last executing test programs: 6.954750786s ago: executing program 2 (id=270): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) gettid() fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) poll(&(0x7f0000b2c000), 0x0, 0xffffffffffbffff8) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2c}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) 6.265739266s ago: executing program 4 (id=271): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xb, &(0x7f0000000080)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) clock_settime(0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000}, 0x0) io_getevents(0x0, 0x8623, 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x83, &(0x7f00000000c0), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000001dde73191f595ece405ef41519623a2335e65bdcc101667d1b18f856b2ba3454ae01457e06d200948f3d3826ec8c72150abf69618e2d8966d62e032628a9bab9de199071da6020ae8a9db6d5f472ca6a0e4daad2860b6964cbd56d91925db2edd175c79600c60c97128d33ad65fa0e93109f3718127a313fa29e397f5f02839868c69b70cf44e8f87eaf30fdd26d0cbc553da7c81810f3ef5045b04044b8be9ad6115", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000004000000000000000000000c213c4ded088add4c79489fc13243f323fedee7e21d45649a1d6d79c1551e4553a8a99cd5d860959847ecc858fba253d6be3e29552df0f02bc9bfe3344115200f847795b512ad7f5ec55f002006045b70de68330d34efb7b9e77cb46307e7f8ed8"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) eventfd2(0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x111841, 0x0) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c00)=ANY=[@ANYBLOB="340000001900010900000002fd0100007e29e52ccf09ac141400082e63b7dc48f0ee05000500ac1e010108000b0004000000000070a42e884717873b0e3da2c033647e70be84952cc47d32892808bd6a63975b2f4cad4600f1754c50b34b2430d7213d81495f74b45f39a92d70346b55a02e2bd670a81df1eb66e54aac96bd9b11d340285bc33b402d327eae89739da03692dbfda33e7c2ad2414b3877b8954ccc793671cc0eaa036c5e3ba5f4cb9e92276e4aa1df9ebd0c91d614f0272d011c50ab4003cfcf89e174a9492c7ce3fe2ec6c21d121ccb32bdcffdbcc19788c38c7e597b220c7fb71b63e02c792a5af25a5b876c0bbdc4664816493f2d9cefd52224f857b7a878a7"], 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:tmp_t:s0\x00', 0x1b, 0x2) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0x1) msgrcv(0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000000) 6.244088376s ago: executing program 4 (id=272): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_usb_connect(0x3, 0x1c, 0x0, 0x0) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000100)={0x1d, r2, 0x2, {0x3, 0x0, 0x3}, 0x1}, 0x18) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), r1) sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x10) 6.061353099s ago: executing program 2 (id=274): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000001f80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000073000000850000005000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xa, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16=r1], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3, 0x0, 0x20}, 0x18) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(0xffffffffffffffff, &(0x7f00000002c0)={0x1d, r4}, 0x10) bind$can_raw(0xffffffffffffffff, &(0x7f0000000800), 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='mm_page_pcpu_drain\x00'}, 0x18) kexec_load(0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) r5 = syz_open_dev$tty1(0xc, 0x4, 0x2) r6 = dup(r5) ioctl$KDSKBENT(r5, 0x4b47, &(0x7f0000000080)={0x0, 0x79, 0x7}) socket$qrtr(0x2a, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05c02488bc00000071118f00000000008510116df17c359a0d0000000000000c"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) syz_open_dev$usbmon(&(0x7f0000000000), 0x6520, 0x40800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', r4, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r7}, 0x10) r8 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r8, &(0x7f00000002c0)=""/199, 0xc7) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) timer_create(0x3, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) 5.255580281s ago: executing program 2 (id=281): socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_usb_connect(0x3, 0x1c, 0x0, 0x0) r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2, {0x3, 0x0, 0x3}, 0x1}, 0x18) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), r0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x14, r2, 0x800, 0x70bd2c, 0x25dfdbfd}, 0x14}}, 0x10) 5.189149782s ago: executing program 3 (id=282): syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1008002, &(0x7f00000003c0)=ANY=[], 0x1, 0x2ee, &(0x7f00000006c0)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) semop(0x0, &(0x7f0000000240)=[{0x2, 0x7fff, 0x1000}], 0x1) syz_mount_image$ext4(&(0x7f00000003c0)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x2404, &(0x7f0000000300)={[{@user_xattr}, {@dax_always}], [{@smackfsfloor={'smackfsfloor', 0x3d, '}!'}}, {@subj_user={'subj_user', 0x3d, '&[:^]\x9c{:'}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x800000, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8a, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) write(r2, &(0x7f0000004200)='t', 0x1) sendfile(r2, r1, 0x0, 0x3ffff) sendfile(r2, r1, 0x0, 0x7ffff000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000cab000)=0xc) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000001500)={0x300, 0x2b, 0x200, 0x70bd2c, 0x25dfdbfc, {0x19}, [@nested={0xec, 0x2, 0x0, 0x1, [@typed={0xc, 0x3c, 0x0, 0x0, @u64=0xc}, @generic="16a0c00efd73a062779757cca412ac924e5cf3b0bc665428c36a127beb3cfbfaf7d26720e9530968984a7c23bab0b46a6fff6f7f0085e76e77a4c6821d1d9316bb61184d3fe478f9d5193ecec98a91ad9323e483c11be1f7f242bd95c73e06a5e3b9aba6da77b7db2840569ff85f4c5a9ef3bbfd9a93a6d716643813cb4d07ddcd6cb7b8e2a12ed190a5c385e26817c0f1e223e75bd14fe6d796857059137f48c237999801ff4c9a6676c7ce848be3ecf2821135907615df", @typed={0x14, 0xb2, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x8c, 0x0, 0x0, @fd=r2}, @typed={0x4, 0xdb}, @typed={0x4, 0x83}]}, @generic="8d01cbcce59ed19b2ceed65b3ca9ce44f44b6b19c81dd4b5c5475c5cbc5764ee6c0c15aca3f39ce8c64572ea220de35e006c1ddadbd596f1bfa4206fc4fc38304c11f89249fc09e341c828f689733df59a6976d93309c14c81d1589267a861ecb544ba215a709e945dce5a8fc47992439c2b86f5aadee155d7fc05169da9e63bff4ef44ee5b27a525cbfbf525d9b09149199bdbbf1a8aeaf93cd49c738da88c02329f9a5a6ad4df2071b5b32c2cf7a18955eae556de8332ff1aab234c8ff08de66", @generic="70f1816aa12914d857c8974bee00bec20b0ccb0593add9fe1e5c0af48cef7b826a7aa34dad5456a8129620f5a9b3fb5805b3a1a98ceba91b6f2dcaebf7fcd48d2bfd192ef29b3842368315299e76e2f0ee4fb9e61a1bea94cd58fa3d01fb4a53433124c6e287cabdac1ad690a37e0cff0bf818309b4a52f39b87dfa079172f94d53f460f426b06d27df062bc8072dd4b6cf183f462be055300b6f7ddcd31b9c249b172bf47215eb6453a622bde8e8c891a4dceff4ec12982139f3f320d526bb47682e2c1bb5707224e1e11", @generic="8807908a47b9f2d67d5a887eef5c86b7cc3a5d38bb04c5369dc0d5ba06dc34fe5325668cc4f4c436fc404db4cd02034e4cbc3a2af0ad9fab4d735e85d17a0c51056c", @nested={0x30, 0x6b, 0x0, 0x1, [@nested={0x4, 0x13b}, @nested={0x4, 0xb7}, @typed={0x14, 0xb0, 0x0, 0x0, @ipv6=@private0}, @nested={0x10, 0x106, 0x0, 0x1, [@nested={0xc, 0x5f, 0x0, 0x1, [@typed={0x8, 0x110, 0x0, 0x0, @pid=r4}]}]}]}]}, 0x300}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000880) 4.721699449s ago: executing program 4 (id=286): pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r0, 0x0, 0x6, 0x0) dup3(r1, r0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000", @ANYRESOCT], 0x14}, 0x1, 0x0, 0x0, 0x40095}, 0x0) 4.355650284s ago: executing program 3 (id=287): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/crypto\x00', 0x0, 0x0) io_setup(0x2, &(0x7f0000000740)=0x0) io_submit(r3, 0x1, &(0x7f0000000a40)=[&(0x7f0000000840)={0x0, 0x0, 0x0, 0x5, 0x2000, r2, 0x0}]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = socket$kcm(0x2, 0x922000000001, 0x106) sendmsg(r5, 0x0, 0x20004000) r6 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r6, 0x2285, 0x0) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0xfffd, @multicast1}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000001080)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, 0x0, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) r10 = socket(0x10, 0x3, 0x9) r11 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f0000000340)={'fscrypt:', @desc1}, &(0x7f0000000540)={0x0, "02c27e6adb8d51361bd6361865035c027bc75a1fcad12ca9e09ca236536269e10ab9f1716263660c77a3783f35e415893f568b6763d333ff944fb6a866bf7156", 0x2d}, 0x48, 0xfffffffffffffff8) keyctl$search(0xa, r11, &(0x7f0000000640)='.dead\x00', &(0x7f0000000680)={'syz', 0x3}, 0xfffffffffffffffd) sendmsg$NFT_BATCH(r10, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x64841}, 0x40000) splice(r9, 0x0, r4, 0x0, 0x6, 0x0) ioctl$int_in(r4, 0x5452, 0x0) dup3(r9, r4, 0x0) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40095}, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r12, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000900)="1cbfa5a23be236e68164f4496d0e9b23558ea960b30db48db0646d3b91572735bc004eea5d8a3f7da97e7e1b52e0ce946515393c229a9d654323d2035591d0bf942dba666454e542b8e0ad7def349b46cb6c8aa5259f02cf7cdd68507b3fe284bccc5af6753ece16f034208b41c7c56ed65bca85a23abc7ef01b53da66f5e93c3e21d9d149c8cfacfec9728810d516365987e60898cb1bee147b273f0ffcfd649d79de3a4f87dc7d21ab663a775b3a04197f543c21ad3c3a64cb379246bbb71f18d9b993083067d0", 0xc8, 0x804, &(0x7f0000000040)={0xa, 0x4e20, 0xb7, @local, 0x8}, 0x1c) 3.32812749s ago: executing program 0 (id=292): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/crypto\x00', 0x0, 0x0) io_setup(0x2, &(0x7f0000000740)=0x0) io_submit(r2, 0x1, &(0x7f0000000a40)=[0x0]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = socket$kcm(0x2, 0x922000000001, 0x106) sendmsg(r4, &(0x7f0000000b80)={0x0, 0x0, 0x0}, 0x20004000) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000000c0)=r4, 0x4) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f00000005c0)={0x53, 0xfffffffe, 0xc0, 0x2, @scatter={0x1, 0x40000, &(0x7f0000000700)=[{&(0x7f0000000800)=""/215, 0xd7}]}, &(0x7f0000000080)="0000501ef663", 0x0, 0x800004, 0x10030, 0x0, 0x0}) r6 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0xfffd, @multicast1}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000001080)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000400)={r7, 0xffff6721}, 0x8) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x6, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x3ff) dup3(0xffffffffffffffff, r3, 0x0) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000", @ANYRESOCT], 0x14}, 0x1, 0x0, 0x0, 0x40095}, 0x0) 3.185296892s ago: executing program 0 (id=293): bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/crypto\x00', 0x0, 0x0) io_setup(0x2, &(0x7f0000000740)=0x0) io_submit(r2, 0x1, &(0x7f0000000a40)=[&(0x7f0000000840)={0x0, 0x0, 0x0, 0x5, 0x2000, r1, 0x0}]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r0}, 0x10) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = socket$kcm(0x2, 0x922000000001, 0x106) sendmsg(r4, &(0x7f0000000b80)={0x0, 0x0, 0x0}, 0x20004000) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f00000005c0)={0x53, 0xfffffffe, 0xc0, 0x2, @scatter={0x1, 0x40000, &(0x7f0000000700)=[{&(0x7f0000000800)=""/215, 0xd7}]}, &(0x7f0000000080)="0000501ef663", 0x0, 0x800004, 0x10030, 0x0, 0x0}) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0xfffd, @multicast1}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000001080)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000400)={r8, 0xffff6721}, 0x8) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) r10 = socket(0x10, 0x3, 0x9) r11 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f0000000340)={'fscrypt:', @desc1}, &(0x7f0000000540)={0x0, "02c27e6adb8d51361bd6361865035c027bc75a1fcad12ca9e09ca236536269e10ab9f1716263660c77a3783f35e415893f568b6763d333ff944fb6a866bf7156", 0x2d}, 0x48, 0xfffffffffffffff8) keyctl$search(0xa, r11, &(0x7f0000000640)='.dead\x00', &(0x7f0000000680)={'syz', 0x3}, 0xfffffffffffffffd) sendmsg$NFT_BATCH(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000005304010000000000000000000500000a140000001100010000000000000000000000000a15395c65e84708c4d821f8deca11f7b2550f37980e23d8a882a4e43af738842141be9d88a31401b3b1541e415933e228de99cbbec9849458fc1e21a5878a0e17b256d1681c5db55305"], 0x28}, 0x1, 0x0, 0x0, 0x64841}, 0x40000) splice(r9, 0x0, r3, 0x0, 0x6, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x3ff) dup3(r9, r3, 0x0) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000", @ANYRESOCT], 0x14}, 0x1, 0x0, 0x0, 0x40095}, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r12, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001000370400000000ffffffff00000000", @ANYRES32, @ANYBLOB="0b120500000000001c0012800b0001"], 0x3c}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000900)="1cbfa5a23be236e68164f4496d0e9b23558ea960b30db48db0646d3b91572735bc004eea5d8a3f7da97e7e1b52e0ce946515393c229a9d654323d2035591d0bf942dba666454e542b8e0ad7def349b46cb6c8aa5259f02cf7cdd68507b3fe284bccc5af6753ece16f034208b41c7c56ed65bca85a23abc7ef01b53da66f5e93c3e21d9d149c8cfacfec9728810d516365987e60898cb1bee147b273f0ffcfd649d79de3a4f87dc7d21ab663a775b3a04197f543c21ad3c3a64cb379246bbb71f18d9b993083067d0", 0xc8, 0x804, &(0x7f0000000040)={0xa, 0x4e20, 0xb7, @local, 0x8}, 0x1c) 2.977207885s ago: executing program 0 (id=296): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000001f80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000073000000850000005000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xa, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='percpu_free_percpu\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16=r1], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3, 0x0, 0x20}, 0x18) r4 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r4, &(0x7f00000002c0)={0x1d, r5}, 0x10) bind$can_raw(r4, &(0x7f0000000800), 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='mm_page_pcpu_drain\x00'}, 0x18) kexec_load(0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) r6 = syz_open_dev$tty1(0xc, 0x4, 0x2) r7 = dup(r6) ioctl$KDSKBENT(r6, 0x4b47, &(0x7f0000000080)={0x0, 0x79, 0x7}) socket$qrtr(0x2a, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05c02488bc00000071118f00000000008510116df17c359a0d0000000000000c"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) syz_open_dev$usbmon(&(0x7f0000000000), 0x6520, 0x40800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', r5, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r8}, 0x10) r9 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r9, &(0x7f00000002c0)=""/199, 0xc7) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) timer_create(0x3, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) 2.736627519s ago: executing program 2 (id=297): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_usb_connect(0x3, 0x1c, 0x0, 0x0) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000100)={0x1d, r2, 0x2, {0x3, 0x0, 0x3}, 0x1}, 0x18) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), r1) sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x10) 2.280817236s ago: executing program 1 (id=298): syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1008002, &(0x7f00000003c0)=ANY=[], 0x1, 0x2ee, &(0x7f00000006c0)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) semop(0x0, &(0x7f0000000240)=[{0x2, 0x7fff, 0x1000}], 0x1) syz_mount_image$ext4(&(0x7f00000003c0)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x2404, &(0x7f0000000300)={[{@user_xattr}, {@dax_always}], [{@smackfsfloor={'smackfsfloor', 0x3d, '}!'}}, {@subj_user={'subj_user', 0x3d, '&[:^]\x9c{:'}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x800000, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8a, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) write(r2, &(0x7f0000004200)='t', 0x1) sendfile(r2, r1, 0x0, 0x3ffff) sendfile(r2, r1, 0x0, 0x7ffff000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000cab000)=0xc) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000001500)={0x300, 0x2b, 0x200, 0x70bd2c, 0x25dfdbfc, {0x19}, [@nested={0xec, 0x2, 0x0, 0x1, [@typed={0xc, 0x3c, 0x0, 0x0, @u64=0xc}, @generic="16a0c00efd73a062779757cca412ac924e5cf3b0bc665428c36a127beb3cfbfaf7d26720e9530968984a7c23bab0b46a6fff6f7f0085e76e77a4c6821d1d9316bb61184d3fe478f9d5193ecec98a91ad9323e483c11be1f7f242bd95c73e06a5e3b9aba6da77b7db2840569ff85f4c5a9ef3bbfd9a93a6d716643813cb4d07ddcd6cb7b8e2a12ed190a5c385e26817c0f1e223e75bd14fe6d796857059137f48c237999801ff4c9a6676c7ce848be3ecf2821135907615df", @typed={0x14, 0xb2, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x8c, 0x0, 0x0, @fd=r2}, @typed={0x4, 0xdb}, @typed={0x4, 0x83}]}, @generic="8d01cbcce59ed19b2ceed65b3ca9ce44f44b6b19c81dd4b5c5475c5cbc5764ee6c0c15aca3f39ce8c64572ea220de35e006c1ddadbd596f1bfa4206fc4fc38304c11f89249fc09e341c828f689733df59a6976d93309c14c81d1589267a861ecb544ba215a709e945dce5a8fc47992439c2b86f5aadee155d7fc05169da9e63bff4ef44ee5b27a525cbfbf525d9b09149199bdbbf1a8aeaf93cd49c738da88c02329f9a5a6ad4df2071b5b32c2cf7a18955eae556de8332ff1aab234c8ff08de66", @generic="70f1816aa12914d857c8974bee00bec20b0ccb0593add9fe1e5c0af48cef7b826a7aa34dad5456a8129620f5a9b3fb5805b3a1a98ceba91b6f2dcaebf7fcd48d2bfd192ef29b3842368315299e76e2f0ee4fb9e61a1bea94cd58fa3d01fb4a53433124c6e287cabdac1ad690a37e0cff0bf818309b4a52f39b87dfa079172f94d53f460f426b06d27df062bc8072dd4b6cf183f462be055300b6f7ddcd31b9c249b172bf47215eb6453a622bde8e8c891a4dceff4ec12982139f3f320d526bb47682e2c1bb5707224e1e11", @generic="8807908a47b9f2d67d5a887eef5c86b7cc3a5d38bb04c5369dc0d5ba06dc34fe5325668cc4f4c436fc404db4cd02034e4cbc3a2af0ad9fab4d735e85d17a0c51056c", @nested={0x30, 0x6b, 0x0, 0x1, [@nested={0x4, 0x13b}, @nested={0x4, 0xb7}, @typed={0x14, 0xb0, 0x0, 0x0, @ipv6=@private0}, @nested={0x10, 0x106, 0x0, 0x1, [@nested={0xc, 0x5f, 0x0, 0x1, [@typed={0x8, 0x110, 0x0, 0x0, @pid=r4}]}]}]}]}, 0x300}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000880) 2.126829218s ago: executing program 0 (id=299): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_io_uring_setup(0x1725, 0x0, 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3) pause() fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x2c, 0xffffffffffbffff8) r4 = dup2(r2, r3) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r5, 0xe0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000001380)}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x38) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x13) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x86, "325c87f1687b1b77b379a83100184c4d73737ba9ec54b391ab749e7799328c1b3a22dd8a3a0628c05ebcb1389802bf3b0063c6fdac4c0792d72b55d6bfb45fefdd79491161f28669c89b94673d7fdf784e3e5f1e2f1885d484de79a89078290a2f831f03279c21fe1034bd933533fd21a8a51e485e15d29a4a222621662bf21b9362f6e2c9d8"}, &(0x7f00000001c0)=0x8e) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000380)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x18) setxattr$security_selinux(&(0x7f0000000440)='./cgroup\x00', &(0x7f0000000480), &(0x7f00000004c0)='system_u:object_r:kmsg_device_t:s0\x00', 0x23, 0x1) 1.657471525s ago: executing program 4 (id=300): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) gettid() fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) poll(&(0x7f0000b2c000), 0x0, 0xffffffffffbffff8) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2c}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0xe0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) 1.404548349s ago: executing program 1 (id=301): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000f0ff0000050000000200000000000000", @ANYRES32, @ANYBLOB="ffffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000004000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa600000000000007020000f8ffffffb703000008000000b7040000000000008500000003001c009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x2c, r4, 0x6a98047402e98331, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x4886) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.34610204s ago: executing program 1 (id=302): socket$nl_route(0x10, 0x3, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x2000) unshare(0x6a040000) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) socket(0xa, 0x2, 0x0) syz_emit_ethernet(0x52, &(0x7f0000000000)={@local, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @dest_unreach={0x3, 0xe, 0x0, 0x0, 0x40, 0x1, {0xa, 0x4, 0x3, 0x24, 0x0, 0x66, 0xbdb1, 0x8, 0x84, 0x2, @rand_addr=0x64010102, @rand_addr=0x64010100, {[@timestamp_addr={0x44, 0x14, 0xb8, 0x1, 0x6, [{@empty, 0xa}, {@remote, 0x10000}]}]}}}}}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae000000"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0xa8}, 0x18) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x1, 0x0, 0x0, "810000cc2b000000000000fa25ffff00ffffff"}) r1 = syz_open_pts(r0, 0x141601) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r1, r0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)={0x20, 0x1, 0x2, 0x905, 0x0, 0x0, {0x2, 0x0, 0x8}, [@CTA_EXPECT_MASTER={0xc, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x81}, 0x0) 1.267642711s ago: executing program 3 (id=303): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/crypto\x00', 0x0, 0x0) io_setup(0x2, &(0x7f0000000740)=0x0) io_submit(r2, 0x1, &(0x7f0000000a40)=[&(0x7f0000000840)={0x0, 0x0, 0x0, 0x5, 0x2000, r1, 0x0}]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = socket$kcm(0x2, 0x922000000001, 0x106) sendmsg(r4, &(0x7f0000000b80)={0x0, 0x0, 0x0}, 0x20004000) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000000c0)=r4, 0x4) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f00000005c0)={0x53, 0xfffffffe, 0xc0, 0x2, @scatter={0x1, 0x40000, &(0x7f0000000700)=[{&(0x7f0000000800)=""/215, 0xd7}]}, &(0x7f0000000080)="0000501ef663", 0x0, 0x800004, 0x10030, 0x0, 0x0}) r6 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0xfffd, @multicast1}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000001080)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000400)={r7, 0xffff6721}, 0x8) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x6, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x3ff) dup3(0xffffffffffffffff, r3, 0x0) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000", @ANYRESOCT], 0x14}, 0x1, 0x0, 0x0, 0x40095}, 0x0) 1.251620401s ago: executing program 1 (id=304): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)='/proc/sys/\x00et/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44\x8cm\xa0\x8dN\xd4\xa2\x88\x00\xd1l,'}, 0x8c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x9) time(0x0) getdents(r0, &(0x7f0000000080)=""/43, 0x2b) getdents(r0, 0xfffffffffffffffd, 0xbb) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="99f5a30406f87935cf7c4bd024e7da008000000000000000008000"/37], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) syz_clone(0x0, 0x0, 0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r3, 0x0) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) accept(r2, 0x0, 0x0) 1.249619281s ago: executing program 0 (id=305): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000001f80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000073000000850000005000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xa, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x20}, 0x18) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r2, &(0x7f00000002c0)={0x1d, r3}, 0x10) bind$can_raw(r2, &(0x7f0000000800), 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='mm_page_pcpu_drain\x00'}, 0x18) kexec_load(0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) r4 = syz_open_dev$tty1(0xc, 0x4, 0x2) r5 = dup(r4) ioctl$KDSKBENT(r4, 0x4b47, &(0x7f0000000080)={0x0, 0x79, 0x7}) socket$qrtr(0x2a, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05c02488bc00000071118f00000000008510116df17c359a0d0000000000000c"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r6 = syz_open_dev$usbmon(&(0x7f0000000000), 0x6520, 0x40800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', r3, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r7}, 0x10) r8 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r8, &(0x7f00000002c0)=""/199, 0xc7) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) timer_create(0x3, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) ioctl$MON_IOCT_RING_SIZE(r6, 0x9204, 0x137) 1.218537262s ago: executing program 1 (id=306): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xb, &(0x7f0000000080)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) clock_settime(0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x81000000}, 0x0) io_getevents(0x0, 0x8623, 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x83, &(0x7f00000000c0), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000001dde73191f595ece405ef41519623a2335e65bdcc101667d1b18f856b2ba3454ae01457e06d200948f3d3826ec8c72150abf69618e2d8966d62e032628a9bab9de199071da6020ae8a9db6d5f472ca6a0e4daad2860b6964cbd56d91925db2edd175c79600c60c97128d33ad65fa0e93109f3718127a313fa29e397f5f02839868c69b70cf44e8f87eaf30fdd26d0cbc553da7c81810f3ef5045b04044b8be9ad6115", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000004000000000000000000000c213c4ded088add4c79489fc13243f323fedee7e21d45649a1d6d79c1551e4553a8a99cd5d860959847ecc858fba253d6be3e29552df0f02bc9bfe3344115200f847795b512ad7f5ec55f002006045b70de68330d34efb7b9e77cb46307e7f8ed8"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) eventfd2(0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x111841, 0x0) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:tmp_t:s0\x00', 0x1b, 0x2) write(0xffffffffffffffff, &(0x7f0000004200)='t', 0x1) msgrcv(0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000000) 1.210656092s ago: executing program 2 (id=307): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/crypto\x00', 0x0, 0x0) io_setup(0x2, &(0x7f0000000740)=0x0) io_submit(r3, 0x1, &(0x7f0000000a40)=[&(0x7f0000000840)={0x0, 0x0, 0x0, 0x5, 0x2000, r2, 0x0}]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = socket$kcm(0x2, 0x922000000001, 0x106) sendmsg(r5, &(0x7f0000000b80)={0x0, 0x0, 0x0}, 0x20004000) r6 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r6, 0x2285, &(0x7f00000005c0)={0x53, 0xfffffffe, 0xc0, 0x2, @scatter={0x1, 0x40000, &(0x7f0000000700)=[{&(0x7f0000000800)=""/215, 0xd7}]}, &(0x7f0000000080)="0000501ef663", 0x0, 0x800004, 0x10030, 0x0, 0x0}) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0xfffd, @multicast1}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000001080)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000400)={r9, 0xffff6721}, 0x8) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) r11 = socket(0x10, 0x3, 0x9) r12 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f0000000340)={'fscrypt:', @desc1}, &(0x7f0000000540)={0x0, "02c27e6adb8d51361bd6361865035c027bc75a1fcad12ca9e09ca236536269e10ab9f1716263660c77a3783f35e415893f568b6763d333ff944fb6a866bf7156", 0x2d}, 0x48, 0xfffffffffffffff8) keyctl$search(0xa, r12, &(0x7f0000000640)='.dead\x00', &(0x7f0000000680)={'syz', 0x3}, 0xfffffffffffffffd) sendmsg$NFT_BATCH(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000005304010000000000000000000500000a140000001100010000000000000000000000000a15395c65e84708c4d821f8deca11f7b2550f37980e23d8a882a4e43af738842141be9d88a31401b3b1541e415933e228de99cbbec9849458fc1e21a5878a0e17b256d1681c5db55305"], 0x28}, 0x1, 0x0, 0x0, 0x64841}, 0x40000) splice(r10, 0x0, r4, 0x0, 0x6, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000100)=0x3ff) dup3(r10, r4, 0x0) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000", @ANYRESOCT], 0x14}, 0x1, 0x0, 0x0, 0x40095}, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r13, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001000370400000000ffffffff00000000", @ANYRES32, @ANYBLOB="0b120500000000001c0012800b0001"], 0x3c}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000900)="1cbfa5a23be236e68164f4496d0e9b23558ea960b30db48db0646d3b91572735bc004eea5d8a3f7da97e7e1b52e0ce946515393c229a9d654323d2035591d0bf942dba666454e542b8e0ad7def349b46cb6c8aa5259f02cf7cdd68507b3fe284bccc5af6753ece16f034208b41c7c56ed65bca85a23abc7ef01b53da66f5e93c3e21d9d149c8cfacfec9728810d516365987e60898cb1bee147b273f0ffcfd649d79de3a4f87dc7d21ab663a775b3a04197f543c21ad3c3a64cb379246bbb71f18d9b993083067d0", 0xc8, 0x804, &(0x7f0000000040)={0xa, 0x4e20, 0xb7, @local, 0x8}, 0x1c) 1.185803672s ago: executing program 1 (id=308): socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_usb_connect(0x3, 0x1c, 0x0, 0x0) r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2, {0x3, 0x0, 0x3}, 0x1}, 0x18) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), r0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x14, r2, 0x800, 0x70bd2c, 0x25dfdbfd}, 0x14}}, 0x10) 1.125511903s ago: executing program 3 (id=309): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000001f80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000073000000850000005000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xa, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16=r1], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3, 0x0, 0x20}, 0x18) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(0xffffffffffffffff, &(0x7f00000002c0)={0x1d, r4}, 0x10) bind$can_raw(0xffffffffffffffff, &(0x7f0000000800), 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='mm_page_pcpu_drain\x00'}, 0x18) kexec_load(0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) r5 = syz_open_dev$tty1(0xc, 0x4, 0x2) r6 = dup(r5) ioctl$KDSKBENT(r5, 0x4b47, &(0x7f0000000080)={0x0, 0x79, 0x7}) socket$qrtr(0x2a, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05c02488bc00000071118f00000000008510116df17c359a0d0000000000000c"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) syz_open_dev$usbmon(&(0x7f0000000000), 0x6520, 0x40800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', r4, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r7}, 0x10) r8 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r8, &(0x7f00000002c0)=""/199, 0xc7) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) timer_create(0x3, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) 977.060725ms ago: executing program 2 (id=310): pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r0, 0x0, 0x6, 0x0) dup3(r1, r0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000", @ANYRESOCT], 0x14}, 0x1, 0x0, 0x0, 0x40095}, 0x0) 852.286077ms ago: executing program 4 (id=311): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000001f80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000073000000850000005000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xa, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='percpu_free_percpu\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16=r1], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3, 0x0, 0x20}, 0x18) r4 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_raw(r4, &(0x7f00000002c0)={0x1d, r5}, 0x10) bind$can_raw(r4, &(0x7f0000000800), 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='mm_page_pcpu_drain\x00'}, 0x18) kexec_load(0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) r6 = syz_open_dev$tty1(0xc, 0x4, 0x2) r7 = dup(r6) ioctl$KDSKBENT(r6, 0x4b47, &(0x7f0000000080)={0x0, 0x79, 0x7}) socket$qrtr(0x2a, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05c02488bc00000071118f00000000008510116df17c359a0d0000000000000c"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) syz_open_dev$usbmon(&(0x7f0000000000), 0x6520, 0x40800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', r5, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r8}, 0x10) r9 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r9, &(0x7f00000002c0)=""/199, 0xc7) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) timer_create(0x3, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) 397.106424ms ago: executing program 0 (id=312): syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1008002, &(0x7f00000003c0)=ANY=[], 0x1, 0x2ee, &(0x7f00000006c0)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) semop(0x0, &(0x7f0000000240)=[{0x2, 0x7fff, 0x1000}], 0x1) syz_mount_image$ext4(&(0x7f00000003c0)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x2404, &(0x7f0000000300)={[{@user_xattr}, {@dax_always}], [{@smackfsfloor={'smackfsfloor', 0x3d, '}!'}}, {@subj_user={'subj_user', 0x3d, '&[:^]\x9c{:'}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x800000, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8a, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) write(r2, &(0x7f0000004200)='t', 0x1) sendfile(r2, r1, 0x0, 0x3ffff) sendfile(r2, r1, 0x0, 0x7ffff000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000cab000)=0xc) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000001500)={0x300, 0x2b, 0x200, 0x70bd2c, 0x25dfdbfc, {0x19}, [@nested={0xec, 0x2, 0x0, 0x1, [@typed={0xc, 0x3c, 0x0, 0x0, @u64=0xc}, @generic="16a0c00efd73a062779757cca412ac924e5cf3b0bc665428c36a127beb3cfbfaf7d26720e9530968984a7c23bab0b46a6fff6f7f0085e76e77a4c6821d1d9316bb61184d3fe478f9d5193ecec98a91ad9323e483c11be1f7f242bd95c73e06a5e3b9aba6da77b7db2840569ff85f4c5a9ef3bbfd9a93a6d716643813cb4d07ddcd6cb7b8e2a12ed190a5c385e26817c0f1e223e75bd14fe6d796857059137f48c237999801ff4c9a6676c7ce848be3ecf2821135907615df", @typed={0x14, 0xb2, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x8c, 0x0, 0x0, @fd=r2}, @typed={0x4, 0xdb}, @typed={0x4, 0x83}]}, @generic="8d01cbcce59ed19b2ceed65b3ca9ce44f44b6b19c81dd4b5c5475c5cbc5764ee6c0c15aca3f39ce8c64572ea220de35e006c1ddadbd596f1bfa4206fc4fc38304c11f89249fc09e341c828f689733df59a6976d93309c14c81d1589267a861ecb544ba215a709e945dce5a8fc47992439c2b86f5aadee155d7fc05169da9e63bff4ef44ee5b27a525cbfbf525d9b09149199bdbbf1a8aeaf93cd49c738da88c02329f9a5a6ad4df2071b5b32c2cf7a18955eae556de8332ff1aab234c8ff08de66", @generic="70f1816aa12914d857c8974bee00bec20b0ccb0593add9fe1e5c0af48cef7b826a7aa34dad5456a8129620f5a9b3fb5805b3a1a98ceba91b6f2dcaebf7fcd48d2bfd192ef29b3842368315299e76e2f0ee4fb9e61a1bea94cd58fa3d01fb4a53433124c6e287cabdac1ad690a37e0cff0bf818309b4a52f39b87dfa079172f94d53f460f426b06d27df062bc8072dd4b6cf183f462be055300b6f7ddcd31b9c249b172bf47215eb6453a622bde8e8c891a4dceff4ec12982139f3f320d526bb47682e2c1bb5707224e1e11", @generic="8807908a47b9f2d67d5a887eef5c86b7cc3a5d38bb04c5369dc0d5ba06dc34fe5325668cc4f4c436fc404db4cd02034e4cbc3a2af0ad9fab4d735e85d17a0c51056c", @nested={0x30, 0x6b, 0x0, 0x1, [@nested={0x4, 0x13b}, @nested={0x4, 0xb7}, @typed={0x14, 0xb0, 0x0, 0x0, @ipv6=@private0}, @nested={0x10, 0x106, 0x0, 0x1, [@nested={0xc, 0x5f, 0x0, 0x1, [@typed={0x8, 0x110, 0x0, 0x0, @pid=r4}]}]}]}]}, 0x300}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000880) 316.576595ms ago: executing program 3 (id=313): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000f0ff0000050000000200000000000000", @ANYRES32, @ANYBLOB="ffffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000004000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa600000000000007020000f8ffffffb703000008000000b7040000000000008500000003001c009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x2c, r4, 0x6a98047402e98331, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x4886) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 234.851897ms ago: executing program 3 (id=314): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/crypto\x00', 0x0, 0x0) io_setup(0x2, &(0x7f0000000740)=0x0) io_submit(r3, 0x1, &(0x7f0000000a40)=[&(0x7f0000000840)={0x0, 0x0, 0x0, 0x5, 0x2000, r2, 0x0}]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = socket$kcm(0x2, 0x922000000001, 0x106) sendmsg(r5, 0x0, 0x20004000) r6 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r6, 0x2285, 0x0) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0xfffd, @multicast1}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000001080)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, 0x0, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) r10 = socket(0x10, 0x3, 0x9) r11 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f0000000340)={'fscrypt:', @desc1}, &(0x7f0000000540)={0x0, "02c27e6adb8d51361bd6361865035c027bc75a1fcad12ca9e09ca236536269e10ab9f1716263660c77a3783f35e415893f568b6763d333ff944fb6a866bf7156", 0x2d}, 0x48, 0xfffffffffffffff8) keyctl$search(0xa, r11, &(0x7f0000000640)='.dead\x00', &(0x7f0000000680)={'syz', 0x3}, 0xfffffffffffffffd) sendmsg$NFT_BATCH(r10, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x64841}, 0x40000) splice(r9, 0x0, r4, 0x0, 0x6, 0x0) ioctl$int_in(r4, 0x5452, 0x0) dup3(r9, r4, 0x0) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40095}, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r12, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x804, &(0x7f0000000040)={0xa, 0x4e20, 0xb7, @local, 0x8}, 0x1c) 0s ago: executing program 4 (id=315): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_io_uring_setup(0x1725, 0x0, 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3) pause() fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x2c, 0xffffffffffbffff8) r4 = dup2(r2, r3) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r5, 0xe0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000001380)}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x38) fcntl$setown(r2, 0x8, r1) tkill(r1, 0x13) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x86, "325c87f1687b1b77b379a83100184c4d73737ba9ec54b391ab749e7799328c1b3a22dd8a3a0628c05ebcb1389802bf3b0063c6fdac4c0792d72b55d6bfb45fefdd79491161f28669c89b94673d7fdf784e3e5f1e2f1885d484de79a89078290a2f831f03279c21fe1034bd933533fd21a8a51e485e15d29a4a222621662bf21b9362f6e2c9d8"}, &(0x7f00000001c0)=0x8e) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000380)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x18) setxattr$security_selinux(&(0x7f0000000440)='./cgroup\x00', &(0x7f0000000480), &(0x7f00000004c0)='system_u:object_r:kmsg_device_t:s0\x00', 0x23, 0x1) kernel console output (not intermixed with test programs): [ 21.900988][ T29] audit: type=1400 audit(1743482237.646:81): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.1.96' (ED25519) to the list of known hosts. [ 26.483689][ T29] audit: type=1400 audit(1743482242.226:82): avc: denied { mounton } for pid=3290 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.484713][ T3290] cgroup: Unknown subsys name 'net' [ 26.506435][ T29] audit: type=1400 audit(1743482242.226:83): avc: denied { mount } for pid=3290 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.533816][ T29] audit: type=1400 audit(1743482242.256:84): avc: denied { unmount } for pid=3290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.715090][ T3290] cgroup: Unknown subsys name 'cpuset' [ 26.721190][ T3290] cgroup: Unknown subsys name 'rlimit' [ 26.832272][ T29] audit: type=1400 audit(1743482242.576:85): avc: denied { setattr } for pid=3290 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.855700][ T29] audit: type=1400 audit(1743482242.576:86): avc: denied { create } for pid=3290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.876245][ T29] audit: type=1400 audit(1743482242.576:87): avc: denied { write } for pid=3290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.893432][ T3294] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.896630][ T29] audit: type=1400 audit(1743482242.576:88): avc: denied { read } for pid=3290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.925565][ T29] audit: type=1400 audit(1743482242.576:89): avc: denied { mounton } for pid=3290 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.928148][ T3290] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.950462][ T29] audit: type=1400 audit(1743482242.576:90): avc: denied { mount } for pid=3290 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.982341][ T29] audit: type=1400 audit(1743482242.656:91): avc: denied { relabelto } for pid=3294 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.750512][ T3301] chnl_net:caif_netlink_parms(): no params data found [ 28.800559][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 28.857096][ T3300] chnl_net:caif_netlink_parms(): no params data found [ 28.886118][ T3301] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.893179][ T3301] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.900378][ T3301] bridge_slave_0: entered allmulticast mode [ 28.907032][ T3301] bridge_slave_0: entered promiscuous mode [ 28.927533][ T3301] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.934630][ T3301] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.941761][ T3301] bridge_slave_1: entered allmulticast mode [ 28.948265][ T3301] bridge_slave_1: entered promiscuous mode [ 28.969782][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 28.985453][ T3301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.997681][ T3301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.009430][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.016524][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.023692][ T3311] bridge_slave_0: entered allmulticast mode [ 29.030036][ T3311] bridge_slave_0: entered promiscuous mode [ 29.036518][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.043618][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.050779][ T3311] bridge_slave_1: entered allmulticast mode [ 29.057228][ T3311] bridge_slave_1: entered promiscuous mode [ 29.103855][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.118114][ T3301] team0: Port device team_slave_0 added [ 29.123920][ T3300] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.131032][ T3300] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.138195][ T3300] bridge_slave_0: entered allmulticast mode [ 29.144668][ T3300] bridge_slave_0: entered promiscuous mode [ 29.168421][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.178298][ T3301] team0: Port device team_slave_1 added [ 29.193800][ T3300] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.200903][ T3300] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.208103][ T3300] bridge_slave_1: entered allmulticast mode [ 29.214565][ T3300] bridge_slave_1: entered promiscuous mode [ 29.237418][ T3301] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.244448][ T3301] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.270369][ T3301] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.297474][ T3311] team0: Port device team_slave_0 added [ 29.303370][ T3301] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.310370][ T3301] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.336405][ T3301] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.353432][ T3303] chnl_net:caif_netlink_parms(): no params data found [ 29.362261][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.369378][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.376575][ T3306] bridge_slave_0: entered allmulticast mode [ 29.382876][ T3306] bridge_slave_0: entered promiscuous mode [ 29.389535][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.396671][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.403840][ T3306] bridge_slave_1: entered allmulticast mode [ 29.410422][ T3306] bridge_slave_1: entered promiscuous mode [ 29.417179][ T3311] team0: Port device team_slave_1 added [ 29.426689][ T3300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.448925][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.467603][ T3300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.476975][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.484022][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.510015][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.521806][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.528848][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.555248][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.572052][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.614695][ T3301] hsr_slave_0: entered promiscuous mode [ 29.620537][ T3301] hsr_slave_1: entered promiscuous mode [ 29.634243][ T3306] team0: Port device team_slave_0 added [ 29.640513][ T3300] team0: Port device team_slave_0 added [ 29.647145][ T3300] team0: Port device team_slave_1 added [ 29.665111][ T3306] team0: Port device team_slave_1 added [ 29.682573][ T3311] hsr_slave_0: entered promiscuous mode [ 29.688611][ T3311] hsr_slave_1: entered promiscuous mode [ 29.694380][ T3311] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.701990][ T3311] Cannot create hsr debugfs directory [ 29.716897][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.723850][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.749906][ T3300] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.770699][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.777881][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.785202][ T3303] bridge_slave_0: entered allmulticast mode [ 29.791668][ T3303] bridge_slave_0: entered promiscuous mode [ 29.809424][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.816437][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.842406][ T3300] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.858675][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.865779][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.873085][ T3303] bridge_slave_1: entered allmulticast mode [ 29.879894][ T3303] bridge_slave_1: entered promiscuous mode [ 29.888044][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.895044][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.921047][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.953284][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.960331][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.986290][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.009641][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.037097][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.068804][ T3300] hsr_slave_0: entered promiscuous mode [ 30.074881][ T3300] hsr_slave_1: entered promiscuous mode [ 30.080643][ T3300] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.088488][ T3300] Cannot create hsr debugfs directory [ 30.095948][ T3306] hsr_slave_0: entered promiscuous mode [ 30.101998][ T3306] hsr_slave_1: entered promiscuous mode [ 30.107794][ T3306] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.115520][ T3306] Cannot create hsr debugfs directory [ 30.130921][ T3303] team0: Port device team_slave_0 added [ 30.153751][ T3303] team0: Port device team_slave_1 added [ 30.198267][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.205293][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.231231][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.255886][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.262844][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.288831][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.331114][ T3303] hsr_slave_0: entered promiscuous mode [ 30.337157][ T3303] hsr_slave_1: entered promiscuous mode [ 30.342917][ T3303] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 30.350528][ T3303] Cannot create hsr debugfs directory [ 30.366571][ T3301] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 30.377697][ T3301] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 30.401663][ T3301] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 30.412362][ T3301] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 30.436238][ T3311] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 30.444852][ T3311] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 30.453748][ T3311] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 30.474670][ T3311] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 30.529838][ T3306] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 30.546727][ T3306] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 30.555827][ T3306] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 30.564239][ T3306] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 30.590297][ T3300] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 30.606378][ T3300] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 30.615858][ T3300] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 30.636774][ T3300] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 30.652653][ T3303] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 30.661817][ T3303] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 30.675443][ T3303] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 30.684702][ T3303] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 30.709832][ T3301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.744436][ T3301] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.754814][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.761908][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.772023][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.782842][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.791728][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.798776][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.823616][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.843492][ T3301] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.854002][ T3301] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.867954][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.875030][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.885293][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.892426][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.927762][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.937448][ T3300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.950097][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.957213][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.986951][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.994057][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.019950][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.034031][ T3300] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.052304][ T41] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.059382][ T41] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.071196][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.081643][ T3301] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.102215][ T1622] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.109425][ T1622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.118599][ T1622] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.125753][ T1622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.136997][ T1622] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.144103][ T1622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.158026][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.182910][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.208817][ T3303] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 31.219338][ T3303] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.334555][ T3300] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.350514][ T3311] veth0_vlan: entered promiscuous mode [ 31.362931][ T3301] veth0_vlan: entered promiscuous mode [ 31.377221][ T3311] veth1_vlan: entered promiscuous mode [ 31.386395][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.401283][ T3311] veth0_macvtap: entered promiscuous mode [ 31.420179][ T3306] veth0_vlan: entered promiscuous mode [ 31.428783][ T3311] veth1_macvtap: entered promiscuous mode [ 31.436778][ T3301] veth1_vlan: entered promiscuous mode [ 31.443456][ T3306] veth1_vlan: entered promiscuous mode [ 31.479095][ T3306] veth0_macvtap: entered promiscuous mode [ 31.491987][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.501331][ T3301] veth0_macvtap: entered promiscuous mode [ 31.509954][ T3301] veth1_macvtap: entered promiscuous mode [ 31.518398][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.528680][ T3300] veth0_vlan: entered promiscuous mode [ 31.535338][ T3306] veth1_macvtap: entered promiscuous mode [ 31.543910][ T3311] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.552779][ T3311] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.561561][ T3311] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.570381][ T3311] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.587902][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.598470][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.609780][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.622541][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.633210][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.643963][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.652593][ T3300] veth1_vlan: entered promiscuous mode [ 31.663601][ T3306] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.672383][ T3306] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.681137][ T3306] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.689860][ T3306] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.699875][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.710328][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.720158][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.730634][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.741435][ T3301] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.760493][ T3303] veth0_vlan: entered promiscuous mode [ 31.768720][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.773983][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 31.773997][ T29] audit: type=1400 audit(1743482247.516:110): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/root/syzkaller.41g592/syz-tmp" dev="sda1" ino=1944 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 31.779359][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.785317][ T29] audit: type=1400 audit(1743482247.516:111): avc: denied { mount } for pid=3311 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 31.785345][ T29] audit: type=1400 audit(1743482247.516:112): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/root/syzkaller.41g592/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 31.809552][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.809569][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.819355][ T29] audit: type=1400 audit(1743482247.516:113): avc: denied { mount } for pid=3311 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 31.819381][ T29] audit: type=1400 audit(1743482247.516:114): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/root/syzkaller.41g592/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 31.844269][ T3301] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.866590][ T29] audit: type=1400 audit(1743482247.516:115): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/root/syzkaller.41g592/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3817 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 31.882074][ T3301] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.886868][ T29] audit: type=1400 audit(1743482247.516:116): avc: denied { unmount } for pid=3311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 31.908789][ T3301] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.940258][ T29] audit: type=1400 audit(1743482247.686:117): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=502 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 31.942520][ T3301] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.969960][ T29] audit: type=1400 audit(1743482247.686:118): avc: denied { mount } for pid=3311 comm="syz-executor" name="/" dev="gadgetfs" ino=3818 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 32.061254][ T3301] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.078579][ T3311] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 32.097017][ T3303] veth1_vlan: entered promiscuous mode [ 32.108041][ T29] audit: type=1400 audit(1743482247.856:119): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.151439][ T3300] veth0_macvtap: entered promiscuous mode [ 32.158741][ T3300] veth1_macvtap: entered promiscuous mode [ 32.173395][ T3303] veth0_macvtap: entered promiscuous mode [ 32.201979][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.212569][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.222466][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.232951][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.242815][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.253325][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.276376][ T3444] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=3444 comm=syz.4.5 [ 32.277131][ T3440] xt_hashlimit: max too large, truncated to 1048576 [ 32.291721][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.304041][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.314573][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.324609][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.335070][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.344969][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.355394][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.367167][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.380961][ T3303] veth1_macvtap: entered promiscuous mode [ 32.394840][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.405328][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.415164][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.425598][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.435417][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.445863][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.455753][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 32.466323][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.477617][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.477764][ T3450] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4'. [ 32.502391][ T3444] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5'. [ 32.502753][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.521586][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.531494][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.541993][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.551809][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.562319][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.572131][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 32.582592][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 32.593149][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.619120][ T3303] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.627970][ T3303] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.628013][ T3303] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.628056][ T3303] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.629823][ T3300] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.629862][ T3300] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.629894][ T3300] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.630043][ T3300] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.830540][ C1] hrtimer: interrupt took 31095 ns [ 32.861876][ T3476] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=3476 comm=syz.0.10 [ 32.896516][ T3480] loop3: detected capacity change from 0 to 1024 [ 32.995640][ T3486] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14'. [ 33.031108][ T3476] netlink: 12 bytes leftover after parsing attributes in process `syz.0.10'. [ 33.055059][ T3486] netlink: 4 bytes leftover after parsing attributes in process `syz.2.14'. [ 33.078803][ T3488] 9pnet: Could not find request transport: fd0x0000000000000003 [ 33.096276][ T3467] loop4: detected capacity change from 0 to 512 [ 33.106996][ T3480] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 33.133759][ T3467] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 33.200130][ T3495] loop0: detected capacity change from 0 to 128 [ 33.337111][ T3467] EXT4-fs (loop4): 1 orphan inode deleted [ 33.374560][ T31] EXT4-fs error (device loop4): ext4_release_dquot:6971: comm kworker/u8:1: Failed to release dquot type 1 [ 33.401840][ T3467] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 33.468563][ T3467] ext4 filesystem being mounted at /2/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 33.751327][ T3301] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 33.920673][ T3509] netlink: 4 bytes leftover after parsing attributes in process `syz.4.19'. [ 33.951118][ T3509] netlink: 4 bytes leftover after parsing attributes in process `syz.4.19'. [ 33.981599][ T3509] bridge_slave_1: left allmulticast mode [ 33.987363][ T3509] bridge_slave_1: left promiscuous mode [ 33.993122][ T3509] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.020257][ T3512] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=3512 comm=syz.1.20 [ 34.045593][ T3509] bridge_slave_0: left allmulticast mode [ 34.051286][ T3509] bridge_slave_0: left promiscuous mode [ 34.057047][ T3509] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.070309][ T3514] netlink: 28 bytes leftover after parsing attributes in process `syz.3.21'. [ 34.150435][ T3521] SELinux: Context system_u:object_r:tmp_t:s0 is not valid (left unmapped). [ 34.177415][ T3512] netlink: 12 bytes leftover after parsing attributes in process `syz.1.20'. [ 34.303610][ T3534] loop1: detected capacity change from 0 to 2048 [ 34.305561][ T3537] loop3: detected capacity change from 0 to 128 [ 34.317101][ T3537] ======================================================= [ 34.317101][ T3537] WARNING: The mand mount option has been deprecated and [ 34.317101][ T3537] and is ignored by this kernel. Remove the mand [ 34.317101][ T3537] option from the mount to silence this warning. [ 34.317101][ T3537] ======================================================= [ 34.360807][ T3537] EXT4-fs (loop3): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 34.382370][ T3537] ext4 filesystem being mounted at /5/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 34.423532][ T3534] loop1: unable to read partition table [ 34.438246][ T3534] loop1: partition table beyond EOD, truncated [ 34.444568][ T3534] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 34.481121][ T3004] loop1: unable to read partition table [ 34.493214][ T3004] loop1: partition table beyond EOD, truncated [ 34.640802][ T3550] xt_hashlimit: max too large, truncated to 1048576 [ 34.883822][ T3561] loop2: detected capacity change from 0 to 1024 [ 34.891966][ T3561] EXT4-fs: Ignoring removed nobh option [ 34.897650][ T3561] EXT4-fs: Ignoring removed bh option [ 34.999392][ T3561] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.060559][ T3561] netlink: 28 bytes leftover after parsing attributes in process `syz.2.37'. [ 35.137008][ T3306] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.169603][ T3569] loop2: detected capacity change from 0 to 2048 [ 35.205839][ T3569] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.314510][ T3569] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 35.329338][ T3311] EXT4-fs (loop3): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 35.339856][ T3569] EXT4-fs error (device loop2): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 35.355465][ T3569] EXT4-fs (loop2): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 32 with error 28 [ 35.367792][ T3569] EXT4-fs (loop2): This should not happen!! Data will be lost [ 35.367792][ T3569] [ 35.377642][ T3569] EXT4-fs (loop2): Total free blocks count 0 [ 35.383656][ T3569] EXT4-fs (loop2): Free/Dirty block details [ 35.389611][ T3569] EXT4-fs (loop2): free_blocks=2415919104 [ 35.395356][ T3569] EXT4-fs (loop2): dirty_blocks=32 [ 35.400508][ T3569] EXT4-fs (loop2): Block reservation details [ 35.406700][ T3569] EXT4-fs (loop2): i_reserved_data_blocks=2 [ 35.424071][ T3579] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 35.473505][ T3569] syz.2.39 (3569) used greatest stack depth: 10072 bytes left [ 35.501830][ T3306] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.648741][ T3589] pim6reg: entered allmulticast mode [ 35.744319][ T3599] pim6reg: entered allmulticast mode [ 35.752402][ T3589] pim6reg: left allmulticast mode [ 35.807566][ T3609] pim6reg: left allmulticast mode [ 35.870702][ T3618] IPVS: sync thread started: state = MASTER, mcast_ifn = veth1_to_team, syncid = 4, id = 0 [ 35.948049][ T3622] ip6t_rpfilter: unknown options [ 35.970400][ T3617] pim6reg: entered allmulticast mode [ 35.978723][ T3622] netlink: 'syz.1.55': attribute type 13 has an invalid length. [ 36.055476][ T3624] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.242818][ T3622] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 36.261228][ T3627] pim6reg: left allmulticast mode [ 36.468943][ T3624] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.718097][ T3624] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.905992][ T3624] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.957674][ T29] kauditd_printk_skb: 611 callbacks suppressed [ 36.957709][ T29] audit: type=1400 audit(1743482252.706:730): avc: denied { read write } for pid=3301 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.004339][ T3624] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.016566][ T3646] IPVS: set_ctl: invalid protocol: 8 100.1.1.0:20001 [ 37.018273][ T3624] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.025522][ T29] audit: type=1400 audit(1743482252.766:731): avc: denied { allowed } for pid=3645 comm="syz.4.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 37.050700][ T29] audit: type=1400 audit(1743482252.766:732): avc: denied { write } for pid=3645 comm="syz.4.62" name="001" dev="devtmpfs" ino=168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 37.073253][ T29] audit: type=1400 audit(1743482252.766:733): avc: denied { name_bind } for pid=3645 comm="syz.4.62" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 37.076631][ T3624] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.094971][ T29] audit: type=1400 audit(1743482252.766:734): avc: denied { allowed } for pid=3645 comm="syz.4.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 37.134178][ T3626] syz.0.57 (3626) used greatest stack depth: 6968 bytes left [ 37.146261][ T3624] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.154783][ T29] audit: type=1400 audit(1743482252.896:735): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.187529][ T29] audit: type=1400 audit(1743482252.926:736): avc: denied { read write } for pid=3306 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 37.211839][ T29] audit: type=1400 audit(1743482252.936:737): avc: denied { create } for pid=3649 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 37.231164][ T29] audit: type=1400 audit(1743482252.936:738): avc: denied { prog_load } for pid=3649 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 37.250191][ T29] audit: type=1400 audit(1743482252.936:739): avc: denied { mounton } for pid=3649 comm="syz.0.63" path="/13" dev="tmpfs" ino=81 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 37.251958][ T3651] x_tables: duplicate underflow at hook 3 [ 37.528003][ T3678] pim6reg: entered allmulticast mode [ 37.535413][ T3678] pim6reg: left allmulticast mode [ 37.612714][ T3402] nci: nci_rf_intf_activated_ntf_packet: unsupported rf_interface 0x12 [ 37.661535][ T3696] __nla_validate_parse: 2 callbacks suppressed [ 37.661552][ T3696] netlink: 60 bytes leftover after parsing attributes in process `syz.1.82'. [ 37.737381][ T3695] pim6reg: entered allmulticast mode [ 37.766878][ T3704] pim6reg: left allmulticast mode [ 37.790795][ T3702] netlink: 4 bytes leftover after parsing attributes in process `syz.3.84'. [ 37.802057][ T3702] netlink: 4 bytes leftover after parsing attributes in process `syz.3.84'. [ 37.818930][ T3702] team0: Port device team_slave_0 removed [ 37.902081][ T3716] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 38.000941][ T3726] netlink: 60 bytes leftover after parsing attributes in process `syz.1.95'. [ 38.216343][ T3739] pim6reg: entered allmulticast mode [ 38.326010][ T3739] pim6reg: left allmulticast mode [ 38.418292][ T3748] netlink: 4 bytes leftover after parsing attributes in process `syz.0.105'. [ 38.468926][ T3754] netlink: 60 bytes leftover after parsing attributes in process `syz.1.107'. [ 38.480301][ T3755] netlink: 4 bytes leftover after parsing attributes in process `syz.0.105'. [ 38.529264][ T3756] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 38.839812][ T3781] netlink: 60 bytes leftover after parsing attributes in process `syz.3.119'. [ 38.921781][ T3788] netlink: 4 bytes leftover after parsing attributes in process `syz.3.122'. [ 38.941111][ T3779] pim6reg: entered allmulticast mode [ 38.947771][ T3793] pim6reg: left allmulticast mode [ 38.957262][ T3788] netlink: 4 bytes leftover after parsing attributes in process `syz.3.122'. [ 38.966529][ T3790] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 39.044335][ T3402] nci: nci_rf_intf_activated_ntf_packet: unsupported rf_interface 0x12 [ 39.100690][ T3810] loop3: detected capacity change from 0 to 128 [ 39.338918][ T3829] pim6reg: entered allmulticast mode [ 39.367946][ T3829] pim6reg: left allmulticast mode [ 39.443690][ T41] nci: nci_rf_intf_activated_ntf_packet: unsupported rf_interface 0x12 [ 39.827141][ T3863] pim6reg: entered allmulticast mode [ 39.836110][ T3863] pim6reg: left allmulticast mode [ 39.875777][ T41] nci: nci_rf_intf_activated_ntf_packet: unsupported rf_interface 0x12 [ 40.089170][ T3898] loop2: detected capacity change from 0 to 1024 [ 40.097362][ T3898] EXT4-fs: Ignoring removed nobh option [ 40.102962][ T3898] EXT4-fs: Ignoring removed bh option [ 40.138561][ T3898] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.233730][ T3306] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.250408][ T51] nci: nci_rf_intf_activated_ntf_packet: unsupported rf_interface 0x12 [ 40.313248][ T3921] pim6reg: entered allmulticast mode [ 40.323234][ T3921] pim6reg: left allmulticast mode [ 40.431273][ T3925] loop2: detected capacity change from 0 to 128 [ 40.931323][ T3953] veth1_macvtap: left promiscuous mode [ 40.987279][ T3951] pim6reg: entered allmulticast mode [ 41.008952][ T3951] pim6reg: left allmulticast mode [ 41.131651][ T31] nci: nci_rf_intf_activated_ntf_packet: unsupported rf_interface 0x12 [ 41.329900][ T3990] loop4: detected capacity change from 0 to 1024 [ 41.338764][ T3990] EXT4-fs: Ignoring removed nobh option [ 41.344479][ T3990] EXT4-fs: Ignoring removed bh option [ 41.372955][ T3990] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.493514][ T3301] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.592887][ T4003] pim6reg: entered allmulticast mode [ 41.600266][ T4003] pim6reg: left allmulticast mode [ 41.695562][ T4016] loop2: detected capacity change from 0 to 128 [ 41.911196][ T41] nci: nci_rf_intf_activated_ntf_packet: unsupported rf_interface 0x12 [ 41.964887][ T29] kauditd_printk_skb: 760 callbacks suppressed [ 41.964903][ T29] audit: type=1400 audit(1743482257.706:1500): avc: denied { create } for pid=4028 comm="syz.4.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 41.992163][ T29] audit: type=1400 audit(1743482257.716:1501): avc: denied { create } for pid=4030 comm="syz.3.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 42.011655][ T29] audit: type=1400 audit(1743482257.716:1502): avc: denied { getopt } for pid=4030 comm="syz.3.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 42.031286][ T29] audit: type=1400 audit(1743482257.716:1503): avc: denied { create } for pid=4030 comm="syz.3.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 42.051750][ T29] audit: type=1400 audit(1743482257.716:1504): avc: denied { write } for pid=4030 comm="syz.3.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 42.079035][ T4032] loop4: detected capacity change from 0 to 1024 [ 42.085852][ T4032] EXT4-fs: Ignoring removed nobh option [ 42.091429][ T4032] EXT4-fs: Ignoring removed bh option [ 42.105863][ T29] audit: type=1400 audit(1743482257.856:1505): avc: denied { create } for pid=4033 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 42.125688][ T29] audit: type=1400 audit(1743482257.856:1506): avc: denied { setopt } for pid=4033 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 42.144804][ T29] audit: type=1400 audit(1743482257.856:1507): avc: denied { write } for pid=4033 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 42.180380][ T29] audit: type=1326 audit(1743482257.916:1508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4037 comm="syz.0.219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ddbd6d169 code=0x7ffc0000 [ 42.203820][ T29] audit: type=1326 audit(1743482257.916:1509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4037 comm="syz.0.219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6ddbd6d169 code=0x7ffc0000 [ 42.246821][ T4032] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 42.323967][ T4049] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 42.364128][ T4048] pim6reg: entered allmulticast mode [ 42.398015][ T4048] pim6reg: left allmulticast mode [ 42.417643][ T3301] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.587373][ T51] nci: nci_rf_intf_activated_ntf_packet: unsupported rf_interface 0x12 [ 42.667351][ T4082] __nla_validate_parse: 27 callbacks suppressed [ 42.667371][ T4082] netlink: 4 bytes leftover after parsing attributes in process `syz.0.235'. [ 42.691383][ T4082] netlink: 4 bytes leftover after parsing attributes in process `syz.0.235'. [ 42.700687][ T4081] loop3: detected capacity change from 0 to 1024 [ 42.707701][ T4081] EXT4-fs: Ignoring removed nobh option [ 42.713339][ T4081] EXT4-fs: Ignoring removed bh option [ 42.726340][ T4081] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 42.741759][ T4081] netlink: 28 bytes leftover after parsing attributes in process `syz.3.236'. [ 42.835925][ T4087] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 42.845047][ T3311] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.990303][ T4094] pim6reg: entered allmulticast mode [ 43.008666][ T4098] loop3: detected capacity change from 0 to 128 [ 43.018131][ T4094] pim6reg: left allmulticast mode [ 43.160229][ T4111] loop0: detected capacity change from 0 to 128 [ 43.169754][ T3402] nci: nci_rf_intf_activated_ntf_packet: unsupported rf_interface 0x12 [ 43.216554][ T4114] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4114 comm=syz.3.248 [ 43.345211][ T4114] netlink: 12 bytes leftover after parsing attributes in process `syz.3.248'. [ 43.415029][ T4123] SELinux: Context system_u:object_r:kmsg_device_t:s0 is not valid (left unmapped). [ 43.463549][ T4129] netlink: 60 bytes leftover after parsing attributes in process `syz.3.252'. [ 45.747686][ T4162] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4162 comm=syz.4.263 [ 45.839408][ T4165] netlink: 60 bytes leftover after parsing attributes in process `syz.0.264'. [ 45.870231][ T4162] netlink: 12 bytes leftover after parsing attributes in process `syz.4.263'. [ 45.954329][ T4176] loop4: detected capacity change from 0 to 128 [ 46.996125][ T29] kauditd_printk_skb: 569 callbacks suppressed [ 46.996140][ T29] audit: type=1326 audit(1743482262.746:2079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42ea4ed169 code=0x7ffc0000 [ 47.026468][ T29] audit: type=1326 audit(1743482262.746:2080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f42ea4ed169 code=0x7ffc0000 [ 47.049886][ T29] audit: type=1326 audit(1743482262.746:2081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42ea4ed169 code=0x7ffc0000 [ 47.073197][ T29] audit: type=1326 audit(1743482262.746:2082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f42ea4ed169 code=0x7ffc0000 [ 47.096502][ T29] audit: type=1326 audit(1743482262.746:2083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42ea4ed169 code=0x7ffc0000 [ 47.119902][ T29] audit: type=1326 audit(1743482262.746:2084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f42ea4ed169 code=0x7ffc0000 [ 47.143248][ T29] audit: type=1326 audit(1743482262.746:2085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42ea4ed169 code=0x7ffc0000 [ 47.166629][ T29] audit: type=1326 audit(1743482262.746:2086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f42ea4ed169 code=0x7ffc0000 [ 47.189900][ T29] audit: type=1326 audit(1743482262.746:2087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f42ea4ed169 code=0x7ffc0000 [ 47.213216][ T29] audit: type=1326 audit(1743482262.746:2088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4196 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f42ea4ed169 code=0x7ffc0000 [ 47.661995][ T4209] pim6reg: entered allmulticast mode [ 47.668423][ T4209] pim6reg: left allmulticast mode [ 47.782553][ T4213] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4213 comm=syz.0.280 [ 47.863629][ T4218] loop3: detected capacity change from 0 to 128 [ 47.917319][ T4213] netlink: 12 bytes leftover after parsing attributes in process `syz.0.280'. [ 49.871029][ T4255] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4255 comm=syz.0.293 [ 49.993023][ T4255] netlink: 12 bytes leftover after parsing attributes in process `syz.0.293'. [ 50.815991][ T4272] loop1: detected capacity change from 0 to 128 [ 51.890061][ T4298] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4298 comm=syz.2.307 [ 52.006759][ T29] kauditd_printk_skb: 724 callbacks suppressed [ 52.006776][ T29] audit: type=1326 audit(1743482267.756:2813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.1.304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7fe31f68d169 code=0x7ffc0000 [ 52.012699][ T4298] netlink: 12 bytes leftover after parsing attributes in process `syz.2.307'. [ 52.246045][ T29] audit: type=1326 audit(1743482267.996:2814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4313 comm="syz.4.311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f98810cd169 code=0x7ffc0000 [ 52.269601][ T29] audit: type=1326 audit(1743482267.996:2815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4313 comm="syz.4.311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f98810cd169 code=0x7ffc0000 [ 52.293096][ T29] audit: type=1326 audit(1743482267.996:2816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4313 comm="syz.4.311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f98810cd169 code=0x7ffc0000 [ 52.316455][ T29] audit: type=1326 audit(1743482267.996:2817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4313 comm="syz.4.311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f98810cd169 code=0x7ffc0000 [ 52.339844][ T29] audit: type=1326 audit(1743482267.996:2818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4313 comm="syz.4.311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f98810cd169 code=0x7ffc0000 [ 52.363150][ T29] audit: type=1326 audit(1743482267.996:2819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4313 comm="syz.4.311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f98810cd169 code=0x7ffc0000 [ 52.386567][ T29] audit: type=1326 audit(1743482267.996:2820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4313 comm="syz.4.311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f98810cd169 code=0x7ffc0000 [ 52.409872][ T29] audit: type=1326 audit(1743482267.996:2821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4313 comm="syz.4.311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f98810cd169 code=0x7ffc0000 [ 52.433179][ T29] audit: type=1326 audit(1743482267.996:2822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4313 comm="syz.4.311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f98810cd169 code=0x7ffc0000 [ 52.701118][ T4317] loop0: detected capacity change from 0 to 128 [ 53.494887][ T4320] ================================================================== [ 53.503016][ T4320] BUG: KCSAN: data-race in __mark_inode_dirty / writeback_single_inode [ 53.511308][ T4320] [ 53.513643][ T4320] write to 0xffff888105335928 of 4 bytes by task 4317 on cpu 1: [ 53.521285][ T4320] writeback_single_inode+0x14f/0x3f0 [ 53.526727][ T4320] sync_inode_metadata+0x60/0x90 [ 53.531690][ T4320] __generic_file_fsync+0xed/0x140 [ 53.536815][ T4320] fat_file_fsync+0x46/0x100 [ 53.541416][ T4320] vfs_fsync_range+0x116/0x130 [ 53.546220][ T4320] generic_file_write_iter+0x1cc/0x310 [ 53.551702][ T4320] iter_file_splice_write+0x5f2/0x980 [ 53.557094][ T4320] direct_splice_actor+0x160/0x2c0 [ 53.562229][ T4320] splice_direct_to_actor+0x305/0x680 [ 53.567626][ T4320] do_splice_direct+0xd9/0x150 [ 53.572407][ T4320] do_sendfile+0x40a/0x690 [ 53.576838][ T4320] __x64_sys_sendfile64+0x113/0x160 [ 53.582150][ T4320] x64_sys_call+0xfc3/0x2e10 [ 53.586757][ T4320] do_syscall_64+0xc9/0x1c0 [ 53.591271][ T4320] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 53.597174][ T4320] [ 53.599501][ T4320] read to 0xffff888105335928 of 4 bytes by task 4320 on cpu 0: [ 53.607061][ T4320] __mark_inode_dirty+0x58/0x7e0 [ 53.612050][ T4320] fat_update_time+0x1e8/0x200 [ 53.616830][ T4320] touch_atime+0x14f/0x350 [ 53.621260][ T4320] filemap_splice_read+0x8cb/0x930 [ 53.626401][ T4320] splice_direct_to_actor+0x26c/0x680 [ 53.631801][ T4320] do_splice_direct+0xd9/0x150 [ 53.636600][ T4320] do_sendfile+0x40a/0x690 [ 53.641050][ T4320] __x64_sys_sendfile64+0x113/0x160 [ 53.646293][ T4320] x64_sys_call+0xfc3/0x2e10 [ 53.650894][ T4320] do_syscall_64+0xc9/0x1c0 [ 53.655409][ T4320] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 53.661313][ T4320] [ 53.663660][ T4320] value changed: 0x00000028 -> 0x00000002 [ 53.669376][ T4320] [ 53.671705][ T4320] Reported by Kernel Concurrency Sanitizer on: [ 53.677969][ T4320] CPU: 0 UID: 0 PID: 4320 Comm: syz.0.312 Not tainted 6.14.0-syzkaller-11144-g1e7857b28020 #0 PREEMPT(voluntary) [ 53.689956][ T4320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 53.700022][ T4320] ==================================================================