvtap: entered promiscuous mode [ 31.590367][ T3314] veth1_macvtap: entered promiscuous mode [ 31.607402][ T3324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.623588][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.641742][ T3321] veth0_vlan: entered promiscuous mode [ 31.649708][ T3321] veth1_vlan: entered promiscuous mode [ 31.657438][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.672322][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.696194][ T3314] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.705114][ T3314] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.713815][ T3314] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.722557][ T3314] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.755274][ T3322] veth0_vlan: entered promiscuous mode [ 31.772484][ T3321] veth0_macvtap: entered promiscuous mode [ 31.782061][ T3322] veth1_vlan: entered promiscuous mode [ 31.802033][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 31.802048][ T29] audit: type=1400 audit(1730697064.470:110): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/root/syzkaller.B4uXZn/syz-tmp" dev="sda1" ino=1944 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 31.802543][ T3321] veth1_macvtap: entered promiscuous mode [ 31.808371][ T29] audit: type=1400 audit(1730697064.470:111): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 31.843013][ T3322] veth0_macvtap: entered promiscuous mode [ 31.860559][ T29] audit: type=1400 audit(1730697064.470:112): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/root/syzkaller.B4uXZn/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 31.886838][ T3321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.891674][ T29] audit: type=1400 audit(1730697064.470:113): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 31.902020][ T3321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.923889][ T29] audit: type=1400 audit(1730697064.470:114): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/root/syzkaller.B4uXZn/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 31.960370][ T29] audit: type=1400 audit(1730697064.470:115): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/root/syzkaller.B4uXZn/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 31.965201][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.988004][ T29] audit: type=1400 audit(1730697064.470:116): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 32.003533][ T3322] veth1_macvtap: entered promiscuous mode [ 32.032470][ T29] audit: type=1400 audit(1730697064.690:117): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=502 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 32.037385][ T3322] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.065737][ T3322] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.075576][ T3322] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.086113][ T3322] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.097268][ T3314] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 32.097801][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.122905][ T3321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.133456][ T3321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.145696][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.164684][ T29] audit: type=1400 audit(1730697064.830:118): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.168922][ T3322] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.188889][ T29] audit: type=1400 audit(1730697064.830:119): avc: denied { open } for pid=3314 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.223504][ T3322] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.233364][ T3322] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.240619][ T3453] loop1: detected capacity change from 0 to 512 [ 32.243847][ T3322] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.251437][ T3453] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 32.267138][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.277315][ T3322] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.286239][ T3322] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.295000][ T3322] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.303756][ T3322] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.325447][ T3453] loop1: detected capacity change from 0 to 512 [ 32.331865][ T3453] ======================================================= [ 32.331865][ T3453] WARNING: The mand mount option has been deprecated and [ 32.331865][ T3453] and is ignored by this kernel. Remove the mand [ 32.331865][ T3453] option from the mount to silence this warning. [ 32.331865][ T3453] ======================================================= [ 32.342510][ T3321] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.375558][ T3321] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.384262][ T3321] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.392996][ T3321] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.407667][ T3324] veth0_vlan: entered promiscuous mode [ 32.411985][ T3453] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 32.416165][ T3324] veth1_vlan: entered promiscuous mode [ 32.421099][ T3453] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=884fc018, mo2=0002] [ 32.434046][ T3324] veth0_macvtap: entered promiscuous mode [ 32.435336][ T3453] EXT4-fs (loop1): couldn't mount RDWR because of unsupported optional features (80) [ 32.441841][ T3324] veth1_macvtap: entered promiscuous mode [ 32.449581][ T3453] EXT4-fs (loop1): Skipping orphan cleanup due to unknown ROCOMPAT features [ 32.450219][ T3453] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 32.459807][ T3324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.475368][ T3453] EXT4-fs (loop1): Online resizing not supported with sparse_super2 [ 32.476365][ T3324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.487590][ T3453] EXT4-fs warning (device loop1): dx_probe:893: inode #2: comm syz.1.2: dx entry: limit 65535 != root limit 120 [ 32.494718][ T3324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.504628][ T3453] EXT4-fs warning (device loop1): dx_probe:966: inode #2: comm syz.1.2: Corrupt directory, running e2fsck is recommended [ 32.516464][ T3324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.549479][ T3324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.559972][ T3324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.570700][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.578308][ T3314] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.599069][ T3316] veth0_vlan: entered promiscuous mode [ 32.614695][ T3324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.616586][ T3456] netlink: 19 bytes leftover after parsing attributes in process `syz.1.6'. [ 32.625178][ T3324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.643752][ T3324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.654182][ T3324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.664044][ T3324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.670235][ T3457] netlink: 96 bytes leftover after parsing attributes in process `syz.1.6'. [ 32.675387][ T3324] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.695244][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.696157][ T3457] loop1: detected capacity change from 0 to 1024 [ 32.709593][ T3457] EXT4-fs: Ignoring removed mblk_io_submit option [ 32.719878][ T3457] EXT4-fs (loop1): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 32.730728][ T3457] JBD2: no valid journal superblock found [ 32.731424][ T3324] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.736563][ T3457] EXT4-fs (loop1): Could not load journal inode [ 32.751571][ T3324] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.760346][ T3324] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.769343][ T3324] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.804083][ T3316] veth1_vlan: entered promiscuous mode [ 32.862221][ T3316] veth0_macvtap: entered promiscuous mode [ 32.930222][ T3316] veth1_macvtap: entered promiscuous mode [ 32.969150][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.979664][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.979677][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.979692][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.979704][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.020576][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.030421][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 33.040904][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.055075][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.062875][ T3476] Zero length message leads to an empty skb [ 33.073387][ T3473] netlink: 'syz.4.5': attribute type 4 has an invalid length. [ 33.087259][ T3476] netlink: 20 bytes leftover after parsing attributes in process `+}[@'. [ 33.107862][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.118463][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.122728][ T3476] netlink: 24 bytes leftover after parsing attributes in process `+}[@'. [ 33.128337][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.147294][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.157262][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.167808][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.177680][ T3316] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 33.188234][ T3316] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 33.227853][ T3482] loop3: detected capacity change from 0 to 512 [ 33.246261][ T3482] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 33.259571][ T3482] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 33.271456][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.284772][ T3473] netlink: 'syz.4.5': attribute type 4 has an invalid length. [ 33.297223][ T3316] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.306124][ T3316] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.315026][ T3316] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.323740][ T3316] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.340648][ T3484] geneve2: entered promiscuous mode [ 33.345946][ T3484] geneve2: entered allmulticast mode [ 33.353656][ T3482] EXT4-fs error (device loop3): ext4_orphan_get:1414: comm syz.3.11: bad orphan inode 15 [ 33.369718][ T3482] ext4_test_bit(bit=14, block=4) = 1 [ 33.375395][ T3482] is_bad_inode(inode)=0 [ 33.379593][ T3482] NEXT_ORPHAN(inode)=83886080 [ 33.384275][ T3482] max_ino=32 [ 33.387638][ T3482] i_nlink=1 [ 33.395140][ T3482] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 33.490113][ T3482] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 33.536238][ T3492] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 33.579703][ T3495] netlink: 'syz.2.14': attribute type 3 has an invalid length. [ 33.598306][ T3497] Cannot find map_set index 0 as target [ 33.660193][ T3503] loop1: detected capacity change from 0 to 512 [ 33.667573][ T3503] EXT4-fs: Ignoring removed orlov option [ 33.673575][ T3503] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 33.698316][ T3503] EXT4-fs (loop1): 1 orphan inode deleted [ 33.704297][ T3503] EXT4-fs (loop1): 1 truncate cleaned up [ 33.713991][ T3473] syz.4.5 (3473) used greatest stack depth: 10640 bytes left [ 33.722181][ T3508] loop2: detected capacity change from 0 to 164 [ 33.729597][ T3503] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 33.742020][ T3508] rock: corrupted directory entry. extent=28, offset=0, size=16777216 [ 33.774254][ T3314] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 33.783944][ T3510] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 33.820996][ T3510] syz.4.20 (3510) used greatest stack depth: 10368 bytes left [ 33.832795][ T3514] FAULT_INJECTION: forcing a failure. [ 33.832795][ T3514] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 33.832836][ T3514] CPU: 0 UID: 0 PID: 3514 Comm: syz.2.22 Not tainted 6.12.0-rc5-syzkaller-00330-ga33ab3f94f51 #0 [ 33.832909][ T3514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 33.832925][ T3514] Call Trace: [ 33.832932][ T3514] [ 33.832941][ T3514] dump_stack_lvl+0xf2/0x150 [ 33.832975][ T3514] dump_stack+0x15/0x20 [ 33.833003][ T3514] should_fail_ex+0x223/0x230 [ 33.833061][ T3514] should_fail+0xb/0x10 [ 33.833184][ T3514] should_fail_usercopy+0x1a/0x20 [ 33.833204][ T3514] _copy_to_user+0x20/0xa0 [ 33.833227][ T3514] put_itimerspec64+0x69/0x120 [ 33.833295][ T3514] __x64_sys_timer_settime+0x10c/0x160 [ 33.833398][ T3514] x64_sys_call+0x20c0/0x2d60 [ 33.833432][ T3514] do_syscall_64+0xc9/0x1c0 [ 33.833460][ T3514] ? clear_bhb_loop+0x55/0xb0 [ 33.833480][ T3514] ? clear_bhb_loop+0x55/0xb0 [ 33.833500][ T3514] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 33.833605][ T3514] RIP: 0033:0x7f5ecb39e719 [ 33.833624][ T3514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.833646][ T3514] RSP: 002b:00007f5eca017038 EFLAGS: 00000246 ORIG_RAX: 00000000000000df [ 33.833672][ T3514] RAX: ffffffffffffffda RBX: 00007f5ecb555f80 RCX: 00007f5ecb39e719 [ 33.833690][ T3514] RDX: 0000000020000280 RSI: 0000000000000000 RDI: 0000000000000000 [ 33.833707][ T3514] RBP: 00007f5eca017090 R08: 0000000000000000 R09: 0000000000000000 [ 33.833723][ T3514] R10: 0000000020000300 R11: 0000000000000246 R12: 0000000000000001 [ 33.833798][ T3514] R13: 0000000000000000 R14: 00007f5ecb555f80 R15: 00007ffc89211ff8 [ 33.833816][ T3514] [ 33.857193][ T3516] syz.4.23[3516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.857320][ T3516] syz.4.23[3516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.857418][ T3516] syz.4.23[3516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.982113][ T3521] loop2: detected capacity change from 0 to 8192 [ 34.174279][ T3530] FAULT_INJECTION: forcing a failure. [ 34.174279][ T3530] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 34.186738][ T3532] netlink: 'syz.1.29': attribute type 3 has an invalid length. [ 34.187407][ T3530] CPU: 0 UID: 0 PID: 3530 Comm: syz.4.28 Not tainted 6.12.0-rc5-syzkaller-00330-ga33ab3f94f51 #0 [ 34.205369][ T3530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 34.215506][ T3530] Call Trace: [ 34.218792][ T3530] [ 34.221757][ T3530] dump_stack_lvl+0xf2/0x150 [ 34.226389][ T3530] dump_stack+0x15/0x20 [ 34.230660][ T3530] should_fail_ex+0x223/0x230 [ 34.235381][ T3530] should_fail+0xb/0x10 [ 34.239558][ T3530] should_fail_usercopy+0x1a/0x20 [ 34.244636][ T3530] strncpy_from_user+0x25/0x210 [ 34.249565][ T3530] ? kmem_cache_alloc_noprof+0x10c/0x290 [ 34.255228][ T3530] getname_flags+0xb0/0x3b0 [ 34.259815][ T3530] user_path_at+0x26/0x110 [ 34.264328][ T3530] __se_sys_mount+0x248/0x2d0 [ 34.269033][ T3530] __x64_sys_mount+0x67/0x80 [ 34.273703][ T3530] x64_sys_call+0x203e/0x2d60 [ 34.278445][ T3530] do_syscall_64+0xc9/0x1c0 [ 34.283008][ T3530] ? clear_bhb_loop+0x55/0xb0 [ 34.287778][ T3530] ? clear_bhb_loop+0x55/0xb0 [ 34.292476][ T3530] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 34.298542][ T3530] RIP: 0033:0x7f036fd7e719 [ 34.302963][ T3530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.322615][ T3530] RSP: 002b:00007f036e9f1038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 34.331037][ T3530] RAX: ffffffffffffffda RBX: 00007f036ff35f80 RCX: 00007f036fd7e719 [ 34.339084][ T3530] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000000000000 [ 34.347065][ T3530] RBP: 00007f036e9f1090 R08: 0000000020000200 R09: 0000000000000000 [ 34.355068][ T3530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.363046][ T3530] R13: 0000000000000000 R14: 00007f036ff35f80 R15: 00007ffef7761978 [ 34.371077][ T3530] [ 34.408701][ T3536] loop4: detected capacity change from 0 to 2048 [ 34.448801][ T3538] hub 2-0:1.0: USB hub found [ 34.451576][ T3536] Alternate GPT is invalid, using primary GPT. [ 34.453653][ T3538] hub 2-0:1.0: 8 ports detected [ 34.459841][ T3536] loop4: p2 p3 p7 [ 34.540770][ T3543] FAULT_INJECTION: forcing a failure. [ 34.540770][ T3543] name failslab, interval 1, probability 0, space 0, times 1 [ 34.549132][ T3545] vhci_hcd: default hub control req: 8031 v0000 i0000 l0 [ 34.553460][ T3543] CPU: 0 UID: 0 PID: 3543 Comm: syz.4.33 Not tainted 6.12.0-rc5-syzkaller-00330-ga33ab3f94f51 #0 [ 34.568126][ T3545] loop1: detected capacity change from 0 to 1024 [ 34.570947][ T3543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 34.570965][ T3543] Call Trace: [ 34.590693][ T3543] [ 34.593744][ T3543] dump_stack_lvl+0xf2/0x150 [ 34.598587][ T3543] dump_stack+0x15/0x20 [ 34.602770][ T3543] should_fail_ex+0x223/0x230 [ 34.607501][ T3543] ? audit_log_start+0x34c/0x6b0 [ 34.612540][ T3543] should_failslab+0x8f/0xb0 [ 34.617191][ T3543] kmem_cache_alloc_noprof+0x4c/0x290 [ 34.622594][ T3543] audit_log_start+0x34c/0x6b0 [ 34.627389][ T3543] audit_seccomp+0x4b/0x130 [ 34.631908][ T3543] __seccomp_filter+0x6fa/0x1180 [ 34.636997][ T3543] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 34.642649][ T3543] ? vfs_write+0x596/0x920 [ 34.647089][ T3543] ? __rcu_read_unlock+0x4e/0x70 [ 34.652046][ T3543] ? __fget_files+0x1d4/0x210 [ 34.656768][ T3543] __secure_computing+0x9f/0x1c0 [ 34.661724][ T3543] syscall_trace_enter+0xd1/0x1f0 [ 34.666905][ T3543] ? fpregs_assert_state_consistent+0x83/0xa0 [ 34.673099][ T3543] do_syscall_64+0xaa/0x1c0 [ 34.677789][ T3543] ? clear_bhb_loop+0x55/0xb0 [ 34.682473][ T3543] ? clear_bhb_loop+0x55/0xb0 [ 34.687158][ T3543] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 34.693161][ T3543] RIP: 0033:0x7f036fd7e719 [ 34.697588][ T3543] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.717210][ T3543] RSP: 002b:00007f036e9f1038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e3 [ 34.725661][ T3543] RAX: ffffffffffffffda RBX: 00007f036ff35f80 RCX: 00007f036fd7e719 [ 34.733641][ T3543] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 [ 34.741658][ T3543] RBP: 00007f036e9f1090 R08: 0000000000000000 R09: 0000000000000000 [ 34.749724][ T3543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.757710][ T3543] R13: 0000000000000000 R14: 00007f036ff35f80 R15: 00007ffef7761978 [ 34.765776][ T3543] [ 34.808841][ T3547] hub 2-0:1.0: USB hub found [ 34.813614][ T3547] hub 2-0:1.0: 8 ports detected [ 34.830151][ T3549] Cannot find map_set index 0 as target [ 34.865203][ T3551] netlink: 8 bytes leftover after parsing attributes in process `syz.4.37'. [ 34.881564][ T3551] bond1: entered promiscuous mode [ 34.886745][ T3551] bond1: entered allmulticast mode [ 34.893133][ T3551] 8021q: adding VLAN 0 to HW filter on device bond1 [ 34.929465][ C0] hrtimer: interrupt took 46682 ns [ 34.937833][ T3554] IPVS: set_ctl: invalid protocol: 46 224.0.0.2:0 [ 35.205013][ T3572] 9pnet_fd: Insufficient options for proto=fd [ 35.308513][ T3574] 9pnet_fd: Insufficient options for proto=fd [ 35.522114][ T3579] Cannot find map_set index 0 as target [ 35.544101][ T3577] netlink: 8 bytes leftover after parsing attributes in process `syz.1.44'. [ 35.648082][ T3583] netlink: 19 bytes leftover after parsing attributes in process `syz.4.50'. [ 35.676455][ T3583] netlink: 96 bytes leftover after parsing attributes in process `syz.4.50'. [ 35.709361][ T3583] loop4: detected capacity change from 0 to 1024 [ 35.725843][ T3583] EXT4-fs: Ignoring removed mblk_io_submit option [ 35.748987][ T3583] EXT4-fs (loop4): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 35.773809][ T3583] JBD2: no valid journal superblock found [ 35.779602][ T3583] EXT4-fs (loop4): Could not load journal inode [ 35.878049][ T3587] vhci_hcd: default hub control req: 8031 v0000 i0000 l0 [ 35.892695][ T3587] loop2: detected capacity change from 0 to 1024 [ 35.902498][ T3585] hub 2-0:1.0: USB hub found [ 35.909410][ T3585] hub 2-0:1.0: 8 ports detected [ 36.018669][ T3482] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.046921][ T3592] 9pnet_fd: Insufficient options for proto=fd [ 36.077735][ T3592] loop2: detected capacity change from 0 to 512 [ 36.094583][ T3592] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 36.131320][ T3596] hsr0: entered promiscuous mode [ 36.140668][ T3599] loop1: detected capacity change from 0 to 128 [ 36.147533][ T3592] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2863: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 36.177168][ T3592] EXT4-fs (loop2): 1 truncate cleaned up [ 36.183193][ T3592] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 36.195067][ T3601] loop0: detected capacity change from 0 to 512 [ 36.208069][ T3599] syz.1.57: attempt to access beyond end of device [ 36.208069][ T3599] loop1: rw=0, sector=121, nr_sectors = 120 limit=128 [ 36.237876][ T3601] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.252134][ T3601] ext4 filesystem being mounted at /11/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 36.267034][ T3601] capability: warning: `syz.0.58' uses deprecated v2 capabilities in a way that may be insecure [ 36.276319][ T3316] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.327608][ T3324] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.335191][ T3610] loop2: detected capacity change from 0 to 1024 [ 36.375876][ T3616] syz.0.60[3616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.376023][ T3616] syz.0.60[3616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.392191][ T3616] syz.0.60[3616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.401223][ T3593] program +}[@ is using a deprecated SCSI ioctl, please convert it to SG_IO [ 36.424320][ T3610] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 36.439123][ T3593] netlink: '+}[@': attribute type 10 has an invalid length. [ 36.478627][ T3593] bond0: (slave netdevsim1): Enslaving as an active interface with an up link [ 36.552058][ T2347] kworker/u8:6: attempt to access beyond end of device [ 36.552058][ T2347] loop1: rw=1, sector=241, nr_sectors = 800 limit=128 [ 36.553491][ T3629] netlink: 19 bytes leftover after parsing attributes in process `syz.4.61'. [ 36.581829][ T3629] netlink: 96 bytes leftover after parsing attributes in process `syz.4.61'. [ 36.604339][ T3629] loop4: detected capacity change from 0 to 1024 [ 36.612221][ T3629] EXT4-fs: Ignoring removed mblk_io_submit option [ 36.619473][ T3629] EXT4-fs (loop4): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 36.631556][ T3629] JBD2: no valid journal superblock found [ 36.637311][ T3629] EXT4-fs (loop4): Could not load journal inode [ 36.644800][ T3632] FAULT_INJECTION: forcing a failure. [ 36.644800][ T3632] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 36.657934][ T3632] CPU: 0 UID: 0 PID: 3632 Comm: syz.2.59 Not tainted 6.12.0-rc5-syzkaller-00330-ga33ab3f94f51 #0 [ 36.668527][ T3632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 36.679433][ T3632] Call Trace: [ 36.682726][ T3632] [ 36.685667][ T3632] dump_stack_lvl+0xf2/0x150 [ 36.690297][ T3632] dump_stack+0x15/0x20 [ 36.694506][ T3632] should_fail_ex+0x223/0x230 [ 36.699220][ T3632] should_fail+0xb/0x10 [ 36.703409][ T3632] should_fail_usercopy+0x1a/0x20 [ 36.708451][ T3632] _copy_to_user+0x20/0xa0 [ 36.712967][ T3632] simple_read_from_buffer+0xa0/0x110 [ 36.718367][ T3632] proc_fail_nth_read+0xf9/0x140 [ 36.723402][ T3632] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 36.728985][ T3632] vfs_read+0x1a2/0x700 [ 36.733172][ T3632] ? __fget_files+0x1d4/0x210 [ 36.737917][ T3632] ksys_read+0xeb/0x1b0 [ 36.742103][ T3632] __x64_sys_read+0x42/0x50 [ 36.746649][ T3632] x64_sys_call+0x27d3/0x2d60 [ 36.751359][ T3632] do_syscall_64+0xc9/0x1c0 [ 36.755931][ T3632] ? clear_bhb_loop+0x55/0xb0 [ 36.760617][ T3632] ? clear_bhb_loop+0x55/0xb0 [ 36.765321][ T3632] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.771274][ T3632] RIP: 0033:0x7f5ecb39d15c [ 36.775696][ T3632] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 36.795376][ T3632] RSP: 002b:00007f5ec9fd5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 36.803792][ T3632] RAX: ffffffffffffffda RBX: 00007f5ecb556130 RCX: 00007f5ecb39d15c [ 36.811819][ T3632] RDX: 000000000000000f RSI: 00007f5ec9fd50a0 RDI: 0000000000000006 [ 36.819798][ T3632] RBP: 00007f5ec9fd5090 R08: 0000000000000000 R09: 0000000000000000 [ 36.827794][ T3632] R10: 0000000000009000 R11: 0000000000000246 R12: 0000000000000001 [ 36.835774][ T3632] R13: 0000000000000000 R14: 00007f5ecb556130 R15: 00007ffc89211ff8 [ 36.843770][ T3632] [ 36.858660][ T3631] netlink: 'syz.0.63': attribute type 3 has an invalid length. [ 36.897800][ T3482] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.908464][ T29] kauditd_printk_skb: 473 callbacks suppressed [ 36.908481][ T29] audit: type=1326 audit(1730697069.550:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3634 comm="syz.1.62" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 36.937876][ T29] audit: type=1326 audit(1730697069.550:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3634 comm="syz.1.62" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 36.961099][ T29] audit: type=1326 audit(1730697069.550:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3634 comm="syz.1.62" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 36.984199][ T29] audit: type=1326 audit(1730697069.550:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3636 comm="syz.1.62" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f58f6dc0805 code=0x7ffc0000 [ 37.007566][ T29] audit: type=1326 audit(1730697069.550:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3634 comm="syz.1.62" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 37.030908][ T29] audit: type=1326 audit(1730697069.560:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3634 comm="syz.1.62" exe="/root/syz-executor" sig=0 arch=c000003e syscall=434 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 37.054136][ T29] audit: type=1326 audit(1730697069.560:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3634 comm="syz.1.62" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 37.077529][ T29] audit: type=1326 audit(1730697069.560:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3634 comm="syz.1.62" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 37.101232][ T29] audit: type=1326 audit(1730697069.620:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3634 comm="syz.1.62" exe="/root/syz-executor" sig=0 arch=c000003e syscall=424 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 37.124434][ T29] audit: type=1326 audit(1730697069.620:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3634 comm="syz.1.62" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 37.131027][ T3316] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.201537][ T3639] loop1: detected capacity change from 0 to 1024 [ 37.215391][ T3482] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 37.246757][ T3639] EXT4-fs: Ignoring removed mblk_io_submit option [ 37.299257][ T3646] loop0: detected capacity change from 0 to 8192 [ 37.306883][ T3639] EXT4-fs (loop1): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 37.318504][ T3639] JBD2: no valid journal superblock found [ 37.322411][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.324228][ T3639] EXT4-fs (loop1): Could not load journal inode [ 37.391184][ T3661] 9pnet_fd: Insufficient options for proto=fd [ 37.411887][ T3658] geneve0: entered allmulticast mode [ 37.471640][ T3668] netlink: 'syz.2.77': attribute type 3 has an invalid length. [ 37.483199][ T3666] FAULT_INJECTION: forcing a failure. [ 37.483199][ T3666] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 37.496514][ T3666] CPU: 1 UID: 0 PID: 3666 Comm: syz.3.76 Not tainted 6.12.0-rc5-syzkaller-00330-ga33ab3f94f51 #0 [ 37.508126][ T3666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 37.518203][ T3666] Call Trace: [ 37.521496][ T3666] [ 37.524447][ T3666] dump_stack_lvl+0xf2/0x150 [ 37.529065][ T3666] dump_stack+0x15/0x20 [ 37.533342][ T3666] should_fail_ex+0x223/0x230 [ 37.538078][ T3666] should_fail+0xb/0x10 [ 37.542328][ T3666] should_fail_usercopy+0x1a/0x20 [ 37.547373][ T3666] strncpy_from_user+0x25/0x210 [ 37.552260][ T3666] ? kmem_cache_alloc_noprof+0x10c/0x290 [ 37.557933][ T3666] getname_flags+0xb0/0x3b0 [ 37.562493][ T3666] getname+0x17/0x20 [ 37.566413][ T3666] do_sys_openat2+0x67/0x120 [ 37.571088][ T3666] __x64_sys_openat+0xf3/0x120 [ 37.575939][ T3666] x64_sys_call+0x1025/0x2d60 [ 37.580673][ T3666] do_syscall_64+0xc9/0x1c0 [ 37.585268][ T3666] ? clear_bhb_loop+0x55/0xb0 [ 37.589970][ T3666] ? clear_bhb_loop+0x55/0xb0 [ 37.594661][ T3666] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.600642][ T3666] RIP: 0033:0x7fda059fe719 [ 37.605078][ T3666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 37.624820][ T3666] RSP: 002b:00007fda04677038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 37.633239][ T3666] RAX: ffffffffffffffda RBX: 00007fda05bb5f80 RCX: 00007fda059fe719 [ 37.641228][ T3666] RDX: 0000000000040800 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 37.649204][ T3666] RBP: 00007fda04677090 R08: 0000000000000000 R09: 0000000000000000 [ 37.657182][ T3666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.665176][ T3666] R13: 0000000000000000 R14: 00007fda05bb5f80 R15: 00007ffc647f6538 [ 37.673161][ T3666] [ 37.752931][ T3676] loop4: detected capacity change from 0 to 256 [ 37.764084][ T3676] process 'syz.4.79' launched './file0' with NULL argv: empty string added [ 37.821524][ T3682] vhci_hcd: default hub control req: 8031 v0000 i0000 l0 [ 37.841418][ T3682] loop1: detected capacity change from 0 to 1024 [ 37.912506][ T3690] netlink: 'syz.3.85': attribute type 4 has an invalid length. [ 37.927266][ T3690] netlink: 'syz.3.85': attribute type 4 has an invalid length. [ 37.934776][ T3692] 9pnet_fd: Insufficient options for proto=fd [ 38.025567][ T3704] SELinux: Context Ü is not valid (left unmapped). [ 38.079672][ T3707] block device autoloading is deprecated and will be removed. [ 38.087355][ T3707] syz.2.92: attempt to access beyond end of device [ 38.087355][ T3707] md34: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 38.306990][ T3719] __nla_validate_parse: 4 callbacks suppressed [ 38.307009][ T3719] netlink: 24 bytes leftover after parsing attributes in process `syz.0.95'. [ 38.965444][ T3724] netlink: 'syz.4.97': attribute type 4 has an invalid length. [ 38.989785][ T3724] netlink: 'syz.4.97': attribute type 4 has an invalid length. [ 38.991236][ T3726] loop3: detected capacity change from 0 to 512 [ 39.008006][ T3726] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 39.032713][ T3728] 9pnet_fd: Insufficient options for proto=fd [ 39.058756][ T3726] EXT4-fs (loop3): 1 truncate cleaned up [ 39.073148][ T3726] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.141528][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.159607][ T3738] loop0: detected capacity change from 0 to 512 [ 39.177034][ T3738] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 39.200319][ T3738] FAULT_INJECTION: forcing a failure. [ 39.200319][ T3738] name failslab, interval 1, probability 0, space 0, times 0 [ 39.213078][ T3738] CPU: 0 UID: 0 PID: 3738 Comm: syz.0.103 Not tainted 6.12.0-rc5-syzkaller-00330-ga33ab3f94f51 #0 [ 39.223768][ T3738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 39.233856][ T3738] Call Trace: [ 39.237179][ T3738] [ 39.240136][ T3738] dump_stack_lvl+0xf2/0x150 [ 39.244772][ T3738] dump_stack+0x15/0x20 [ 39.248978][ T3738] should_fail_ex+0x223/0x230 [ 39.253718][ T3738] ? audit_log_start+0x34c/0x6b0 [ 39.258687][ T3738] should_failslab+0x8f/0xb0 [ 39.263305][ T3738] kmem_cache_alloc_noprof+0x4c/0x290 [ 39.268725][ T3738] audit_log_start+0x34c/0x6b0 [ 39.273531][ T3738] audit_seccomp+0x4b/0x130 [ 39.278063][ T3738] __seccomp_filter+0x6fa/0x1180 [ 39.283040][ T3738] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 39.288796][ T3738] ? vfs_write+0x596/0x920 [ 39.293260][ T3738] ? __rcu_read_unlock+0x4e/0x70 [ 39.298314][ T3738] ? __fget_files+0x1d4/0x210 [ 39.303098][ T3738] __secure_computing+0x9f/0x1c0 [ 39.308089][ T3738] syscall_trace_enter+0xd1/0x1f0 [ 39.313212][ T3738] ? fpregs_assert_state_consistent+0x83/0xa0 [ 39.319363][ T3738] do_syscall_64+0xaa/0x1c0 [ 39.323911][ T3738] ? clear_bhb_loop+0x55/0xb0 [ 39.328610][ T3738] ? clear_bhb_loop+0x55/0xb0 [ 39.333373][ T3738] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.339320][ T3738] RIP: 0033:0x7fb0321ee719 [ 39.343762][ T3738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.363404][ T3738] RSP: 002b:00007fb030e67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 39.371868][ T3738] RAX: ffffffffffffffda RBX: 00007fb0323a5f80 RCX: 00007fb0321ee719 [ 39.379922][ T3738] RDX: 0000000000000050 RSI: 0000000020000280 RDI: 0000000000000000 [ 39.387985][ T3738] RBP: 00007fb030e67090 R08: 0000000000000000 R09: 0000000000000000 [ 39.396113][ T3738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 39.404111][ T3738] R13: 0000000000000000 R14: 00007fb0323a5f80 R15: 00007ffca37477b8 [ 39.412118][ T3738] [ 39.423095][ T3741] loop3: detected capacity change from 0 to 512 [ 39.430142][ T3741] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 39.492903][ T3745] loop0: detected capacity change from 0 to 512 [ 39.505760][ T3711] syz.2.94 (3711) used greatest stack depth: 10064 bytes left [ 39.513999][ T3745] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 39.596078][ T3753] netlink: 'syz.3.106': attribute type 4 has an invalid length. [ 39.612259][ T3752] netlink: 24 bytes leftover after parsing attributes in process `syz.2.108'. [ 39.627373][ T3753] netlink: 'syz.3.106': attribute type 4 has an invalid length. [ 39.662799][ T3759] syz.2.111[3759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.662894][ T3759] syz.2.111[3759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.676637][ T3759] syz.2.111[3759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.725063][ T3766] syz.0.114: attempt to access beyond end of device [ 39.725063][ T3766] md34: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 39.918431][ T3773] loop4: detected capacity change from 0 to 8192 [ 40.070103][ T3795] FAULT_INJECTION: forcing a failure. [ 40.070103][ T3795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 40.083333][ T3795] CPU: 0 UID: 0 PID: 3795 Comm: syz.0.125 Not tainted 6.12.0-rc5-syzkaller-00330-ga33ab3f94f51 #0 [ 40.093945][ T3795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 40.104023][ T3795] Call Trace: [ 40.107397][ T3795] [ 40.110350][ T3795] dump_stack_lvl+0xf2/0x150 [ 40.114977][ T3795] dump_stack+0x15/0x20 [ 40.119174][ T3795] should_fail_ex+0x223/0x230 [ 40.123903][ T3795] should_fail+0xb/0x10 [ 40.128109][ T3795] should_fail_usercopy+0x1a/0x20 [ 40.133166][ T3795] _copy_from_user+0x1e/0xb0 [ 40.137788][ T3795] copy_msghdr_from_user+0x54/0x2a0 [ 40.143028][ T3795] __sys_sendmsg+0x171/0x270 [ 40.147713][ T3795] __x64_sys_sendmsg+0x46/0x50 [ 40.152655][ T3795] x64_sys_call+0x2689/0x2d60 [ 40.157341][ T3795] do_syscall_64+0xc9/0x1c0 [ 40.161849][ T3795] ? clear_bhb_loop+0x55/0xb0 [ 40.166573][ T3795] ? clear_bhb_loop+0x55/0xb0 [ 40.171273][ T3795] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 40.177207][ T3795] RIP: 0033:0x7fb0321ee719 [ 40.181620][ T3795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.201246][ T3795] RSP: 002b:00007fb030e67038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 40.209692][ T3795] RAX: ffffffffffffffda RBX: 00007fb0323a5f80 RCX: 00007fb0321ee719 [ 40.217750][ T3795] RDX: 0000000000000000 RSI: 00000000200005c0 RDI: 0000000000000005 [ 40.225739][ T3795] RBP: 00007fb030e67090 R08: 0000000000000000 R09: 0000000000000000 [ 40.233727][ T3795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 40.241774][ T3795] R13: 0000000000000000 R14: 00007fb0323a5f80 R15: 00007ffca37477b8 [ 40.249778][ T3795] [ 40.258859][ T3791] loop2: detected capacity change from 0 to 512 [ 40.266891][ T3791] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 40.285051][ T3791] EXT4-fs (loop2): 1 truncate cleaned up [ 40.291088][ T3791] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.360424][ T3316] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.390188][ T3802] loop0: detected capacity change from 0 to 512 [ 40.402362][ T3802] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 40.417357][ T3802] EXT4-fs (loop0): 1 truncate cleaned up [ 40.423576][ T3802] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.428305][ T3805] netlink: 'syz.2.127': attribute type 3 has an invalid length. [ 40.518443][ T3324] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.635030][ T3814] netlink: 19 bytes leftover after parsing attributes in process `syz.3.131'. [ 40.669580][ T3814] netlink: 96 bytes leftover after parsing attributes in process `syz.3.131'. [ 40.758714][ T3824] 9pnet_fd: Insufficient options for proto=fd [ 40.795071][ T3814] loop3: detected capacity change from 0 to 1024 [ 40.839002][ T3814] EXT4-fs: Ignoring removed mblk_io_submit option [ 40.981981][ T3814] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 41.042751][ T3814] JBD2: no valid journal superblock found [ 41.048654][ T3814] EXT4-fs (loop3): Could not load journal inode [ 41.405709][ T3839] loop3: detected capacity change from 0 to 8192 [ 41.431412][ T3843] netdevsim netdevsim1: Direct firmware load for Õ- failed with error -2 [ 41.507525][ T3847] netlink: 12 bytes leftover after parsing attributes in process `syz.1.143'. [ 41.516495][ T3847] netlink: 12 bytes leftover after parsing attributes in process `syz.1.143'. [ 41.543722][ T3833] mmap: syz.0.139 (3833) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 41.589390][ T3850] netlink: 'syz.1.144': attribute type 3 has an invalid length. [ 41.620645][ T3852] loop2: detected capacity change from 0 to 1024 [ 41.628388][ T3852] EXT4-fs: Ignoring removed nobh option [ 41.633996][ T3852] EXT4-fs: Ignoring removed orlov option [ 41.658565][ T3852] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 41.699318][ T3852] FAULT_INJECTION: forcing a failure. [ 41.699318][ T3852] name failslab, interval 1, probability 0, space 0, times 0 [ 41.712010][ T3852] CPU: 0 UID: 0 PID: 3852 Comm: syz.2.145 Not tainted 6.12.0-rc5-syzkaller-00330-ga33ab3f94f51 #0 [ 41.722620][ T3852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 41.732682][ T3852] Call Trace: [ 41.735965][ T3852] [ 41.738899][ T3852] dump_stack_lvl+0xf2/0x150 [ 41.743504][ T3852] dump_stack+0x15/0x20 [ 41.747689][ T3852] should_fail_ex+0x223/0x230 [ 41.752500][ T3852] ? sidtab_sid2str_get+0xb8/0x140 [ 41.757621][ T3852] should_failslab+0x8f/0xb0 [ 41.762275][ T3852] __kmalloc_node_track_caller_noprof+0xa6/0x380 [ 41.768629][ T3852] kmemdup_noprof+0x2a/0x60 [ 41.773199][ T3852] sidtab_sid2str_get+0xb8/0x140 [ 41.778180][ T3852] security_sid_to_context_core+0x1eb/0x2f0 [ 41.784122][ T3852] security_sid_to_context+0x27/0x30 [ 41.789429][ T3852] avc_audit_post_callback+0x9d/0x530 [ 41.795025][ T3852] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 41.801057][ T3852] common_lsm_audit+0x7cc/0xfc0 [ 41.806110][ T3852] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 41.812266][ T3852] ? avc_denied+0xf1/0x110 [ 41.816828][ T3852] slow_avc_audit+0xf9/0x140 [ 41.821434][ T3852] avc_has_perm+0x129/0x160 [ 41.825974][ T3852] selinux_socket_getsockopt+0x19c/0x1d0 [ 41.831722][ T3852] security_socket_getsockopt+0x47/0x80 [ 41.837338][ T3852] do_sock_getsockopt+0x57/0x260 [ 41.842299][ T3852] __sys_getsockopt+0x18a/0x200 [ 41.847195][ T3852] __x64_sys_getsockopt+0x66/0x80 [ 41.852281][ T3852] x64_sys_call+0x11cd/0x2d60 [ 41.857018][ T3852] do_syscall_64+0xc9/0x1c0 [ 41.861601][ T3852] ? clear_bhb_loop+0x55/0xb0 [ 41.866330][ T3852] ? clear_bhb_loop+0x55/0xb0 [ 41.871016][ T3852] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.876931][ T3852] RIP: 0033:0x7f5ecb39e719 [ 41.881440][ T3852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.901057][ T3852] RSP: 002b:00007f5eca017038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 41.909553][ T3852] RAX: ffffffffffffffda RBX: 00007f5ecb555f80 RCX: 00007f5ecb39e719 [ 41.917535][ T3852] RDX: 0000000000000003 RSI: 0000000000000001 RDI: 0000000000000004 [ 41.925536][ T3852] RBP: 00007f5eca017090 R08: 0000000020000140 R09: 0000000000000000 [ 41.933510][ T3852] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000001 [ 41.941567][ T3852] R13: 0000000000000000 R14: 00007f5ecb555f80 R15: 00007ffc89211ff8 [ 41.949633][ T3852] [ 41.953325][ T29] kauditd_printk_skb: 446 callbacks suppressed [ 41.953338][ T29] audit: type=1400 audit(1730697074.370:1045): avc: denied { getopt } for pid=3851 comm="syz.2.145" ssid=135 tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 41.986907][ T3859] syz.1.147[3859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.987025][ T3859] syz.1.147[3859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.001316][ T3859] syz.1.147[3859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.016011][ T29] audit: type=1326 audit(1730697074.690:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.1.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 42.021918][ T3316] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.027897][ T29] audit: type=1326 audit(1730697074.700:1047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.1.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=136 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 42.084122][ T29] audit: type=1326 audit(1730697074.730:1048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.1.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 42.087688][ T3863] loop4: detected capacity change from 0 to 512 [ 42.107509][ T29] audit: type=1326 audit(1730697074.730:1049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.1.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 42.117651][ T3863] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 42.137088][ T29] audit: type=1326 audit(1730697074.730:1050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.1.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 42.137124][ T29] audit: type=1326 audit(1730697074.730:1051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.1.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 42.193853][ T29] audit: type=1326 audit(1730697074.730:1052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.1.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 42.217229][ T29] audit: type=1326 audit(1730697074.730:1053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.1.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 42.227311][ T3863] EXT4-fs (loop4): 1 truncate cleaned up [ 42.240813][ T29] audit: type=1326 audit(1730697074.730:1054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.1.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f58f6d8e719 code=0x7ffc0000 [ 42.248625][ T3863] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 42.322083][ T3322] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.338879][ T3872] loop3: detected capacity change from 0 to 128 [ 42.340359][ T3873] netlink: 'syz.1.150': attribute type 4 has an invalid length. [ 42.379336][ T3873] netlink: 'syz.1.150': attribute type 4 has an invalid length. [ 42.408110][ T3872] syz.3.153: attempt to access beyond end of device [ 42.408110][ T3872] loop3: rw=0, sector=121, nr_sectors = 120 limit=128 [ 42.500418][ T3880] loop2: detected capacity change from 0 to 2048 [ 42.636667][ T3880] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 42.665660][ T3880] can0: slcan on ttyS3. [ 42.671444][ T3880] dccp_v6_rcv: dropped packet with invalid checksum [ 42.682164][ T3431] kworker/u8:7: attempt to access beyond end of device [ 42.682164][ T3431] loop3: rw=1, sector=241, nr_sectors = 800 limit=128 [ 42.693939][ T3894] netlink: 12 bytes leftover after parsing attributes in process `syz.4.156'. [ 42.709263][ T3880] EXT4-fs error (device loop2): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 42.728938][ T3904] ip6t_srh: unknown srh invflags 7D00 [ 42.763683][ T3911] netlink: 132 bytes leftover after parsing attributes in process `syz.3.157'. [ 42.794826][ T3876] can0 (unregistered): slcan off ttyS3. [ 42.819676][ T3316] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.869674][ T3914] hub 2-0:1.0: USB hub found [ 42.880076][ T3914] hub 2-0:1.0: 8 ports detected [ 42.883292][ T3924] Cannot find map_set index 0 as target [ 42.957876][ T3933] loop2: detected capacity change from 0 to 512 [ 42.973407][ T3935] vhci_hcd: default hub control req: 8031 v0000 i0000 l0 [ 42.985097][ T3933] EXT4-fs (loop2): filesystem is read-only [ 42.997811][ T3933] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 43.017981][ T3926] loop4: detected capacity change from 0 to 8192 [ 43.026163][ T3933] EXT4-fs (loop2): filesystem is read-only [ 43.027488][ T3935] loop0: detected capacity change from 0 to 1024 [ 43.032001][ T3933] EXT4-fs (loop2): orphan cleanup on readonly fs [ 43.078599][ T3932] netlink: 20 bytes leftover after parsing attributes in process `syz.3.164'. [ 43.078599][ T3933] EXT4-fs error (device loop2): ext4_validate_block_bitmap:441: comm syz.2.163: bg 0: block 64: padding at end of block bitmap is not set [ 43.093053][ T3932] syz.3.164 uses obsolete (PF_INET,SOCK_PACKET) [ 43.109240][ T3933] EXT4-fs error (device loop2) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 43.141581][ T3933] EXT4-fs (loop2): 1 orphan inode deleted [ 43.168871][ T3949] 9pnet_fd: Insufficient options for proto=fd [ 43.175672][ T3933] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 43.243416][ T3962] FAULT_INJECTION: forcing a failure. [ 43.243416][ T3962] name failslab, interval 1, probability 0, space 0, times 0 [ 43.256139][ T3962] CPU: 1 UID: 0 PID: 3962 Comm: syz.1.169 Not tainted 6.12.0-rc5-syzkaller-00330-ga33ab3f94f51 #0 [ 43.266757][ T3962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 43.276628][ T3967] 9pnet_fd: Insufficient options for proto=fd [ 43.276888][ T3962] Call Trace: [ 43.276898][ T3962] [ 43.289181][ T3962] dump_stack_lvl+0xf2/0x150 [ 43.293800][ T3962] dump_stack+0x15/0x20 [ 43.298005][ T3962] should_fail_ex+0x223/0x230 [ 43.302746][ T3962] ? __get_vm_area_node+0xf7/0x1b0 [ 43.307912][ T3962] should_failslab+0x8f/0xb0 [ 43.312571][ T3962] __kmalloc_cache_node_noprof+0x50/0x2b0 [ 43.318400][ T3962] __get_vm_area_node+0xf7/0x1b0 [ 43.319389][ T3972] syz.0.174: attempt to access beyond end of device [ 43.319389][ T3972] md34: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 43.323394][ T3962] __vmalloc_node_range_noprof+0x2c3/0xec0 [ 43.342070][ T3962] ? bpf_prog_alloc_no_stats+0x49/0x360 [ 43.347654][ T3962] ? mntput_no_expire+0x70/0x3c0 [ 43.352630][ T3962] ? avc_has_perm_noaudit+0x1cc/0x210 [ 43.358046][ T3962] ? selinux_capable+0x1f2/0x260 [ 43.363097][ T3962] ? bpf_prog_alloc_no_stats+0x49/0x360 [ 43.368722][ T3962] __vmalloc_noprof+0x5e/0x70 [ 43.373424][ T3962] ? bpf_prog_alloc_no_stats+0x49/0x360 [ 43.379071][ T3962] bpf_prog_alloc_no_stats+0x49/0x360 [ 43.384540][ T3962] ? bpf_prog_alloc+0x28/0x150 [ 43.389354][ T3962] bpf_prog_alloc+0x3a/0x150 [ 43.393972][ T3962] bpf_prog_load+0x4d1/0x1070 [ 43.398702][ T3962] ? __rcu_read_unlock+0x4e/0x70 [ 43.403756][ T3962] __sys_bpf+0x463/0x7a0 [ 43.408093][ T3962] __x64_sys_bpf+0x43/0x50 [ 43.412602][ T3962] x64_sys_call+0x2625/0x2d60 [ 43.417357][ T3962] do_syscall_64+0xc9/0x1c0 [ 43.421884][ T3962] ? clear_bhb_loop+0x55/0xb0 [ 43.426589][ T3962] ? clear_bhb_loop+0x55/0xb0 [ 43.431362][ T3962] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.437278][ T3962] RIP: 0033:0x7f58f6d8e719 [ 43.441766][ T3962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.461383][ T3962] RSP: 002b:00007f58f5a07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 43.469856][ T3962] RAX: ffffffffffffffda RBX: 00007f58f6f45f80 RCX: 00007f58f6d8e719 [ 43.477897][ T3962] RDX: 0000000000000090 RSI: 0000000020000300 RDI: 0000000000000005 [ 43.486004][ T3962] RBP: 00007f58f5a07090 R08: 0000000000000000 R09: 0000000000000000 [ 43.494038][ T3962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.502012][ T3962] R13: 0000000000000000 R14: 00007f58f6f45f80 R15: 00007ffc4849dbc8 [ 43.509993][ T3962] [ 43.513817][ T3962] syz.1.169: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0 [ 43.529975][ T3962] CPU: 1 UID: 0 PID: 3962 Comm: syz.1.169 Not tainted 6.12.0-rc5-syzkaller-00330-ga33ab3f94f51 #0 [ 43.540671][ T3962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 43.547467][ T3316] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.550768][ T3962] Call Trace: [ 43.550843][ T3962] [ 43.566046][ T3962] dump_stack_lvl+0xf2/0x150 [ 43.570667][ T3962] dump_stack+0x15/0x20 [ 43.574917][ T3962] warn_alloc+0x145/0x1b0 [ 43.579262][ T3962] __vmalloc_node_range_noprof+0x2e8/0xec0 [ 43.585166][ T3962] ? mntput_no_expire+0x70/0x3c0 [ 43.590193][ T3962] ? avc_has_perm_noaudit+0x1cc/0x210 [ 43.595615][ T3962] ? selinux_capable+0x1f2/0x260 [ 43.600640][ T3962] ? bpf_prog_alloc_no_stats+0x49/0x360 [ 43.606292][ T3962] __vmalloc_noprof+0x5e/0x70 [ 43.610979][ T3962] ? bpf_prog_alloc_no_stats+0x49/0x360 [ 43.616601][ T3962] bpf_prog_alloc_no_stats+0x49/0x360 [ 43.621994][ T3962] ? bpf_prog_alloc+0x28/0x150 [ 43.626861][ T3962] bpf_prog_alloc+0x3a/0x150 [ 43.631542][ T3962] bpf_prog_load+0x4d1/0x1070 [ 43.636228][ T3962] ? __rcu_read_unlock+0x4e/0x70 [ 43.641194][ T3962] __sys_bpf+0x463/0x7a0 [ 43.645448][ T3962] __x64_sys_bpf+0x43/0x50 [ 43.649881][ T3962] x64_sys_call+0x2625/0x2d60 [ 43.654760][ T3962] do_syscall_64+0xc9/0x1c0 [ 43.659329][ T3962] ? clear_bhb_loop+0x55/0xb0 [ 43.664034][ T3962] ? clear_bhb_loop+0x55/0xb0 [ 43.668722][ T3962] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.674693][ T3962] RIP: 0033:0x7f58f6d8e719 [ 43.679142][ T3962] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.698760][ T3962] RSP: 002b:00007f58f5a07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 43.707225][ T3962] RAX: ffffffffffffffda RBX: 00007f58f6f45f80 RCX: 00007f58f6d8e719 [ 43.715202][ T3962] RDX: 0000000000000090 RSI: 0000000020000300 RDI: 0000000000000005 [ 43.723175][ T3962] RBP: 00007f58f5a07090 R08: 0000000000000000 R09: 0000000000000000 [ 43.731211][ T3962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.739186][ T3962] R13: 0000000000000000 R14: 00007f58f6f45f80 R15: 00007ffc4849dbc8 [ 43.747190][ T3962] [ 43.750816][ T3962] Mem-Info: [ 43.753995][ T3962] active_anon:4972 inactive_anon:0 isolated_anon:0 [ 43.753995][ T3962] active_file:4812 inactive_file:2172 isolated_file:0 [ 43.753995][ T3962] unevictable:0 dirty:209 writeback:5 [ 43.753995][ T3962] slab_reclaimable:2723 slab_unreclaimable:14931 [ 43.753995][ T3962] mapped:21243 shmem:1353 pagetables:703 [ 43.753995][ T3962] sec_pagetables:0 bounce:0 [ 43.753995][ T3962] kernel_misc_reclaimable:0 [ 43.753995][ T3962] free:1920992 free_pcp:3045 free_cma:0 [ 43.799047][ T3962] Node 0 active_anon:19888kB inactive_anon:0kB active_file:19248kB inactive_file:8688kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:84972kB dirty:836kB writeback:20kB shmem:5412kB writeback_tmp:0kB kernel_stack:2816kB pagetables:2812kB sec_pagetables:0kB all_unreclaimable? no [ 43.827596][ T3962] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 43.854566][ T3962] lowmem_reserve[]: 0 2866 7844 0 [ 43.858990][ T3974] hub 2-0:1.0: USB hub found [ 43.859660][ T3962] Node 0 DMA32 free:2950376kB boost:0kB min:4136kB low:7068kB high:10000kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2953908kB mlocked:0kB bounce:0kB free_pcp:3532kB local_pcp:0kB free_cma:0kB [ 43.867511][ T3974] hub 2-0:1.0: 8 ports detected [ 43.892675][ T3962] lowmem_reserve[]: 0 0 4978 0 [ 43.902564][ T3962] Node 0 Normal free:4718232kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB active_anon:19888kB inactive_anon:0kB active_file:19248kB inactive_file:8688kB unevictable:0kB writepending:856kB present:5242880kB managed:5098208kB mlocked:0kB bounce:0kB free_pcp:8652kB local_pcp:7148kB free_cma:0kB [ 43.932685][ T3962] lowmem_reserve[]: 0 0 0 0 [ 43.937307][ T3962] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 43.950224][ T3962] Node 0 DMA32: 4*4kB (M) 1*8kB (M) 1*16kB (M) 4*32kB (M) 3*64kB (M) 3*128kB (M) 2*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 718*4096kB (M) = 2950376kB [ 43.966355][ T3962] Node 0 Normal: 4*4kB (ME) 7*8kB (UME) 29*16kB (UE) 18*32kB (ME) 69*64kB (ME) 56*128kB (UM) 71*256kB (UME) 33*512kB (UME) 33*1024kB (UM) 30*2048kB (UM) 1117*4096kB (UM) = 4718232kB [ 43.984770][ T3962] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 43.994134][ T3962] 8308 total pagecache pages [ 43.998807][ T3962] 0 pages in swap cache [ 44.002966][ T3962] Free swap = 124996kB [ 44.007302][ T3962] Total swap = 124996kB [ 44.011800][ T3962] 2097051 pages RAM [ 44.015659][ T3962] 0 pages HighMem/MovableOnly [ 44.020443][ T3962] 80182 pages reserved [ 44.074987][ T3980] 9pnet_fd: Insufficient options for proto=fd [ 44.081532][ T3976] geneve0: entered allmulticast mode [ 44.105746][ T3984] netlink: 40 bytes leftover after parsing attributes in process `syz.1.179'. [ 44.171755][ T3995] bond0: option tlb_dynamic_lb: mode dependency failed, not supported in mode balance-rr(0) [ 44.382672][ T4008] hub 2-0:1.0: USB hub found [ 44.388743][ T4008] hub 2-0:1.0: 8 ports detected [ 44.416643][ T4011] Driver unsupported XDP return value 0 on prog (id 159) dev N/A, expect packet loss! [ 44.462283][ T4016] netlink: 4 bytes leftover after parsing attributes in process `syz.1.188'. [ 44.528700][ T4018] 9pnet_fd: Insufficient options for proto=fd [ 44.538621][ T4020] FAULT_INJECTION: forcing a failure. [ 44.538621][ T4020] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 44.551773][ T4020] CPU: 1 UID: 0 PID: 4020 Comm: syz.0.190 Not tainted 6.12.0-rc5-syzkaller-00330-ga33ab3f94f51 #0 [ 44.562396][ T4020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 44.572475][ T4020] Call Trace: [ 44.575772][ T4020] [ 44.578723][ T4020] dump_stack_lvl+0xf2/0x150 [ 44.583338][ T4020] dump_stack+0x15/0x20 [ 44.587552][ T4020] should_fail_ex+0x223/0x230 [ 44.592337][ T4020] should_fail+0xb/0x10 [ 44.596546][ T4020] should_fail_usercopy+0x1a/0x20 [ 44.601589][ T4020] _copy_from_user+0x1e/0xb0 [ 44.606252][ T4020] usbdev_ioctl+0x101b/0x3e00 [ 44.610951][ T4020] ? do_vfs_ioctl+0x96e/0x1530 [ 44.615782][ T4020] ? selinux_file_ioctl+0x2f7/0x380 [ 44.620984][ T4020] ? __fget_files+0x1d4/0x210 [ 44.625679][ T4020] ? __pfx_usbdev_ioctl+0x10/0x10 [ 44.630717][ T4020] __se_sys_ioctl+0xcd/0x140 [ 44.635343][ T4020] __x64_sys_ioctl+0x43/0x50 [ 44.640054][ T4020] x64_sys_call+0x15cc/0x2d60 [ 44.644804][ T4020] do_syscall_64+0xc9/0x1c0 [ 44.649341][ T4020] ? clear_bhb_loop+0x55/0xb0 [ 44.654023][ T4020] ? clear_bhb_loop+0x55/0xb0 [ 44.658771][ T4020] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 44.664753][ T4020] RIP: 0033:0x7fb0321ee719 [ 44.669170][ T4020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.688786][ T4020] RSP: 002b:00007fb030e67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 44.697269][ T4020] RAX: ffffffffffffffda RBX: 00007fb0323a5f80 RCX: 00007fb0321ee719 [ 44.705365][ T4020] RDX: 0000000020000000 RSI: 000000008038550a RDI: 0000000000000005 [ 44.713415][ T4020] RBP: 00007fb030e67090 R08: 0000000000000000 R09: 0000000000000000 [ 44.721387][ T4020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.729538][ T4020] R13: 0000000000000000 R14: 00007fb0323a5f80 R15: 00007ffca37477b8 [ 44.737535][ T4020] [ 44.877991][ T4029] vhci_hcd: default hub control req: 8031 v0000 i0000 l0 [ 44.887800][ T4031] loop1: detected capacity change from 0 to 164 [ 44.894899][ T4029] loop2: detected capacity change from 0 to 1024 [ 44.911813][ T4031] rock: corrupted directory entry. extent=41, offset=65536, size=8 [ 44.947516][ T4031] rock: corrupted directory entry. extent=41, offset=65536, size=8 [ 44.957051][ T4031] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 44.990431][ T4037] syz.2.198[4037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.990509][ T4037] syz.2.198[4037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.001509][ T4038] loop4: detected capacity change from 0 to 512 [ 45.004193][ T4037] syz.2.198[4037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.020144][ T4038] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 45.050138][ T4038] EXT4-fs (loop4): 1 truncate cleaned up [ 45.057892][ T4038] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 45.117397][ T4051] syz.3.203[4051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.117472][ T4051] syz.3.203[4051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.118706][ T4050] Cannot find map_set index 0 as target [ 45.129858][ T4051] syz.3.203[4051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.146921][ T3322] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 45.263788][ T4055] netlink: 20 bytes leftover after parsing attributes in process `syz.4.204'. [ 45.289457][ T4067] netlink: 'syz.2.208': attribute type 4 has an invalid length. [ 45.325181][ T4070] syz.2.211[4070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.325290][ T4070] syz.2.211[4070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.341738][ T4070] syz.2.211[4070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.382251][ T4073] loop2: detected capacity change from 0 to 256 [ 45.418306][ T4075] vhci_hcd: default hub control req: 8031 v0000 i0000 l0 [ 45.432500][ T4075] loop4: detected capacity change from 0 to 1024 [ 45.539342][ T4077] loop2: detected capacity change from 0 to 512 [ 45.559886][ T4077] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 45.594940][ T4077] EXT4-fs (loop2): 1 truncate cleaned up [ 45.601038][ T4077] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 45.766559][ T3316] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 45.780235][ T4084] netlink: 40 bytes leftover after parsing attributes in process `syz.0.218'. [ 46.172249][ T4104] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 46.186027][ T4104] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 46.219518][ T4106] 9pnet_fd: Insufficient options for proto=fd [ 46.429252][ T4117] netlink: 'syz.1.230': attribute type 3 has an invalid length. [ 46.778626][ T4125] netlink: 'syz.2.232': attribute type 4 has an invalid length. [ 46.805839][ T4125] netlink: 'syz.2.232': attribute type 4 has an invalid length. [ 47.012858][ T4131] Cannot find map_set index 0 as target [ 47.078049][ T4137] 9pnet_fd: Insufficient options for proto=fd [ 47.089684][ T4133] loop1: detected capacity change from 0 to 512 [ 47.097001][ T4133] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 47.111556][ T4133] EXT4-fs (loop1): 1 truncate cleaned up [ 47.115019][ T4139] syz.4.239: attempt to access beyond end of device [ 47.115019][ T4139] md34: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 47.117901][ T4133] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 47.159430][ T4143] loop4: detected capacity change from 0 to 128 [ 47.198189][ T29] kauditd_printk_skb: 622 callbacks suppressed [ 47.198206][ T29] audit: type=1400 audit(1730697079.870:1675): avc: denied { mounton } for pid=4142 comm="syz.4.240" path="/50/bus" dev="loop4" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=dir permissive=1 [ 47.208661][ T3314] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 47.242877][ T29] audit: type=1400 audit(1730697079.910:1676): avc: denied { bind } for pid=4144 comm="syz.3.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 47.243271][ T4143] netlink: 'syz.4.240': attribute type 27 has an invalid length. [ 47.276211][ T4143] C: renamed from team_slave_0 (while UP) [ 47.279996][ T29] audit: type=1400 audit(1730697079.950:1677): avc: denied { map } for pid=4144 comm="syz.3.242" path="socket:[6699]" dev="sockfs" ino=6699 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 47.287653][ T4147] netlink: 'syz.1.241': attribute type 3 has an invalid length. [ 47.305194][ T29] audit: type=1400 audit(1730697079.950:1678): avc: denied { write } for pid=4144 comm="syz.3.242" path="socket:[6699]" dev="sockfs" ino=6699 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 47.366382][ T29] audit: type=1400 audit(1730697080.040:1679): avc: denied { cpu } for pid=4149 comm="syz.3.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 47.367334][ T4150] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 47.385819][ T29] audit: type=1400 audit(1730697080.040:1680): avc: denied { compute_member } for pid=4149 comm="syz.3.243" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 47.417192][ T29] audit: type=1326 audit(1730697080.090:1681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4151 comm="syz.4.244" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f036fd7e719 code=0x7ffc0000 [ 47.440879][ T29] audit: type=1326 audit(1730697080.090:1682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4151 comm="syz.4.244" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f036fd7e719 code=0x7ffc0000 [ 47.443479][ T4155] hsr0: entered allmulticast mode [ 47.464359][ T29] audit: type=1326 audit(1730697080.090:1683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4151 comm="syz.4.244" exe="/root/syz-executor" sig=0 arch=c000003e syscall=48 compat=0 ip=0x7f036fd7e719 code=0x7ffc0000 [ 47.469383][ T4155] hsr_slave_0: entered allmulticast mode [ 47.469402][ T4155] hsr_slave_1: entered allmulticast mode [ 47.504290][ T29] audit: type=1326 audit(1730697080.090:1684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4151 comm="syz.4.244" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f036fd7e719 code=0x7ffc0000 [ 47.527956][ T4155] hsr_slave_0: left promiscuous mode [ 47.534027][ T4155] hsr_slave_1: left promiscuous mode [ 47.543175][ T4155] hsr0 (unregistering): left allmulticast mode [ 47.560971][ T4158] netlink: 40 bytes leftover after parsing attributes in process `syz.1.246'. [ 47.600367][ T4160] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 47.623242][ T4160] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 47.683881][ T4167] syz.0.251: attempt to access beyond end of device [ 47.683881][ T4167] md34: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 47.752752][ T4171] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 47.765426][ T4176] 9pnet_fd: Insufficient options for proto=fd [ 47.778784][ T4179] netlink: 'syz.2.252': attribute type 4 has an invalid length. [ 47.817124][ T4179] netlink: 'syz.2.252': attribute type 4 has an invalid length. [ 47.869747][ T4182] 9pnet_fd: Insufficient options for proto=fd [ 47.887767][ T4184] 9pnet_fd: Insufficient options for proto=fd [ 47.900467][ T4186] geneve0: entered allmulticast mode [ 47.956586][ T4191] loop0: detected capacity change from 0 to 128 [ 47.965851][ T4191] vfat: Unknown parameter '' [ 48.024591][ T4193] hub 2-0:1.0: USB hub found [ 48.029970][ T4193] hub 2-0:1.0: 8 ports detected [ 48.093521][ T4202] netlink: 40 bytes leftover after parsing attributes in process `syz.1.264'. [ 48.167007][ T4204] loop0: detected capacity change from 0 to 256 [ 48.197646][ T4206] 9pnet_fd: Insufficient options for proto=fd [ 48.350854][ T4212] loop4: detected capacity change from 0 to 256 [ 48.354844][ T4210] loop0: detected capacity change from 0 to 512 [ 48.369403][ T4210] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 48.393508][ T4210] EXT4-fs (loop0): 1 truncate cleaned up [ 48.403937][ T4210] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 48.441081][ T3324] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 48.496107][ T4217] FAULT_INJECTION: forcing a failure. [ 48.496107][ T4217] name failslab, interval 1, probability 0, space 0, times 0 [ 48.508839][ T4217] CPU: 0 UID: 0 PID: 4217 Comm: syz.0.270 Not tainted 6.12.0-rc5-syzkaller-00330-ga33ab3f94f51 #0 [ 48.519489][ T4217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 48.529581][ T4217] Call Trace: [ 48.532859][ T4217] [ 48.535801][ T4217] dump_stack_lvl+0xf2/0x150 [ 48.540412][ T4217] dump_stack+0x15/0x20 [ 48.544569][ T4217] should_fail_ex+0x223/0x230 [ 48.549318][ T4217] ? getname_flags+0x81/0x3b0 [ 48.554008][ T4217] should_failslab+0x8f/0xb0 [ 48.558666][ T4217] kmem_cache_alloc_noprof+0x4c/0x290 [ 48.564095][ T4217] ? fput+0x14e/0x190 [ 48.568120][ T4217] getname_flags+0x81/0x3b0 [ 48.572670][ T4217] getname+0x17/0x20 [ 48.576600][ T4217] __x64_sys_execve+0x40/0x70 [ 48.581316][ T4217] x64_sys_call+0x1277/0x2d60 [ 48.586015][ T4217] do_syscall_64+0xc9/0x1c0 [ 48.590583][ T4217] ? clear_bhb_loop+0x55/0xb0 [ 48.595272][ T4217] ? clear_bhb_loop+0x55/0xb0 [ 48.599974][ T4217] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 48.605894][ T4217] RIP: 0033:0x7fb0321ee719 [ 48.610319][ T4217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.629946][ T4217] RSP: 002b:00007fb030e67038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 48.638437][ T4217] RAX: ffffffffffffffda RBX: 00007fb0323a5f80 RCX: 00007fb0321ee719 [ 48.646423][ T4217] RDX: 0000000000000000 RSI: 0000000020002200 RDI: 0000000020000300 [ 48.654404][ T4217] RBP: 00007fb030e67090 R08: 0000000000000000 R09: 0000000000000000 [ 48.662381][ T4217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 48.670382][ T4217] R13: 0000000000000000 R14: 00007fb0323a5f80 R15: 00007ffca37477b8 [ 48.678381][ T4217] [ 48.763957][ T4227] netlink: 20 bytes leftover after parsing attributes in process `syz.3.276'. [ 48.776141][ T4227] netlink: 19 bytes leftover after parsing attributes in process `syz.3.276'. [ 48.782422][ T4231] syz.0.277[4231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.796997][ T4227] netlink: 96 bytes leftover after parsing attributes in process `syz.3.276'. [ 48.823683][ T4227] loop3: detected capacity change from 0 to 1024 [ 48.830858][ T4227] EXT4-fs: Ignoring removed mblk_io_submit option [ 48.837606][ T4227] ================================================================== [ 48.845718][ T4227] BUG: KCSAN: data-race in __filemap_add_folio / filemap_write_and_wait_range [ 48.848800][ T4229] hub 2-0:1.0: USB hub found [ 48.854600][ T4227] [ 48.854609][ T4227] read-write to 0xffff888100631830 of 8 bytes by task 3305 on cpu 1: [ 48.854629][ T4227] __filemap_add_folio+0x430/0x6f0 [ 48.854669][ T4227] filemap_add_folio+0x9c/0x1b0 [ 48.854698][ T4227] page_cache_ra_unbounded+0x175/0x310 [ 48.860665][ T4229] hub 2-0:1.0: 8 ports detected [ 48.861597][ T4227] page_cache_sync_ra+0x252/0x670 [ 48.861633][ T4227] filemap_get_pages+0x2c1/0x10e0 [ 48.861665][ T4227] filemap_read+0x216/0x680 [ 48.904514][ T4227] blkdev_read_iter+0x20e/0x2c0 [ 48.909385][ T4227] vfs_read+0x5dc/0x700 [ 48.913557][ T4227] ksys_read+0xeb/0x1b0 [ 48.917730][ T4227] __x64_sys_read+0x42/0x50 [ 48.922247][ T4227] x64_sys_call+0x27d3/0x2d60 [ 48.926938][ T4227] do_syscall_64+0xc9/0x1c0 [ 48.931449][ T4227] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 48.937363][ T4227] [ 48.939684][ T4227] read to 0xffff888100631830 of 8 bytes by task 4227 on cpu 0: [ 48.947236][ T4227] filemap_write_and_wait_range+0x59/0x2c0 [ 48.953077][ T4227] set_blocksize+0x1d0/0x270 [ 48.957685][ T4227] sb_min_blocksize+0x63/0xe0 [ 48.962379][ T4227] ext4_fill_super+0x38b/0x3a10 [ 48.967243][ T4227] get_tree_bdev_flags+0x29f/0x310 [ 48.972374][ T4227] get_tree_bdev+0x1f/0x30 [ 48.976806][ T4227] ext4_get_tree+0x1c/0x30 [ 48.981233][ T4227] vfs_get_tree+0x56/0x1e0 [ 48.985666][ T4227] do_new_mount+0x227/0x690 [ 48.990185][ T4227] path_mount+0x49b/0xb30 [ 48.994528][ T4227] __se_sys_mount+0x27c/0x2d0 [ 48.999222][ T4227] __x64_sys_mount+0x67/0x80 [ 49.003832][ T4227] x64_sys_call+0x203e/0x2d60 [ 49.008520][ T4227] do_syscall_64+0xc9/0x1c0 [ 49.013031][ T4227] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 49.018948][ T4227] [ 49.021268][ T4227] value changed: 0x0000000000000003 -> 0x0000000000000004 [ 49.028375][ T4227] [ 49.030695][ T4227] Reported by Kernel Concurrency Sanitizer on: [ 49.036839][ T4227] CPU: 0 UID: 0 PID: 4227 Comm: syz.3.276 Not tainted 6.12.0-rc5-syzkaller-00330-ga33ab3f94f51 #0 [ 49.047430][ T4227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 49.057490][ T4227] ================================================================== [ 49.068360][ T4227] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 49.079150][ T4227] JBD2: no valid journal superblock found [ 49.084939][ T4227] EXT4-fs (loop3): Could not load journal inode [ 49.124047][ T4233] netlink: 4 bytes leftover after parsing attributes in process `syz.0.277'. [ 49.133542][ T4233] bridge_slave_1: left allmulticast mode [ 49.139324][ T4233] bridge_slave_1: left promiscuous mode [ 49.145042][ T4233] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.152764][ T4233] bridge_slave_0: left allmulticast mode [ 49.158498][ T4233] bridge_slave_0: left promiscuous mode [ 49.164235][ T4233] bridge0: port 1(bridge_slave_0) entered disabled state