last executing test programs: 3.044503006s ago: executing program 4 (id=151): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$inet(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d000000000000060400", 0x32}], 0x1) r0 = gettid() timer_create(0x1, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000300)=0x2) ioctl$PPPIOCSACTIVE(r1, 0x40047459, &(0x7f0000000080)={0xfffffffffffffe43, 0x0}) read(r1, 0x0, 0x0) 3.043923746s ago: executing program 1 (id=162): r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100d0000000fbdbdf250100000018000180140002007665746831"], 0x2c}, 0x1, 0x0, 0x0, 0x840}, 0x4008800) r2 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) connect$inet(r2, &(0x7f0000000480)={0x2, 0x4e20, @multicast2}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) recvmmsg(r2, &(0x7f0000002e00)=[{{0x0, 0x2a00, 0x0, 0x0, &(0x7f0000000440)=""/33, 0x21}, 0xffffffc6}], 0x1, 0x45833af92e4b39fd, 0x0) 2.685818751s ago: executing program 1 (id=152): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001680)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffc01, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x21, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0xc0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001ec0)={0x24, r4, 0xc4fc9e906872338b, 0x70bd2d, 0x0, {{0x15}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x4}]}]}]}]}, 0x24}}, 0x0) clock_gettime(0x6, 0x0) 2.430895454s ago: executing program 1 (id=153): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = gettid() timer_create(0x8, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) readv(r1, &(0x7f0000001140)=[{&(0x7f0000000700)=""/206, 0x18}], 0x1) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x401c5820, 0x0) bind$rds(r2, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route_sched(r4, 0x0, 0x4001000) 2.376606125s ago: executing program 3 (id=155): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000140)) ioctl$KDSETLED(r1, 0x4b32, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb55a2a630bf7c045f94cd977", 0x18, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r2}, 0x18) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="44000000190a01", @ANYRES16=r2], 0x44}, 0x1, 0x0, 0x0, 0xc4000}, 0x40000040) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@private2, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x100000, &(0x7f0000000540)={[{@none}, {@clone_children}, {@release_agent={'release_agent', 0x3d, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}}, {@cpuset_v2_mode}, {@none}, {}], [{@euid_gt={'euid>', r5}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@dont_appraise}, {@fsname={'fsname', 0x3d, 'sched_switch\x00'}}]}) 2.353205106s ago: executing program 2 (id=156): bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0xe, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000080)={[{@delalloc}, {@data_err_abort}, {@discard}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@dax_inode}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000000a40)="$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") openat$selinux_create(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/vlan0\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00'}) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x6000) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 2.339523366s ago: executing program 3 (id=157): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r5}, 0x10) syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x0, 0x2, 0x4}, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r2, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) 2.285477147s ago: executing program 3 (id=159): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r1}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r3 = dup(r2) r4 = open(&(0x7f0000000000)='./bus\x00', 0x40542, 0x0) ftruncate(r4, 0xee72) sendfile(r3, r4, 0x0, 0x8000fffffffe) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000180)=0x19) 2.232742048s ago: executing program 2 (id=161): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0xb76e}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$packet(0x11, 0x2, 0x300) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @random="424e1aa2e0d4", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x1, 0x0, 0x11, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "6d4dfdeb8cf7bbfe143803bec2ce783e04cd32308cdd8dde", "c71cb8adfce542a4bc5a026c208fd0c45787e4aa384e3d26b21ea41cc128364c"}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x6, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 2.148205899s ago: executing program 3 (id=163): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) syz_usb_connect$hid(0x4, 0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x8, 0x3, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000001200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000380)={r1, r3, 0x1, 0x0, @void}, 0x10) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0xfdfe, 0x7, @remote, 0x4}, 0x1c) connect$pppl2tp(r4, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r5, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) writev(r4, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34000}], 0x1) 2.03250268s ago: executing program 4 (id=164): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd824498949714ffaac8a6f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa7088c60897d4a6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3540546bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r4, &(0x7f0000000180)="1a", 0x34000, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000400)='kmem_cache_free\x00', r5}, 0x10) shutdown(r4, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r3, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x33fe0}], 0x1}, 0x0) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) 1.946373011s ago: executing program 4 (id=166): socket$nl_route(0x10, 0x3, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) epoll_create1(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000000), 0x651, 0x0) r1 = socket$inet(0x2, 0x1, 0x100) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 1.589487127s ago: executing program 3 (id=167): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x27}, 0x62) listen(r0, 0x3) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r2, &(0x7f00000009c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)='X', 0x8030000}], 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffe, 0x0, 0x0, 0x3, 0x2000000000000000}, 0x0, &(0x7f00000002c0)={0x3ff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0) 1.439112649s ago: executing program 1 (id=168): syz_usb_connect(0x0, 0x36, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="540000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002c0012800e0001006970366772657461700000001800028014000700fc00000000000000000000000000000008000a00", @ANYRES32=r5], 0x54}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="200000001000250800170000000000000a000000", @ANYRES32=r8, @ANYBLOB="01"], 0x20}}, 0x0) 1.409365509s ago: executing program 2 (id=169): syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x81c000, &(0x7f0000000080)={[{@nouid32}], [{@seclabel}]}, 0x1, 0x72b, &(0x7f00000007c0)="$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") r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_emit_ethernet(0x5e, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYRESOCT, @ANYRES8, @ANYRESDEC, @ANYRES8=r0, @ANYRES64=r0, @ANYRES32=r1, @ANYRESDEC, @ANYRES64], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket(0x28, 0x5, 0x0) socket(0x28, 0x5, 0x632c) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r3, 0x0, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@local, @in=@empty}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r4 = getpid() process_vm_readv(r4, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) 1.221522772s ago: executing program 2 (id=170): openat$pidfd(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b000000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = memfd_create(&(0x7f00000006c0)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\xf2\xed\x04\x00\x00\x00\xd4N\x12\x9b\x1f\t\xd1Z+\x86T\x16\xf8\x01\x00\x00\x00\x9f+\x8d!\x0fG\xab\xc2\xdc\xa3\xb3\xae8\x9f9?\xefo\xa4k\x01\xb2>\xa1\x9c\x86xm\xe6\x9bZ4\x91\x1a\xdb\xdd\x89\xb9\xc0LF;\xd6\x84\x195\x06\x00\x00\x00~\xf3S\x12\"p^\xc1jP\x8a\xc6[\xbd\xe7q]\xdd\r\x1aZS\x01*\x1b\xfd\xbcMA\xdcq\xa1\x00\xb3\xf9\x91r\x7f\xdc\xf1\xc3G,\xdb\xccS\x15\x95b\x17\xab\xe4?\x96\x95\xa4kP\x99YO\xb8V\xd5p\x90X\xaaf', 0x0) fallocate(r0, 0x0, 0x400000000000000, 0x2) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x5, 0xa5d4}, 0x880, 0xd47d, 0x0, 0x5, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180100000100a7d90000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1000000, @void, @value}, 0x94) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff"], 0x48) write$selinux_load(r1, &(0x7f0000000000)=ANY=[], 0x3000) 1.091857494s ago: executing program 2 (id=172): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000080)=r1}, 0x20) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x21081e, &(0x7f00000003c0)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4739}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800}}, {@dioread_nolock}, {@nomblk_io_submit}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$eJzs3c9vG1kdAPCvnThx0uwmu+wBEOyW3YWCqjqJuxut9gDLCSFUCdEjSG1I3CiKHUexU5rQQ3rmikQlTnDkD+DcE3cuCG5cygGJHxGoQeLg1YwnqZvaTdQkdhR/PtJo3ps39fe9pvNe/U3iF8DQuhoRuxExFhF3I2I6u57LjvisfST3Pdt7uLS/93ApF63W7X/l0vbkWnT8mcSV7DWLEfGj70X8NPdy3Mb2ztpitVrZzOqzzdrGbGN758ZqbXGlslJZL5cX5hfmPrn5cfnMxvpebSwrffXpH3e/9fOkW1PZlc5xnKX20AuHcRKjEfGD8wg2ACPZeMYG3RFeSz4i3o6I99PnfzpG0q8mAHCZtVrT0ZrurAMAl10+zYHl8qUsFzAV+Xyp1M7hvROT+Wq90bx+r761vtzOlc1EIX9vtVqZy3KFM1HIJfX5tPy8Xj5SvxkRb0XEL8cn0nppqV5dHuR/fABgiF05sv7/d7y9/gMAl1xx0B0AAPrO+g8Aw8f6DwDDx/oPAMOnvf5PDLobAEAfef8PAMPH+g8AQ+WHt24lR2s/+/zr5fvbW2v1+zeWK421Um1rqbRU39wordTrK+ln9tSOe71qvb4x/1FsPZj59kajOdvY3rlTq2+tN++kn+t9p1JI79rtw8gAgF7eeu/JX3LJivzpRHpEx14OhYH2DDhv+UF3ABiYkUF3ABgYu33B8DrFe3zpAbgkumzR+4Jit18QarVarfPrEnDOrn1J/h+GVUf+308Bw5CR/4fhJf8Pw6vVyp10z/846Y0AwMUmxw/0+P7/29n5d9k3B36yfPSOx+fZKwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALjYDvb/LWV7gU9FPl8qRbwRETNRyN1brVbmIuLNiPjzeGE8qc8PuM8AwGnl/57L9v+6Nv3h1AtN7145LI5FxM9+fftXDxabzc0/RYzl/j1+cL35OLte7n/vAYDjHazT6bnjjfyzvYdLB0c/+/OP70ZEsR1/f28s9g/jj8Zoei5GISIm/5PL6m25jtzFaew+iogvdht/LqbSHEh759Oj8ZPYb/Q1fv6F+Pm0rX1O/i6+cAZ9gWHzJJl/Puv2/OXjanru/vwX0xnq9LL5L3mppf10Dnwe/2D+G+kx/109aYyP/vD9dmni5bZHEV8ejTiIvd8x/xzEz/WI/+EJ4//1K+++36ut9ZuIa9E9fmes2WZtY7axvXNjtba4UlmprJfLC/MLc5/c/Lg8m+aoZ3uvBv/89PqbvdqS8U/2iF88ZvxfP+H4f/v/uz/+2ivif/ODbvHz8c4r4idr4jdOGH9x8vfFXm1J/OUe4z/u63/9hPGf/m3npW3DAYDBaWzvrC1Wq5VNBYWLX0j+yV6AbnQtfKdfscaie9MvPmg/00eaWq3XitVrxjiLrBtwERw+9BHxv0F3BgAAAAAAAAAAAAAA6Kofv7E06DECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABweX0eAAD//19xzyM=") r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x107042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x187842, 0x167) r4 = open(&(0x7f0000000140)='./file1\x00', 0x66842, 0x21) pwritev2(r4, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x7abff, 0x0, 0x3) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000240)={0x3920e, r2, 0x0, 0x0, 0x9, 0x3}) 993.747445ms ago: executing program 4 (id=174): syz_mount_image$ext4(&(0x7f0000000540)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x88, &(0x7f0000000100)={[{@nogrpid}, {@min_batch_time}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@usrjquota}, {@nodiscard}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x149a82, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000340)={0x1, &(0x7f0000000040)=[{0x1ab, 0x9, 0xe, 0xef}]}, 0x10) write$cgroup_int(r0, &(0x7f0000000000)=0xfe8e, 0x12) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0xffffffffffffffaa, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x10) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f00000003c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 785.160299ms ago: executing program 2 (id=175): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$inet(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d000000000000060400", 0x32}], 0x1) r0 = gettid() timer_create(0x1, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000300)=0x2) ioctl$PPPIOCSACTIVE(r1, 0x40047459, &(0x7f0000000080)={0xfffffffffffffe43, 0x0}) read(r1, 0x0, 0x0) 779.513908ms ago: executing program 1 (id=176): r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x107042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x187842, 0x167) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20008000, &(0x7f0000000ac0)={0xa, 0x4e23, 0x2, @loopback, 0x8}, 0x1c) open(0x0, 0x66842, 0x21) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000dc0)={0x3920e, r1, 0x3, 0x0, 0x43d, 0x200}) unlink(0x0) 744.090229ms ago: executing program 4 (id=177): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x0, 0x0, &(0x7f0000000640)='syzkaller\x00', 0x9ac, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000700)=[r0, r0], &(0x7f0000000740)=[{0x3, 0x5, 0xc, 0x6}, {0x2, 0x3, 0x3, 0xb}, {0x2, 0x5, 0x8, 0x6}, {0x3, 0x3, 0x10}], 0x10, 0x4, @void, @value}, 0x94) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)=@generic={&(0x7f00000007c0)='./cgroup\x00'}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000ac0)={{r0}, &(0x7f0000000a40), &(0x7f0000000a80)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0xd, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x401}, [@jmp={0x5, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffff}]}, &(0x7f0000000280)='syzkaller\x00', 0x9, 0x3a, &(0x7f0000000500)=""/58, 0x41100, 0x6, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0xc, 0x2, 0x6}, 0x10, 0x0, r1, 0xa, &(0x7f0000000b80), &(0x7f0000000bc0)=[{0x3, 0x1, 0x0, 0x3}, {0x1, 0x1, 0x9, 0xc}, {0x2, 0x3, 0x0, 0x1}, {0x5, 0x1, 0x6, 0x1}, {0x5, 0x4, 0xa, 0xf}, {0x5, 0x2, 0x4, 0x18683993c40a9e88}, {0x0, 0x4, 0xb}, {0x0, 0x5, 0x1, 0x5}, {0x2, 0x2, 0x8, 0x6}, {0x3, 0x3, 0x5, 0x1}], 0x10, 0x2, @void, @value}, 0x94) unlink(&(0x7f0000000140)='./cgroup\x00') ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000340)=0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00'}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x7}, 0x1002, 0xc8, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9fd, 0x84, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e80)={{}, &(0x7f0000000e00), &(0x7f0000000e40)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r2}, 0x38) 743.485559ms ago: executing program 0 (id=178): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) chmod(&(0x7f0000000000)='./file0\x00', 0x121) 690.38545ms ago: executing program 1 (id=179): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r2, 0x0, {0x2, 0x0, 0x6}, 0xfe}, 0x18) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$inet_mptcp(0x2, 0x1, 0x106) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={0x0, 0x40}, 0x1, 0x0, 0x0, 0x44}, 0x50) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000400)="81b641f1f3843704b6", 0x9}], 0x1}, 0x48005) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f0000000100)={0x1d, r4, 0x2, {0x0, 0xf0, 0x1}, 0xff}, 0x18) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x0, {0x0, 0x0, 0x74, r4, {0xfffd, 0x10}, {0x1, 0x1}, {0xfff2, 0xd}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4012}, 0x840) 624.364371ms ago: executing program 3 (id=180): syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x414, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000f40)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x12) write(r1, &(0x7f0000004200)='t', 0x1) sendfile(r1, r0, 0x0, 0x3ffff) sendfile(r1, r0, 0x0, 0x7bfff000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1, 0x31, 0xffffffffffffffff, 0x8871b000) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1b) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) 623.829991ms ago: executing program 0 (id=181): r0 = syz_open_procfs(0x0, &(0x7f0000001380)='task\x00') fchdir(r0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fchdir(r1) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') mount(&(0x7f0000000300)=@rnullb, &(0x7f0000000040)='./cgroup\x00', 0x0, 0x2001885, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x180, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000004c0)={0x0, 0xfb, 0xec, 0x5, 0x3d, "219cd0527db6a4bdba6c944b59024cdf", "50fb195b115531524f34c540682c4e506618eeb2644bac931584343936aee88e9e85f7b9cfa3605eed43c3a84411e16d8dc28eab307df63d33dd358071ab7048a9cd7e0f9a9e31bb55202788189d81965736d89ce9dea1c03b427e6cee91e934ff69bd4c791565c464d4836cedbb8d69085441ef361d402b3a346158f990069f2de6ff7d62958f1de530ade2ddca2c637d01b899523a753b422fe0da3918cfc91f21b4bc8a45b6f4696e06b3c43061a1f4806d06852b096275b77cf4b4d830bf0b41cc396c2aef7ff6d3da37167c265640247d8363f1b4"}, 0xec, 0x4) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0xffff, 0x2, 0x4, {0x2, 0x4e24, @private=0xa010102}}, 0x80, 0x0, 0x0, &(0x7f0000000600)=ANY=[], 0x10b8}, 0x200048c0) lsetxattr$security_selinux(&(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0xd, 0x2) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x25c}}, 0x0) 623.144711ms ago: executing program 4 (id=182): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@i, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}, @call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @private2, 0xffffff71}, @in6={0xa, 0x4e22, 0xffffffff, @private2={0xfc, 0x2, '\x00', 0x1}, 0x9}], 0x38) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001b40)={r3, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 510.610682ms ago: executing program 0 (id=183): syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x81c000, &(0x7f0000000080)={[{@nouid32}], [{@seclabel}]}, 0x1, 0x72b, &(0x7f00000007c0)="$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") r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x2) syz_emit_ethernet(0x5e, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYRESOCT, @ANYRES8, @ANYRESDEC, @ANYRES8=r0, @ANYRES64=r0, @ANYRES32=r1, @ANYRESDEC, @ANYRES64], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket(0x28, 0x5, 0x0) socket(0x28, 0x5, 0x632c) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0, 0x14}, 0x1, 0x0, 0x0, 0x8094}, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@local, @in=@empty}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r4 = getpid() process_vm_readv(r4, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}], 0x1, &(0x7f0000008640), 0x0, 0x0) 70.953579ms ago: executing program 0 (id=184): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r0}, 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x10000000}, 0x800, 0xc8, 0xffff, 0x7, 0xf9, 0xfffffffc, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) 533.04µs ago: executing program 0 (id=186): writev(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x18) mmap(&(0x7f000000d000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x5) syz_emit_ethernet(0x4a, &(0x7f0000000200)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0xfffc}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000900)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0xfffe}}}}}}}, 0x0) 0s ago: executing program 0 (id=187): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ac0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='sched_switch\x00', r0}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0x8, 0x12, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000540), 0x84) perf_event_open(&(0x7f00000004c0)={0x8, 0x80, 0x0, 0xf, 0x0, 0x0, 0x82, 0x200000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x9}, 0x18204, 0x0, 0x3, 0x0, 0x0, 0x5338c7af, 0x0, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x8, 0xdd18b, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext={0x4, 0x100000003}, 0x3323, 0x5, 0x3, 0x0, 0x9, 0x800001, 0xfff7, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$9p_tcp(0x0, &(0x7f0000000300)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x8, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r4, &(0x7f0000000b80)=[{&(0x7f00000004c0)=@in={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000040)="af", 0x1}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="20000000000000008400000008000000ff020000000000000000000000000001180000000000000084000000050000003000000002000000300000000000000002050002000000060000000e090000df000000050000003ebe3a3c000000000000000000", @ANYRES32=0x0, @ANYBLOB="200000000000000084000000080000000000000000000000000000000000000018000000000000008400000005000000000000000500000018000000000000008400000007000000e00000020000000018000000000000008400000000000000"], 0xd0, 0x10a0}], 0x1, 0x24000001) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.22' (ED25519) to the list of known hosts. [ 25.080917][ T29] audit: type=1400 audit(1750022888.895:62): avc: denied { mounton } for pid=3292 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.081990][ T3292] cgroup: Unknown subsys name 'net' [ 25.103663][ T29] audit: type=1400 audit(1750022888.895:63): avc: denied { mount } for pid=3292 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.131392][ T29] audit: type=1400 audit(1750022888.955:64): avc: denied { unmount } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.224086][ T3292] cgroup: Unknown subsys name 'cpuset' [ 25.230314][ T3292] cgroup: Unknown subsys name 'rlimit' [ 25.400833][ T29] audit: type=1400 audit(1750022889.215:65): avc: denied { setattr } for pid=3292 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.424305][ T29] audit: type=1400 audit(1750022889.215:66): avc: denied { create } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.439126][ T3299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.444773][ T29] audit: type=1400 audit(1750022889.215:67): avc: denied { write } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.473710][ T29] audit: type=1400 audit(1750022889.215:68): avc: denied { read } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 25.493976][ T29] audit: type=1400 audit(1750022889.225:69): avc: denied { mounton } for pid=3292 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.510749][ T3292] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.518816][ T29] audit: type=1400 audit(1750022889.225:70): avc: denied { mount } for pid=3292 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.551000][ T29] audit: type=1400 audit(1750022889.275:71): avc: denied { relabelto } for pid=3299 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.685286][ T3307] chnl_net:caif_netlink_parms(): no params data found [ 26.722703][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 26.767962][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 26.788532][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 26.802051][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 26.850994][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.858162][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.865436][ T3307] bridge_slave_0: entered allmulticast mode [ 26.872004][ T3307] bridge_slave_0: entered promiscuous mode [ 26.893609][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.900793][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.908138][ T3311] bridge_slave_0: entered allmulticast mode [ 26.914679][ T3311] bridge_slave_0: entered promiscuous mode [ 26.921023][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.928185][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.935527][ T3307] bridge_slave_1: entered allmulticast mode [ 26.941965][ T3307] bridge_slave_1: entered promiscuous mode [ 26.955244][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.962398][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.969631][ T3311] bridge_slave_1: entered allmulticast mode [ 26.976076][ T3311] bridge_slave_1: entered promiscuous mode [ 27.025073][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.035164][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.059857][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.069060][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.076173][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.083469][ T3314] bridge_slave_0: entered allmulticast mode [ 27.089816][ T3314] bridge_slave_0: entered promiscuous mode [ 27.097272][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.106429][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.113609][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.120771][ T3306] bridge_slave_0: entered allmulticast mode [ 27.127132][ T3306] bridge_slave_0: entered promiscuous mode [ 27.133821][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.140886][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.148089][ T3306] bridge_slave_1: entered allmulticast mode [ 27.154509][ T3306] bridge_slave_1: entered promiscuous mode [ 27.160735][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.167904][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.175057][ T3315] bridge_slave_0: entered allmulticast mode [ 27.181364][ T3315] bridge_slave_0: entered promiscuous mode [ 27.192701][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.199816][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.206989][ T3314] bridge_slave_1: entered allmulticast mode [ 27.213537][ T3314] bridge_slave_1: entered promiscuous mode [ 27.228917][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.236023][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.243421][ T3315] bridge_slave_1: entered allmulticast mode [ 27.249867][ T3315] bridge_slave_1: entered promiscuous mode [ 27.281672][ T3311] team0: Port device team_slave_0 added [ 27.293277][ T3307] team0: Port device team_slave_0 added [ 27.300079][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.314679][ T3311] team0: Port device team_slave_1 added [ 27.321372][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.330998][ T3307] team0: Port device team_slave_1 added [ 27.337715][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.352785][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.367709][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.396536][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.405807][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.412830][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.438775][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.454796][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.461880][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.488021][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.499374][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.506410][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.532366][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.543926][ T3306] team0: Port device team_slave_0 added [ 27.554910][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.561871][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.587913][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.606515][ T3306] team0: Port device team_slave_1 added [ 27.620106][ T3315] team0: Port device team_slave_0 added [ 27.626310][ T3314] team0: Port device team_slave_0 added [ 27.632875][ T3314] team0: Port device team_slave_1 added [ 27.654621][ T3315] team0: Port device team_slave_1 added [ 27.660579][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.667595][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.693546][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.705381][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.712442][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.738520][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.774899][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.781886][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.807902][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.835059][ T3311] hsr_slave_0: entered promiscuous mode [ 27.841155][ T3311] hsr_slave_1: entered promiscuous mode [ 27.847885][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.854872][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.880944][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.896393][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.903411][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.929471][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.940653][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.947707][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 27.973748][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.990272][ T3307] hsr_slave_0: entered promiscuous mode [ 27.996293][ T3307] hsr_slave_1: entered promiscuous mode [ 28.002075][ T3307] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.009761][ T3307] Cannot create hsr debugfs directory [ 28.031231][ T3306] hsr_slave_0: entered promiscuous mode [ 28.037264][ T3306] hsr_slave_1: entered promiscuous mode [ 28.043058][ T3306] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.050686][ T3306] Cannot create hsr debugfs directory [ 28.111791][ T3315] hsr_slave_0: entered promiscuous mode [ 28.118237][ T3315] hsr_slave_1: entered promiscuous mode [ 28.124297][ T3315] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.131853][ T3315] Cannot create hsr debugfs directory [ 28.142047][ T3314] hsr_slave_0: entered promiscuous mode [ 28.148312][ T3314] hsr_slave_1: entered promiscuous mode [ 28.155295][ T3314] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 28.162843][ T3314] Cannot create hsr debugfs directory [ 28.331968][ T3307] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 28.345053][ T3307] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 28.356097][ T3307] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 28.367846][ T3307] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 28.394415][ T3311] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 28.402888][ T3311] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 28.412655][ T3311] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 28.421744][ T3311] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 28.452853][ T3315] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 28.463252][ T3315] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 28.479430][ T3315] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 28.488161][ T3315] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 28.517336][ T3306] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 28.540815][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.548570][ T3306] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 28.572323][ T3306] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 28.583195][ T3307] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.592431][ T3314] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 28.601169][ T3314] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 28.610156][ T3306] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 28.623062][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.630144][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.639261][ T3314] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 28.648376][ T3314] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 28.662008][ T1812] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.669107][ T1812] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.704013][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.718482][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.745729][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.754563][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.769385][ T3307] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 28.779987][ T3307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.793775][ T1812] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.800821][ T1812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.810938][ T1812] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.817994][ T1812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.837600][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.844705][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.857046][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.864127][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.968003][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.979844][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.998217][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.009543][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.026935][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.035218][ T1082] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.042364][ T1082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.051096][ T1082] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.058174][ T1082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.071728][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.100048][ T1812] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.107195][ T1812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.123317][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.135480][ T1082] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.142567][ T1082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.161312][ T3306] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.171779][ T3306] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.242468][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.302619][ T3315] veth0_vlan: entered promiscuous mode [ 29.315161][ T3311] veth0_vlan: entered promiscuous mode [ 29.337909][ T3315] veth1_vlan: entered promiscuous mode [ 29.346659][ T3307] veth0_vlan: entered promiscuous mode [ 29.354296][ T3311] veth1_vlan: entered promiscuous mode [ 29.369467][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.378328][ T3307] veth1_vlan: entered promiscuous mode [ 29.416874][ T3311] veth0_macvtap: entered promiscuous mode [ 29.425268][ T3315] veth0_macvtap: entered promiscuous mode [ 29.432802][ T3307] veth0_macvtap: entered promiscuous mode [ 29.440315][ T3315] veth1_macvtap: entered promiscuous mode [ 29.451437][ T3307] veth1_macvtap: entered promiscuous mode [ 29.458764][ T3311] veth1_macvtap: entered promiscuous mode [ 29.480778][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.498753][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.513826][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.523001][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.534776][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.544004][ T3307] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.552756][ T3307] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.561528][ T3307] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.570277][ T3307] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.581132][ T3315] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.589910][ T3315] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.598686][ T3315] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.607550][ T3315] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.631737][ T3306] veth0_vlan: entered promiscuous mode [ 29.638815][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.652059][ T3306] veth1_vlan: entered promiscuous mode [ 29.667294][ T3311] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.676096][ T3311] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.684866][ T3311] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.693629][ T3311] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.714363][ T3314] veth0_vlan: entered promiscuous mode [ 29.735343][ T3307] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 29.751727][ T3314] veth1_vlan: entered promiscuous mode [ 29.791629][ T3306] veth0_macvtap: entered promiscuous mode [ 29.811085][ T3306] veth1_macvtap: entered promiscuous mode [ 29.834216][ T3314] veth0_macvtap: entered promiscuous mode [ 29.855030][ T3314] veth1_macvtap: entered promiscuous mode [ 29.865143][ T3482] capability: warning: `syz.3.4' uses deprecated v2 capabilities in a way that may be insecure [ 29.883837][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.895809][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.966236][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.984704][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.998124][ T3306] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.007061][ T3306] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.015840][ T3306] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.024717][ T3306] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.035954][ T3314] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.044797][ T3314] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.053670][ T3314] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.062391][ T3314] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.119695][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 30.119710][ T29] audit: type=1400 audit(1750022893.935:108): avc: denied { open } for pid=3488 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.144819][ T29] audit: type=1400 audit(1750022893.935:109): avc: denied { kernel } for pid=3488 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.214772][ T29] audit: type=1400 audit(1750022894.035:110): avc: denied { mount } for pid=3491 comm="syz.1.2" name="/" dev="configfs" ino=1088 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 30.273023][ T29] audit: type=1400 audit(1750022894.065:111): avc: denied { search } for pid=3491 comm="syz.1.2" name="/" dev="configfs" ino=1088 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 30.295159][ T29] audit: type=1400 audit(1750022894.065:112): avc: denied { create } for pid=3491 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.315390][ T29] audit: type=1400 audit(1750022894.065:113): avc: denied { write } for pid=3491 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.335559][ T29] audit: type=1400 audit(1750022894.065:114): avc: denied { read } for pid=3491 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.363981][ T3498] netlink: 8 bytes leftover after parsing attributes in process `syz.0.8'. [ 30.523388][ T29] audit: type=1400 audit(1750022894.335:115): avc: denied { execute } for pid=3501 comm="syz.0.10" path=2F6D656D66643A0B656DDA9952406DFCFE9B232AFF202864656C6574656429 dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 30.870926][ T29] audit: type=1400 audit(1750022894.685:116): avc: denied { cpu } for pid=3506 comm="syz.2.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.904957][ T3509] loop1: detected capacity change from 0 to 128 [ 30.914497][ T29] audit: type=1400 audit(1750022894.735:117): avc: denied { mount } for pid=3508 comm="syz.1.11" name="/" dev="loop1" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 30.937336][ T3509] syz.1.11: attempt to access beyond end of device [ 30.937336][ T3509] loop1: rw=0, sector=121, nr_sectors = 120 limit=128 [ 30.991922][ T12] kworker/u8:0: attempt to access beyond end of device [ 30.991922][ T12] loop1: rw=1, sector=241, nr_sectors = 800 limit=128 [ 31.036372][ T3515] netlink: 12 bytes leftover after parsing attributes in process `syz.1.14'. [ 31.303090][ T3532] loop4: detected capacity change from 0 to 764 [ 31.333575][ T3532] rock: directory entry would overflow storage [ 31.338906][ T3535] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 31.339777][ T3532] rock: sig=0x4f50, size=4, remaining=3 [ 31.351423][ T3535] syzkaller0: entered promiscuous mode [ 31.353280][ T3532] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 31.366430][ T3535] syzkaller0: entered allmulticast mode [ 31.391521][ T3537] serio: Serial port ttyS3 [ 31.551117][ T3547] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 31.592947][ T3550] loop0: detected capacity change from 0 to 128 [ 31.601173][ T3552] netlink: 16 bytes leftover after parsing attributes in process `syz.2.27'. [ 31.850987][ T3556] process 'syz.2.29' launched './file1' with NULL argv: empty string added [ 31.891217][ T3565] x_tables: duplicate underflow at hook 1 [ 31.901695][ T3567] loop3: detected capacity change from 0 to 512 [ 31.922211][ T3567] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 31.935499][ T3567] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 31.949571][ T3567] EXT4-fs (loop3): 1 truncate cleaned up [ 31.956089][ T3567] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 31.987343][ T3571] netlink: 'syz.0.34': attribute type 10 has an invalid length. [ 31.997937][ T3571] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.005179][ T3571] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.016119][ T3571] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.023264][ T3571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.030697][ T3571] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.037818][ T3571] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.049223][ T3571] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 32.059777][ T3311] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.118990][ T3580] loop4: detected capacity change from 0 to 1764 [ 32.126445][ T3571] netlink: 4 bytes leftover after parsing attributes in process `syz.0.34'. [ 32.139760][ T3580] ======================================================= [ 32.139760][ T3580] WARNING: The mand mount option has been deprecated and [ 32.139760][ T3580] and is ignored by this kernel. Remove the mand [ 32.139760][ T3580] option from the mount to silence this warning. [ 32.139760][ T3580] ======================================================= [ 32.177872][ T3571] bridge_slave_1: left allmulticast mode [ 32.183576][ T3571] bridge_slave_1: left promiscuous mode [ 32.189284][ T3571] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.210287][ T3571] bridge_slave_0: left allmulticast mode [ 32.216201][ T3571] bridge_slave_0: left promiscuous mode [ 32.221958][ T3571] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.224268][ T3586] loop3: detected capacity change from 0 to 512 [ 32.239096][ T3571] bond0: (slave bridge0): Releasing backup interface [ 32.277467][ T3586] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 32.513702][ T3571] syz.0.34 (3571) used greatest stack depth: 10856 bytes left [ 32.515790][ T3608] netlink: 4 bytes leftover after parsing attributes in process `syz.1.47'. [ 32.701429][ T3625] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 32.960050][ T3641] loop0: detected capacity change from 0 to 512 [ 32.981498][ T3641] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 33.063387][ T3641] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 33.076175][ T3641] ext4 filesystem being mounted at /15/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 33.157899][ C0] hrtimer: interrupt took 37174 ns [ 33.231116][ T3655] EXT4-fs error (device loop0): ext4_do_update_inode:5568: inode #18: comm syz.0.61: corrupted inode contents [ 33.284894][ T3655] EXT4-fs error (device loop0): ext4_dirty_inode:6459: inode #18: comm syz.0.61: mark_inode_dirty error [ 33.342145][ T3655] EXT4-fs error (device loop0): ext4_do_update_inode:5568: inode #18: comm syz.0.61: corrupted inode contents [ 33.371883][ T3655] EXT4-fs error (device loop0): ext4_xattr_delete_inode:2991: inode #18: comm syz.0.61: mark_inode_dirty error [ 33.394304][ T3664] pim6reg1: entered promiscuous mode [ 33.399744][ T3664] pim6reg1: entered allmulticast mode [ 33.436451][ T3655] EXT4-fs error (device loop0): ext4_xattr_delete_inode:2994: inode #18: comm syz.0.61: mark inode dirty (error -117) [ 33.477339][ T3666] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 33.484877][ T3666] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 33.494001][ T3666] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 33.501442][ T3666] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 33.513535][ T3655] EXT4-fs warning (device loop0): ext4_evict_inode:274: xattr delete (err -117) [ 33.571716][ T3315] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.182666][ T3688] loop4: detected capacity change from 0 to 1024 [ 34.183094][ T3688] EXT4-fs: Ignoring removed bh option [ 34.191510][ T3688] EXT4-fs: inline encryption not supported [ 34.224499][ T3688] EXT4-fs (loop4): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 34.225273][ T3688] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=c84ce018, mo2=0000] [ 34.226156][ T3688] EXT4-fs error (device loop4): ext4_map_blocks:780: inode #3: block 2: comm syz.4.79: lblock 2 mapped to illegal pblock 2 (length 1) [ 34.258518][ T3688] EXT4-fs error (device loop4): ext4_map_blocks:780: inode #3: block 48: comm syz.4.79: lblock 0 mapped to illegal pblock 48 (length 1) [ 34.272633][ T3688] EXT4-fs error (device loop4): ext4_acquire_dquot:6933: comm syz.4.79: Failed to acquire dquot type 0 [ 34.284042][ T3688] EXT4-fs error (device loop4) in ext4_reserve_inode_write:6255: Corrupt filesystem [ 34.294521][ T3688] EXT4-fs error (device loop4): ext4_evict_inode:254: inode #11: comm syz.4.79: mark_inode_dirty error [ 34.298126][ T3692] usb usb8: usbfs: process 3692 (syz.2.82) did not claim interface 0 before use [ 34.315517][ T3688] EXT4-fs warning (device loop4): ext4_evict_inode:257: couldn't mark inode dirty (err -117) [ 34.315553][ T3688] EXT4-fs (loop4): 1 orphan inode deleted [ 34.316009][ T3688] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 34.336495][ T58] EXT4-fs error (device loop4): ext4_map_blocks:780: inode #3: block 1: comm kworker/u8:4: lblock 1 mapped to illegal pblock 1 (length 1) [ 34.337828][ T58] EXT4-fs error (device loop4): ext4_release_dquot:6969: comm kworker/u8:4: Failed to release dquot type 0 [ 34.424505][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.424818][ T3314] EXT4-fs error (device loop4): __ext4_get_inode_loc:4792: comm syz-executor: Invalid inode table block 1 in block_group 0 [ 34.424960][ T3314] EXT4-fs error (device loop4) in ext4_reserve_inode_write:6255: Corrupt filesystem [ 34.425010][ T3314] EXT4-fs error (device loop4): ext4_quota_off:7217: inode #3: comm syz-executor: mark_inode_dirty error [ 34.554730][ T3699] syzkaller0: entered promiscuous mode [ 34.560264][ T3699] syzkaller0: entered allmulticast mode [ 34.650444][ T3706] loop0: detected capacity change from 0 to 128 [ 34.650955][ T3706] FAT-fs (loop0): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 34.651137][ T3706] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 34.828203][ T3711] syzkaller0: entered promiscuous mode [ 34.833822][ T3711] syzkaller0: entered allmulticast mode [ 34.847314][ T3716] vlan2: entered allmulticast mode [ 34.872363][ T3719] team0 (unregistering): Port device team_slave_0 removed [ 34.881856][ T3719] team0 (unregistering): Port device team_slave_1 removed [ 34.987746][ T3723] tipc: Started in network mode [ 34.992704][ T3723] tipc: Node identity aa7d5018b8c4, cluster identity 4711 [ 35.000046][ T3723] tipc: Enabled bearer , priority 0 [ 35.066970][ T3727] bridge_slave_0: left allmulticast mode [ 35.072696][ T3727] bridge_slave_0: left promiscuous mode [ 35.078398][ T3727] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.091430][ T3727] bridge_slave_1: left allmulticast mode [ 35.097897][ T3727] bridge_slave_1: left promiscuous mode [ 35.103670][ T3727] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.116245][ T3727] bond0: (slave bond_slave_0): Releasing backup interface [ 35.137782][ T3727] bond0: (slave bond_slave_1): Releasing backup interface [ 35.156425][ T3727] team0: Port device team_slave_0 removed [ 35.165745][ T3727] team0: Port device team_slave_1 removed [ 35.172872][ T3727] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 35.180804][ T3727] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 35.190259][ T3727] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 35.190328][ T29] kauditd_printk_skb: 350 callbacks suppressed [ 35.190372][ T29] audit: type=1400 audit(1750022899.015:465): avc: denied { mounton } for pid=3731 comm="syz.2.98" path="/" dev="configfs" ino=1088 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 35.197870][ T3727] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 35.254251][ T29] audit: type=1400 audit(1750022899.075:466): avc: denied { unmount } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 35.258962][ T3730] syzkaller0: MTU too low for tipc bearer [ 35.278679][ T29] audit: type=1400 audit(1750022899.075:467): avc: denied { unmount } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 35.280194][ T3730] tipc: Disabling bearer [ 35.385908][ T3738] mmap: syz.2.101 (3738) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 35.487109][ T3745] loop1: detected capacity change from 0 to 512 [ 35.579552][ T3745] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 35.602949][ T3745] EXT4-fs (loop1): 1 truncate cleaned up [ 35.603338][ T3745] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.606858][ T29] audit: type=1400 audit(1750022899.425:468): avc: denied { create } for pid=3744 comm="syz.1.104" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 35.620299][ T3749] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 35.620452][ T3749] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 35.754166][ T2469] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 35.891427][ T3306] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.067674][ T29] audit: type=1400 audit(1750022899.795:469): avc: denied { create } for pid=3753 comm="syz.4.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 36.129726][ T3766] loop0: detected capacity change from 0 to 128 [ 36.238950][ T3766] syz.0.111: attempt to access beyond end of device [ 36.238950][ T3766] loop0: rw=2049, sector=153, nr_sectors = 8 limit=128 [ 36.239063][ T3766] syz.0.111: attempt to access beyond end of device [ 36.239063][ T3766] loop0: rw=2049, sector=169, nr_sectors = 8 limit=128 [ 36.239145][ T3766] syz.0.111: attempt to access beyond end of device [ 36.239145][ T3766] loop0: rw=2049, sector=185, nr_sectors = 8 limit=128 [ 36.239207][ T3766] syz.0.111: attempt to access beyond end of device [ 36.239207][ T3766] loop0: rw=2049, sector=201, nr_sectors = 8 limit=128 [ 36.239343][ T3766] syz.0.111: attempt to access beyond end of device [ 36.239343][ T3766] loop0: rw=2049, sector=217, nr_sectors = 8 limit=128 [ 36.239388][ T3766] syz.0.111: attempt to access beyond end of device [ 36.239388][ T3766] loop0: rw=2049, sector=233, nr_sectors = 8 limit=128 [ 36.239463][ T3766] syz.0.111: attempt to access beyond end of device [ 36.239463][ T3766] loop0: rw=2049, sector=249, nr_sectors = 8 limit=128 [ 36.239513][ T3766] syz.0.111: attempt to access beyond end of device [ 36.239513][ T3766] loop0: rw=2049, sector=265, nr_sectors = 8 limit=128 [ 36.239624][ T3766] syz.0.111: attempt to access beyond end of device [ 36.239624][ T3766] loop0: rw=2049, sector=281, nr_sectors = 8 limit=128 [ 36.243249][ T3766] syz.0.111: attempt to access beyond end of device [ 36.243249][ T3766] loop0: rw=2049, sector=297, nr_sectors = 8 limit=128 [ 36.247149][ T29] audit: type=1400 audit(1750022900.065:470): avc: denied { name_bind } for pid=3765 comm="syz.0.111" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 36.247207][ T29] audit: type=1400 audit(1750022900.065:471): avc: denied { node_bind } for pid=3765 comm="syz.0.111" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 36.458755][ T29] audit: type=1326 audit(1750022900.275:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3772 comm="syz.0.113" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f40dd65e929 code=0x7ffc0000 [ 36.459448][ T29] audit: type=1326 audit(1750022900.275:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3772 comm="syz.0.113" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f40dd65e929 code=0x7ffc0000 [ 36.460569][ T29] audit: type=1326 audit(1750022900.275:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3772 comm="syz.0.113" exe="/root/syz-executor" sig=0 arch=c000003e syscall=131 compat=0 ip=0x7f40dd65e929 code=0x7ffc0000 [ 37.593834][ T3788] loop4: detected capacity change from 0 to 128 [ 37.594316][ T3788] FAT-fs (loop4): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 37.597709][ T3788] FAT-fs (loop4): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 37.686370][ T3789] netlink: 4 bytes leftover after parsing attributes in process `syz.1.117'. [ 37.744854][ T3789] hsr_slave_0 (unregistering): left promiscuous mode [ 37.783918][ T3796] netlink: 4 bytes leftover after parsing attributes in process `syz.0.121'. [ 37.886275][ T3796] 8021q: adding VLAN 0 to HW filter on device team1 [ 37.980499][ T3805] loop0: detected capacity change from 0 to 512 [ 37.988309][ T3805] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 37.999640][ T3805] EXT4-fs error (device loop0): ext4_free_branches:1023: inode #11: comm syz.0.127: invalid indirect mapped block 4294967295 (level 1) [ 38.015099][ T3805] EXT4-fs error (device loop0): ext4_free_branches:1023: inode #11: comm syz.0.127: invalid indirect mapped block 4294967295 (level 1) [ 38.029829][ T3805] EXT4-fs (loop0): 2 truncates cleaned up [ 38.036872][ T3805] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 38.074899][ T3811] @: renamed from vlan0 (while UP) [ 38.091866][ T3315] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.176560][ T3817] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 38.206329][ T3817] 8021q: adding VLAN 0 to HW filter on device bond1 [ 38.236606][ T3817] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 38.254655][ T3817] bond1 (unregistering): Released all slaves [ 38.631012][ T51] FAT-fs (loop4): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 39.161651][ T3845] loop1: detected capacity change from 0 to 256 [ 39.162098][ T3845] msdos: Unknown parameter '?H(B a"!5' [ 39.282887][ T3850] loop0: detected capacity change from 0 to 1024 [ 39.364708][ T3850] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.557184][ T3315] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.700842][ T3868] netlink: 'syz.1.148': attribute type 11 has an invalid length. [ 39.762304][ T3871] 9pnet_fd: Insufficient options for proto=fd [ 40.194126][ T29] kauditd_printk_skb: 525 callbacks suppressed [ 40.194141][ T29] audit: type=1326 audit(1750022904.015:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.4.151" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f57e58b58e7 code=0x7ffc0000 [ 40.261111][ T29] audit: type=1326 audit(1750022904.045:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.4.151" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f57e585ab19 code=0x7ffc0000 [ 40.284596][ T29] audit: type=1326 audit(1750022904.045:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.4.151" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f57e58b58e7 code=0x7ffc0000 [ 40.308198][ T29] audit: type=1326 audit(1750022904.045:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.4.151" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f57e585ab19 code=0x7ffc0000 [ 40.331790][ T29] audit: type=1326 audit(1750022904.045:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.4.151" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f57e58be929 code=0x7ffc0000 [ 40.355212][ T29] audit: type=1326 audit(1750022904.055:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.4.151" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f57e58b58e7 code=0x7ffc0000 [ 40.378605][ T29] audit: type=1326 audit(1750022904.055:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.4.151" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f57e585ab19 code=0x7ffc0000 [ 40.402022][ T29] audit: type=1326 audit(1750022904.055:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.4.151" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f57e58be929 code=0x7ffc0000 [ 40.425313][ T29] audit: type=1326 audit(1750022904.065:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.4.151" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f57e58b58e7 code=0x7ffc0000 [ 40.448747][ T29] audit: type=1326 audit(1750022904.065:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.4.151" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f57e585ab19 code=0x7ffc0000 [ 40.523357][ T3890] capability: warning: `syz.3.155' uses 32-bit capabilities (legacy support in use) [ 40.585812][ T3894] loop2: detected capacity change from 0 to 1024 [ 40.596302][ T3894] EXT4-fs: dax option not supported [ 40.676624][ T3901] bond0: (slave bond_slave_0): Releasing backup interface [ 40.689698][ T3901] bond0: (slave bond_slave_1): Releasing backup interface [ 40.706150][ T3901] team0: Port device team_slave_0 removed [ 40.724410][ T3901] team0: Port device team_slave_1 removed [ 40.741730][ T3901] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 40.749324][ T3901] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 40.770432][ T3901] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 40.778162][ T3901] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 40.847324][ T3901] vlan2: entered allmulticast mode [ 40.852540][ T3901] bond0: entered allmulticast mode [ 40.858690][ T3901] bridge0: port 1(vlan2) entered blocking state [ 40.865074][ T3901] bridge0: port 1(vlan2) entered disabled state [ 41.449493][ T3929] netlink: 'syz.1.168': attribute type 1 has an invalid length. [ 41.469996][ T3929] bond1: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 41.480651][ T12] bond1: Warning: No 802.3ad response from the link partner for any adapters in the bond [ 41.481089][ T3929] 8021q: adding VLAN 0 to HW filter on device bond1 [ 41.524490][ T3932] loop2: detected capacity change from 0 to 2048 [ 41.546358][ T3932] EXT4-fs (loop2): failed to initialize system zone (-117) [ 41.554009][ T3932] EXT4-fs (loop2): mount failed [ 41.593334][ T37] bond1: Warning: No 802.3ad response from the link partner for any adapters in the bond [ 41.724844][ T3936] SELinux: failed to load policy [ 41.823508][ T3940] loop2: detected capacity change from 0 to 512 [ 41.837930][ T3940] EXT4-fs: Ignoring removed nomblk_io_submit option [ 41.865258][ T3942] loop0: detected capacity change from 0 to 512 [ 41.878794][ T3940] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.914706][ T3942] EXT4-fs: Ignoring removed orlov option [ 41.921377][ T3942] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 41.937707][ T3942] EXT4-fs (loop0): orphan cleanup on readonly fs [ 41.946823][ T3942] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz.0.173: bg 0: block 248: padding at end of block bitmap is not set [ 41.946823][ T3940] ext4 filesystem being mounted at /41/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 41.972849][ T3942] EXT4-fs error (device loop0): ext4_acquire_dquot:6933: comm syz.0.173: Failed to acquire dquot type 1 [ 41.988831][ T3948] loop4: detected capacity change from 0 to 512 [ 42.000866][ T3942] EXT4-fs (loop0): 1 truncate cleaned up [ 42.010165][ T3948] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 42.018757][ T3942] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 42.035173][ T3942] EXT4-fs (loop0): warning: mounting fs with errors, running e2fsck is recommended [ 42.054549][ T3942] EXT4-fs (loop0): re-mounted 00000000-0000-0000-0000-000000000000 r/w. [ 42.063610][ T3942] ext4 filesystem being remounted at /34/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 42.063660][ T3948] EXT4-fs warning (device loop4): ext4_expand_extra_isize_ea:2848: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 42.090356][ T3942] syz.0.173 (3942) used greatest stack depth: 9576 bytes left [ 42.093105][ T3948] EXT4-fs (loop4): 1 truncate cleaned up [ 42.105891][ T3948] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 42.122249][ T3315] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.177841][ T3307] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.187763][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.241627][ T3959] netlink: 4 bytes leftover after parsing attributes in process `syz.1.179'. [ 42.278735][ T3966] loop3: detected capacity change from 0 to 128 [ 42.315470][ T3966] FAT-fs (loop3): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 42.331216][ T3966] FAT-fs (loop3): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 42.426249][ T3974] loop0: detected capacity change from 0 to 2048 [ 42.539089][ T3974] EXT4-fs (loop0): failed to initialize system zone (-117) [ 42.664701][ T3974] EXT4-fs (loop0): mount failed [ 42.959111][ T3966] ================================================================== [ 42.967256][ T3966] BUG: KCSAN: data-race in file_write_and_wait_range / xas_set_mark [ 42.975280][ T3966] [ 42.977623][ T3966] write to 0xffff88811a454b14 of 4 bytes by task 3972 on cpu 0: [ 42.985277][ T3966] xas_set_mark+0x12b/0x140 [ 42.989825][ T3966] tag_pages_for_writeback+0xc2/0x290 [ 42.995251][ T3966] writeback_iter+0x340/0x820 [ 42.999946][ T3966] mpage_writepages+0x87/0x1250 [ 43.004830][ T3966] fat_writepages+0x24/0x30 [ 43.009355][ T3966] do_writepages+0x1c6/0x310 [ 43.013968][ T3966] file_write_and_wait_range+0x156/0x2c0 [ 43.019639][ T3966] __generic_file_fsync+0x46/0x140 [ 43.024796][ T3966] fat_file_fsync+0x49/0x100 [ 43.029424][ T3966] vfs_fsync_range+0x10a/0x130 [ 43.034221][ T3966] generic_file_write_iter+0x1b8/0x2f0 [ 43.039716][ T3966] iter_file_splice_write+0x5ef/0x970 [ 43.045137][ T3966] direct_splice_actor+0x153/0x2a0 [ 43.050286][ T3966] splice_direct_to_actor+0x30f/0x680 [ 43.055695][ T3966] do_splice_direct+0xda/0x150 [ 43.060517][ T3966] do_sendfile+0x380/0x650 [ 43.064966][ T3966] __x64_sys_sendfile64+0x105/0x150 [ 43.070199][ T3966] x64_sys_call+0xb39/0x2fb0 [ 43.074827][ T3966] do_syscall_64+0xd2/0x200 [ 43.079368][ T3966] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.085290][ T3966] [ 43.087633][ T3966] read to 0xffff88811a454b14 of 4 bytes by task 3966 on cpu 1: [ 43.095210][ T3966] file_write_and_wait_range+0x10e/0x2c0 [ 43.100897][ T3966] __generic_file_fsync+0x46/0x140 [ 43.106043][ T3966] fat_file_fsync+0x49/0x100 [ 43.110657][ T3966] vfs_fsync_range+0x10a/0x130 [ 43.115435][ T3966] generic_file_write_iter+0x1b8/0x2f0 [ 43.120928][ T3966] iter_file_splice_write+0x5ef/0x970 [ 43.126337][ T3966] direct_splice_actor+0x153/0x2a0 [ 43.131482][ T3966] splice_direct_to_actor+0x30f/0x680 [ 43.136897][ T3966] do_splice_direct+0xda/0x150 [ 43.141706][ T3966] do_sendfile+0x380/0x650 [ 43.146141][ T3966] __x64_sys_sendfile64+0x105/0x150 [ 43.151372][ T3966] x64_sys_call+0xb39/0x2fb0 [ 43.156000][ T3966] do_syscall_64+0xd2/0x200 [ 43.160530][ T3966] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.166450][ T3966] [ 43.168794][ T3966] value changed: 0x02000021 -> 0x04000021 [ 43.174531][ T3966] [ 43.176863][ T3966] Reported by Kernel Concurrency Sanitizer on: [ 43.183056][ T3966] CPU: 1 UID: 0 PID: 3966 Comm: syz.3.180 Not tainted 6.16.0-rc1-syzkaller-00239-g08215f5486ec #0 PREEMPT(voluntary) [ 43.195402][ T3966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 43.205476][ T3966] ================================================================== [ 43.341624][ T51] FAT-fs (loop3): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1)