last executing test programs: 2.187766347s ago: executing program 3 (id=4): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000020000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff5}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x401, 0x28}, 0x50) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a00000000000000001812", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000001b000000b700000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x406, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="a0", 0x0}, 0x31) 2.122419478s ago: executing program 3 (id=6): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000020000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff5}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x401, 0x28}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x50) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a00000000000000001812", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x406, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="a0", 0x0}, 0x31) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) unshare(0xa000200) semget$private(0x0, 0x4000, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x4, 0x6, 0x1000}], 0x1, 0x0) unshare(0x20060400) write$binfmt_script(r3, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x15) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r5, 0x28, 0x1, &(0x7f0000000080)=0x8b, 0x8) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r5, 0x8982, &(0x7f0000004980)={0x7, 'vlan0\x00', {0x3}, 0x6}) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400d00, 0x0, 0x0, 0x0) 2.080108378s ago: executing program 0 (id=1): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r0}, 0x10) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x3, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r1, &(0x7f00000006c0)=[{{0x0, 0x0, &(0x7f0000000ac0)}}, {{0x0, 0x0, 0x0}}], 0x2, 0x48800) shutdown(r1, 0x2) r3 = socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000040)={0x60002016}) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000b80)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x2004c853) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000340)={'netdevsim0\x00', &(0x7f0000000000)=@ethtool_flash={0x33, 0xea6, '.\x00'}}) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000340)=@filter={'filter\x00', 0xe, 0x2, 0x22e, [0x0, 0x200000000440, 0x200000000874, 0x2000000008a4], 0x0, 0x0, &(0x7f0000000440)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{0x1e, 0x30, 0x88e5, 'nicvf0\x00', 'team_slave_1\x00', 'virt_wifi0\x00', 'caif0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1f}, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @broadcast, [0x0, 0x0, 0x0, 0x0, 0xff], 0x6e, 0x6e, 0x19e, [], [], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x3, 'system_u:object_r:fonts_cache_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x2a6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a0000000200"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) symlink(&(0x7f0000001640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 1.832573359s ago: executing program 4 (id=5): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000020000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff5}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x50) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a00000000000000001812", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x406, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="a0", 0x0}, 0x31) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) unshare(0xa000200) semget$private(0x0, 0x4000, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x4, 0x6, 0x1000}], 0x1, 0x0) unshare(0x20060400) write$binfmt_script(r3, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x15) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r5, 0x28, 0x1, &(0x7f0000000080)=0x8b, 0x8) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r5, 0x8982, &(0x7f0000004980)={0x7, 'vlan0\x00', {0x3}, 0x6}) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400d00, 0x0, 0x0, 0x0) 1.71983616s ago: executing program 1 (id=2): r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='.\x00', 0xa4000061) tkill(0xffffffffffffffff, 0x22) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x50) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) read(r0, &(0x7f0000000140)=""/68, 0x44) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000003bc0)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) write$P9_RVERSION(r3, &(0x7f0000000c40)=ANY=[], 0x13) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={r4, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)=[0x5], 0x0, 0x0, 0x1, 0x1}}, 0x40) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000006, 0x12, r2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) creat(0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) 1.61539913s ago: executing program 2 (id=3): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff5}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x401, 0x28}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x50) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a00000000000000001812", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) unshare(0xa000200) semget$private(0x0, 0x4000, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x4, 0x6, 0x1000}], 0x1, 0x0) unshare(0x20060400) write$binfmt_script(r2, &(0x7f0000000000), 0x208e24b) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x15) r4 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r4, 0x28, 0x1, &(0x7f0000000080)=0x8b, 0x8) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r4, 0x8982, &(0x7f0000004980)={0x7, 'vlan0\x00', {0x3}, 0x6}) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400d00, 0x0, 0x0, 0x0) 1.525491061s ago: executing program 1 (id=7): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x401, 0x28}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x50) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a00000000000000001812", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x406, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="a0", 0x0}, 0x31) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) unshare(0xa000200) semget$private(0x0, 0x4000, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x4, 0x6, 0x1000}], 0x1, 0x0) unshare(0x20060400) write$binfmt_script(r2, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x15) r4 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r4, 0x28, 0x1, &(0x7f0000000080)=0x8b, 0x8) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r4, 0x8982, &(0x7f0000004980)={0x7, 'vlan0\x00', {0x3}, 0x6}) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400d00, 0x0, 0x0, 0x0) 1.455666721s ago: executing program 3 (id=8): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x401, 0x28}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x50) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a00000000000000001812", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x406, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="a0", 0x0}, 0x31) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) unshare(0xa000200) semget$private(0x0, 0x4000, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x4, 0x6, 0x1000}], 0x1, 0x0) unshare(0x20060400) write$binfmt_script(r3, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x15) r5 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r5, 0x28, 0x1, &(0x7f0000000080)=0x8b, 0x8) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r5, 0x8982, &(0x7f0000004980)={0x7, 'vlan0\x00', {0x3}, 0x6}) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400d00, 0x0, 0x0, 0x0) 1.279566093s ago: executing program 0 (id=9): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x0, &(0x7f0000000080)}) inotify_init1(0x0) 1.275605753s ago: executing program 4 (id=10): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) capget(&(0x7f0000000600)={0x20071026}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000180), 0xe649, 0x410000) sendmsg$RDMA_NLDEV_CMD_STAT_GET(0xffffffffffffffff, 0x0, 0x40000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r2 = io_uring_setup(0x4fee, &(0x7f0000000040)={0x0, 0x2cb1, 0x1c080, 0xd, 0x20002f7}) io_uring_enter(r2, 0x2219, 0x7721, 0x5e, 0x0, 0x0) r3 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000200)='.\x00', 0x10000a0) inotify_rm_watch(0xffffffffffffffff, r3) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x20000}}, {{0xa, 0x0, 0x40000, @dev={0xfe, 0x80, '\x00', 0x26}}}}, 0x108) socket(0x2, 0x4, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0xa4c42, 0x108) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0xc, r4, 0x0, 0x0, 0x0, 0x8}) socket$packet(0x11, 0x2, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/13], 0x50) 1.168734833s ago: executing program 0 (id=11): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000"], 0x7c}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) write(0xffffffffffffffff, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x8f5, 0x100000000000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x89f1, &(0x7f0000000340)={'ip6tnl0\x00', &(0x7f0000000000)=@ethtool_cmd={0x0, 0x8, 0x0, 0x9, 0xf, 0x3, 0x3, 0xfc, 0x0, 0x9, 0x0, 0x1, 0x6, 0xfd, 0x0, 0xfffffeff}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000340)={'tunl0\x00', 0x0}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, r0, 0x28f43000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000100), 0x2, 0x50e, &(0x7f0000001c40)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105042, 0x0) writev(r5, &(0x7f0000000140)=[{&(0x7f0000001200)="10", 0x69000}], 0x1) unshare(0x50030700) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f0000000440)=ANY=[@ANYBLOB="09000000000000000dcf400c0179f21b73a4fd864ffe15d4aa299fc033cae531e681299e82cc3cfc41a3a4ad0de016b1904bdf8ef9323cabaa1b158ad73170b0de6060f4ef4bc74c3e2bafabc0c939dafdb8f0ad687f838d84ae5dc0045268a5378b5984e7d67251641967ab77f33acab4cec76a3caeb6b58f79fe71b56c630aadd461daa6e1cb4076b0552e9805b3bfc90c95ebede123f18682"]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='bcache_invalidate\x00', r4}, 0x18) 1.168246263s ago: executing program 2 (id=12): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@newtclass={0x24, 0x28, 0x4, 0x70bd26, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x9, 0x4}, {0x7, 0xb}, {0xb, 0xf}}}, 0x24}}, 0x80000) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x18) unshare(0x8040480) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095", @ANYRES64=r0, @ANYRES16], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, 0x0, 0x0}}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000001c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00fb4c010c580cffa1554c970b41d5dc1c32573be244bd916411ff95dde500822ace6faa0e94ae27c388297ed0f1f1ad2f10977e0fe623c4769801a00aefa4fd9eed10e75b7c82ee63e5cdde927184a9d7d83166d0c65c14617fe38710e51a7da6984cbf39ef210d7bb0b7e3cd928480fc25aec1775d8d2d9ee68f00"/135], 0x4c, 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) connect$unix(0xffffffffffffffff, 0x0, 0x0) mq_unlink(0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000780)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) time(0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(r3, 0x400455c8, 0x0) syz_usb_connect(0x2, 0xfffffffffffffe86, 0x0, 0x0) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) 985.975394ms ago: executing program 3 (id=13): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) dup(r0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@generic={0x3, 0x2, 0x8, 0x2, 0x5a866d71}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0xcbe, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone(0x6a000000, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000ac0)=""/111, &(0x7f0000000b40)=0x6f) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000200)={0xa, 0x4e22, 0x6, @ipv4={'\x00', '\xff\xff', @empty}, 0x3}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1400000000000000290000000b00000000000007000000002400000000000000290000003200000000000000000000000000ffff", @ANYRESHEX=0x0], 0x40}, 0x6048090) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r8) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r9, 0x30a9f29ecc337b1d, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r9, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_PAUSE_AUTONEG={0x5}]}, 0x1c}}, 0x40) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000240)=@isdn={0x22, 0x6, 0x0, 0xb, 0x8}, 0x80, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000440)="70da95b7794884d59206cc25f14666e8e0f25260f70792236cc02008707386366eac85dcfe34bfd9feb73b292ccc6521a37542a7a6f1be023ce47efc5881ef7ec43734749a57f8f222dc2f9cc6313c468ec9b0dca201306fa185ee28aff2edd90dbb62a9bbca2e79d1c4fa740d52bfe28bcde3c4b812807a7f390529589593f48756806314653b1281fb19e52efc82bd91304ec954694a572420bd2ecd9ea86f43d528b03841b2e2804b4f428e5914", 0xaf}, {&(0x7f0000000500)="df7a4d5ac1bb0014bf13474373210a07b37c64f4078271fb2a20bc0b2398fced6004be79f18f7a2c8e9780b97427639da5c9f1494fbe1f56c5719463869f0b98b18bd873e6e0cfffee895d4357e0b534f021b59a4d6503abf5b2c9947e275403ce1587606cf48228d659ea30c1b41bf90260c3b68ba71f601e65a88d39", 0x7d}, {&(0x7f0000000600)="1c80321bb21e71be7f7e88383bbb22fc17f068247170e94ef378e382f416fbd5e641393f4ed3a236f060ea279f11a3b4ecc8638fc3e162188c257c0e917359f67972fb0d3d6d43a1b2ee8ea0310668661319f3ebe7e898e7c3ea8b38e2ce3eed258ac87b53494194a4", 0x69}], 0x4, &(0x7f0000000680)=[{0x60, 0x103, 0x7, "53abeaf84353aec24f6b510d6b7e3e2df1f193582a5c20a356338e43ff3845dfd16963b0c7bf369f844f36b8a07c2e3909df8c8d11f7df693591eecdcca12bdb7289597c54f64093f218af2c"}], 0x60}, 0x44081) 939.991434ms ago: executing program 1 (id=14): r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) r4 = socket$xdp(0x2c, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x400000000000004) setsockopt$XDP_RX_RING(r4, 0x11b, 0x2, &(0x7f00000004c0)=0x1000000, 0x4) writev(r5, &(0x7f0000000000)=[{&(0x7f0000000380)="480000001400190d7ebdeb75fd0d8c562c84d8c033ed7a80ffe0090f000000000000a2bc5603ca00000f7f89000000200000004a2471083ec6991778581acb6c0101ff0000000309", 0x48}], 0x1) sendmsg$NFT_MSG_GETFLOWTABLE(0xffffffffffffffff, 0x0, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x3, 0x0, 0x6, 0x1e90000000000000}, &(0x7f0000000580)=0x18) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r8, 0x84, 0x13, &(0x7f00000005c0)={r9, 0x7}, &(0x7f0000000600)=0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r6}, 0x0, &(0x7f0000001c40)=r7}, 0x20) unshare(0x64000600) r10 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg(r10, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r10, 0xf504, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xd, 0xb, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x1}, [@printk={@d, {}, {}, {0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffff6}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2084}, {0x85, 0x0, 0x0, 0x72}}]}, &(0x7f0000000300)='GPL\x00', 0x6, 0x5, &(0x7f0000000340)=""/5}, 0x94) open(0x0, 0x0, 0x2) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000007c0)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf2509000200737b7a32000000000800410073697700140033006c6f0000000000000000000000000000dbb422c6f070cc81453ba110e019957e3c941e62cc44e4154194e90eeb78e3085c83c053640e139557f77e76a6610ace1f5b4850039c107febf5d5d01c09cdd688e26e5d7927552c53846eed61"], 0x38}, 0x1, 0x0, 0x0, 0x404c090}, 0x810) 324.076158ms ago: executing program 1 (id=15): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYRES32=r0, @ANYRESDEC=r0], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000740)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0486dd6000000000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="1b8e20bfeb79a5a28c12337209e0777d94b3ffc216e0e2e92f7f304d263eda2b0a3a746b984a8de26b294b2168c78eabd01fd2e4dec62c2b5648fb295bc83bc0663701f87824591fcc0ee888c6b05600ee413c67"], 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11c167, 0x0, 0xfffffffa, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x2000000000000242, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x4a0, 0x1e8, 0xffffffff, 0xffffffff, 0x1e8, 0xffffffff, 0x3d0, 0xffffffff, 0xffffffff, 0x3d0, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@remote, @loopback, [0xff, 0xff, 0xff, 0xff], [0xff000000, 0xff, 0xff], 'team_slave_0\x00', 'netdevsim0\x00', {}, {0xff}, 0x29, 0x3, 0x0, 0x60}, 0x0, 0x1a0, 0x1e8, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x9, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x4, 0x7a3, 0x6, 'snmp_trap\x00', {0x369bc443}}}}, {{@ipv6={@remote, @local, [0xffffff00, 0xffffffff, 0x0, 0xffffff00], [0xffffffff, 0xffffff00, 0xffffffff, 0xff000000], 'netpci0\x00', 'bridge_slave_1\x00', {}, {0xff}, 0x2b, 0x2, 0x5, 0x5}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x29, 0x1, 0x1, 'syz0\x00'}}, @inet=@rpfilter={{0x28}, {0x1c}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x500) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) semget$private(0x0, 0x4000, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) dup2(r6, r6) 184.048319ms ago: executing program 1 (id=16): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000007000000890704ac14140f0011000000000000000000000001000000fc000000000000001400000000000000010000000c"], 0x68}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32, @ANYBLOB="0000000000000000b703000000040000850000001b000000b700000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)) syncfs(0xffffffffffffffff) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r1}, &(0x7f00000004c0), &(0x7f0000000500)='%-010d \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r4, &(0x7f0000004200)='t', 0x1) sendfile(r4, r3, 0x0, 0x3ffff) sendfile(r4, r3, 0x0, 0x7ffff000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x5, 0x1, 0x9, 0x2, 0x0, 0x1, 0x1}, 0x50) sendmsg$NL80211_CMD_NEW_MPATH(r3, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x40) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'veth0_to_bond\x00', 0x400}) close(r0) 171.117439ms ago: executing program 0 (id=17): r0 = bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0], &(0x7f00000000c0)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='kfree\x00', r1, 0x0, 0x20000000002}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x26c1, 0x40) r2 = socket(0x8, 0xa, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffff9, {0x0, 0x0, 0x0, r4, {0x0, 0x1}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x18) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x800) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc094, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x101, 0x10000, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file2\x00', 0x42, 0x113) quotactl$Q_SETQUOTA(0xffffffff80000800, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) openat$tun(0xffffffffffffff9c, 0x0, 0x2241, 0x0) r6 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) write$P9_RREADLINK(r6, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0xfffffdab) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8) r7 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x80, 0x0) r8 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f00000000c0)={0x6, @dev={0xac, 0x14, 0x14, 0x35}, 0x4e21, 0x2, 'lblcr\x00', 0x30, 0xc22, 0x43}, 0x2c) ioctl$IMADDTIMER(r7, 0x80044940, &(0x7f0000000080)=0x14) 0s ago: executing program 0 (id=18): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r2 = syz_open_dev$loop(&(0x7f0000001440), 0x2, 0x80803) ioctl$BLKRESETZONE(r2, 0x40101283, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x42280, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r5 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x2, @empty}, {0xa, 0x4e20, 0x101, @mcast2, 0x7}, 0xffffffffffffffff, 0x6}}, 0x48) write$RDMA_USER_CM_CMD_GET_EVENT(r5, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f00000025c0)}}, 0x10) sendmsg$NFT_BATCH(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x10) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a98000000060a0b040000000000000000020000006c000480680001800a000100696e6e65720000005800028008000240000000840800034000000007080004400000000f0800014000000000340005800c0001007061796c6f61640024000280080004400000002708200340000000b9080002400000000208000140000000080900010073797a30000000000900020073797a32"], 0xc0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_clone(0x4030100, 0x0, 0xfffffffffffffeda, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x7fc, 0x4) sendmmsg$inet6(r0, &(0x7f0000000ac0)=[{{&(0x7f0000000440)={0xa, 0x4e20, 0x2, @empty, 0x6}, 0x1c, 0x0}}], 0x1, 0x20080099) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.88' (ED25519) to the list of known hosts. [ 27.802733][ T29] audit: type=1400 audit(1761847054.104:62): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.825755][ T29] audit: type=1400 audit(1761847054.124:63): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.826815][ T3299] cgroup: Unknown subsys name 'net' [ 27.853507][ T29] audit: type=1400 audit(1761847054.154:64): avc: denied { unmount } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.987873][ T3299] cgroup: Unknown subsys name 'cpuset' [ 27.994185][ T3299] cgroup: Unknown subsys name 'rlimit' [ 28.105116][ T29] audit: type=1400 audit(1761847054.404:65): avc: denied { setattr } for pid=3299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.130515][ T29] audit: type=1400 audit(1761847054.404:66): avc: denied { create } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.151034][ T29] audit: type=1400 audit(1761847054.404:67): avc: denied { write } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.160456][ T3303] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.171403][ T29] audit: type=1400 audit(1761847054.404:68): avc: denied { read } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.200277][ T29] audit: type=1400 audit(1761847054.414:69): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.225111][ T29] audit: type=1400 audit(1761847054.414:70): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 28.248987][ T29] audit: type=1400 audit(1761847054.484:71): avc: denied { relabelto } for pid=3303 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.284236][ T3299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 30.509957][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 30.522137][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 30.561235][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 30.629383][ T3322] chnl_net:caif_netlink_parms(): no params data found [ 30.638339][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 30.677771][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.684866][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.692188][ T3314] bridge_slave_0: entered allmulticast mode [ 30.698730][ T3314] bridge_slave_0: entered promiscuous mode [ 30.719871][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.727277][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.734415][ T3310] bridge_slave_0: entered allmulticast mode [ 30.740911][ T3310] bridge_slave_0: entered promiscuous mode [ 30.747361][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.754428][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.761788][ T3314] bridge_slave_1: entered allmulticast mode [ 30.768214][ T3314] bridge_slave_1: entered promiscuous mode [ 30.782509][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.789718][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.796865][ T3311] bridge_slave_0: entered allmulticast mode [ 30.803433][ T3311] bridge_slave_0: entered promiscuous mode [ 30.809957][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.817191][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.824305][ T3310] bridge_slave_1: entered allmulticast mode [ 30.830947][ T3310] bridge_slave_1: entered promiscuous mode [ 30.851160][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.858325][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.865453][ T3311] bridge_slave_1: entered allmulticast mode [ 30.871919][ T3311] bridge_slave_1: entered promiscuous mode [ 30.899113][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.909581][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.919990][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.941729][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.952108][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.982268][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.005389][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.012526][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.019849][ T3322] bridge_slave_0: entered allmulticast mode [ 31.026350][ T3322] bridge_slave_0: entered promiscuous mode [ 31.038565][ T3310] team0: Port device team_slave_0 added [ 31.045192][ T3314] team0: Port device team_slave_0 added [ 31.051105][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.058238][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.065379][ T3321] bridge_slave_0: entered allmulticast mode [ 31.071903][ T3321] bridge_slave_0: entered promiscuous mode [ 31.078577][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.085645][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.092936][ T3322] bridge_slave_1: entered allmulticast mode [ 31.099377][ T3322] bridge_slave_1: entered promiscuous mode [ 31.111067][ T3310] team0: Port device team_slave_1 added [ 31.117549][ T3314] team0: Port device team_slave_1 added [ 31.128724][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.135957][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.143176][ T3321] bridge_slave_1: entered allmulticast mode [ 31.149725][ T3321] bridge_slave_1: entered promiscuous mode [ 31.161257][ T3311] team0: Port device team_slave_0 added [ 31.191124][ T3311] team0: Port device team_slave_1 added [ 31.198100][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.208553][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.218554][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.232621][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.239605][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.265576][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.282352][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.296695][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.303693][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.329683][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.340740][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.347796][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.373894][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.399793][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.406759][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.432727][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.454779][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.461803][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.487788][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.502931][ T3321] team0: Port device team_slave_0 added [ 31.510099][ T3321] team0: Port device team_slave_1 added [ 31.527267][ T3322] team0: Port device team_slave_0 added [ 31.533285][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.540340][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.566327][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.577391][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.584422][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.610436][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.632374][ T3322] team0: Port device team_slave_1 added [ 31.643953][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.651114][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.677080][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.707668][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.714653][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.740709][ T3322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.753360][ T3310] hsr_slave_0: entered promiscuous mode [ 31.759514][ T3310] hsr_slave_1: entered promiscuous mode [ 31.767820][ T3314] hsr_slave_0: entered promiscuous mode [ 31.773671][ T3314] hsr_slave_1: entered promiscuous mode [ 31.779681][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 31.785405][ T3314] Cannot create hsr debugfs directory [ 31.804760][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.811812][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.837802][ T3322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.875092][ T3311] hsr_slave_0: entered promiscuous mode [ 31.881369][ T3311] hsr_slave_1: entered promiscuous mode [ 31.887092][ T3311] debugfs: 'hsr0' already exists in 'hsr' [ 31.892890][ T3311] Cannot create hsr debugfs directory [ 31.905878][ T3321] hsr_slave_0: entered promiscuous mode [ 31.912258][ T3321] hsr_slave_1: entered promiscuous mode [ 31.918105][ T3321] debugfs: 'hsr0' already exists in 'hsr' [ 31.923839][ T3321] Cannot create hsr debugfs directory [ 31.967208][ T3322] hsr_slave_0: entered promiscuous mode [ 31.973259][ T3322] hsr_slave_1: entered promiscuous mode [ 31.979190][ T3322] debugfs: 'hsr0' already exists in 'hsr' [ 31.984916][ T3322] Cannot create hsr debugfs directory [ 32.156772][ T3310] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 32.167226][ T3310] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 32.176207][ T3310] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 32.187087][ T3310] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 32.208168][ T3314] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 32.220640][ T3314] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 32.229891][ T3314] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 32.239183][ T3314] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 32.276288][ T3321] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 32.285228][ T3321] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 32.297699][ T3321] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 32.314460][ T3311] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 32.326520][ T3311] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 32.336559][ T3311] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 32.345368][ T3321] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 32.361922][ T3311] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 32.392063][ T3322] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 32.401444][ T3322] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 32.410667][ T3322] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 32.419355][ T3322] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 32.443565][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.478300][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.489038][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.502045][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.509281][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.530773][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.538767][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.545831][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.580555][ T1805] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.587739][ T1805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.596463][ T1805] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.603712][ T1805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.617373][ T3310] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 32.627893][ T3310] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.648608][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.664361][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.687034][ T3314] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 32.697655][ T3314] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.726568][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.744393][ T1805] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.751574][ T1805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.761971][ T1805] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.769101][ T1805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.782769][ T3322] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.796778][ T140] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.803898][ T140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.815531][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.833035][ T3332] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.840282][ T3332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.854890][ T3321] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.879817][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.895938][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.912896][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.928220][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.935299][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.962329][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.969540][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.985323][ T3322] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.020948][ T3311] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 33.031447][ T3311] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.045745][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.120408][ T3310] veth0_vlan: entered promiscuous mode [ 33.146587][ T3310] veth1_vlan: entered promiscuous mode [ 33.169746][ T3314] veth0_vlan: entered promiscuous mode [ 33.180702][ T3322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.191834][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.213009][ T3314] veth1_vlan: entered promiscuous mode [ 33.224699][ T3310] veth0_macvtap: entered promiscuous mode [ 33.238510][ T3310] veth1_macvtap: entered promiscuous mode [ 33.261554][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.285673][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.308243][ T3314] veth0_macvtap: entered promiscuous mode [ 33.315750][ T3314] veth1_macvtap: entered promiscuous mode [ 33.342257][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.358765][ T37] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.371212][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.382347][ T37] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.391172][ T37] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.412638][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 33.412653][ T29] audit: type=1400 audit(1761847059.714:81): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/root/syzkaller.MgNcQV/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 33.443641][ T29] audit: type=1400 audit(1761847059.714:82): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 33.465723][ T29] audit: type=1400 audit(1761847059.714:83): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/root/syzkaller.MgNcQV/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 33.490941][ T29] audit: type=1400 audit(1761847059.714:84): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 33.512774][ T29] audit: type=1400 audit(1761847059.714:85): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/root/syzkaller.MgNcQV/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 33.539507][ T29] audit: type=1400 audit(1761847059.714:86): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/root/syzkaller.MgNcQV/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4066 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 33.566850][ T29] audit: type=1400 audit(1761847059.724:87): avc: denied { unmount } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 33.591906][ T3310] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 33.592691][ T3311] veth0_vlan: entered promiscuous mode [ 33.612971][ T29] audit: type=1400 audit(1761847059.744:88): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 33.617947][ T37] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.635860][ T29] audit: type=1400 audit(1761847059.744:89): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="gadgetfs" ino=4077 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 33.653993][ T3321] veth0_vlan: entered promiscuous mode [ 33.682443][ T3322] veth0_vlan: entered promiscuous mode [ 33.690940][ T3311] veth1_vlan: entered promiscuous mode [ 33.696496][ T29] audit: type=1400 audit(1761847059.994:90): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 33.720788][ T37] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.737927][ T3321] veth1_vlan: entered promiscuous mode [ 33.750883][ T3322] veth1_vlan: entered promiscuous mode [ 33.761692][ T37] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.779650][ T37] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.811339][ T37] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.826045][ T3321] veth0_macvtap: entered promiscuous mode [ 33.843475][ T3321] veth1_macvtap: entered promiscuous mode [ 33.851340][ T3311] veth0_macvtap: entered promiscuous mode [ 33.863964][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.875624][ T3311] veth1_macvtap: entered promiscuous mode [ 33.886228][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.899635][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.913302][ T37] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.924856][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.933151][ T3486] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 33.941429][ T3486] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 33.953119][ T37] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.971713][ T3322] veth0_macvtap: entered promiscuous mode [ 33.989402][ T3322] veth1_macvtap: entered promiscuous mode [ 33.997505][ T37] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.006529][ T37] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.041245][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.056236][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.082414][ T37] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.128910][ T37] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.140658][ T37] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.176434][ T3484] mmap: syz.3.6 (3484) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 34.187762][ T37] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.230794][ T37] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.241349][ T37] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.256235][ T37] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.297804][ T37] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.716106][ T3512] capability: warning: `syz.4.10' uses deprecated v2 capabilities in a way that may be insecure [ 35.146954][ T3513] loop0: detected capacity change from 0 to 512 [ 35.209934][ T3513] EXT4-fs error (device loop0): ext4_orphan_get:1418: comm syz.0.11: bad orphan inode 11862016 [ 35.282764][ T3513] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 35.332967][ T3525] lo speed is unknown, defaulting to 1000 [ 35.338835][ T3525] lo speed is unknown, defaulting to 1000 [ 35.342477][ T3513] ext4 filesystem being mounted at /2/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 35.344998][ T3525] lo speed is unknown, defaulting to 1000 [ 35.361768][ T3525] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 35.369389][ T3525] infiniband s{z2: RDMA CMA: cma_listen_on_dev, error -98 [ 35.382949][ T3525] lo speed is unknown, defaulting to 1000 [ 35.389298][ T3525] lo speed is unknown, defaulting to 1000 [ 35.395434][ T3525] lo speed is unknown, defaulting to 1000 [ 35.403912][ T3525] lo speed is unknown, defaulting to 1000 [ 35.410342][ T3525] lo speed is unknown, defaulting to 1000 [ 35.416502][ T3525] lo speed is unknown, defaulting to 1000 [ 35.505374][ T3534] IPVS: length: 111 != 24 [ 35.590971][ T3537] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 35.713205][ T3314] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 35.743289][ T3533] lo speed is unknown, defaulting to 1000 [ 35.775836][ T3539] loop1: detected capacity change from 0 to 1024 [ 35.800812][ T3539] EXT4-fs: Ignoring removed orlov option [ 35.818512][ T3541] IPVS: Scheduler module ip_vs_ not found [ 35.827829][ T3539] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.919908][ T3547] netlink: 24 bytes leftover after parsing attributes in process `syz.0.18'. [ 36.140279][ T3548] ================================================================== [ 36.148419][ T3548] BUG: KCSAN: data-race in filemap_read / filemap_read [ 36.155344][ T3548] [ 36.157698][ T3548] read to 0xffff888108b4b5e8 of 8 bytes by task 3539 on cpu 0: [ 36.165261][ T3548] filemap_read+0x6f/0xa00 [ 36.169732][ T3548] generic_file_read_iter+0x79/0x330 [ 36.175048][ T3548] ext4_file_read_iter+0x1cc/0x290 [ 36.180187][ T3548] copy_splice_read+0x442/0x660 [ 36.185046][ T3548] splice_direct_to_actor+0x290/0x680 [ 36.190442][ T3548] do_splice_direct+0xda/0x150 [ 36.195235][ T3548] do_sendfile+0x380/0x650 [ 36.199674][ T3548] __x64_sys_sendfile64+0x105/0x150 [ 36.204893][ T3548] x64_sys_call+0x2bb4/0x3000 [ 36.209583][ T3548] do_syscall_64+0xd2/0x200 [ 36.214096][ T3548] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.220001][ T3548] [ 36.222332][ T3548] write to 0xffff888108b4b5e8 of 8 bytes by task 3548 on cpu 1: [ 36.229960][ T3548] filemap_read+0x974/0xa00 [ 36.234493][ T3548] generic_file_read_iter+0x79/0x330 [ 36.239803][ T3548] ext4_file_read_iter+0x1cc/0x290 [ 36.245190][ T3548] copy_splice_read+0x442/0x660 [ 36.250053][ T3548] splice_direct_to_actor+0x290/0x680 [ 36.255441][ T3548] do_splice_direct+0xda/0x150 [ 36.260212][ T3548] do_sendfile+0x380/0x650 [ 36.264646][ T3548] __x64_sys_sendfile64+0x105/0x150 [ 36.269864][ T3548] x64_sys_call+0x2bb4/0x3000 [ 36.274548][ T3548] do_syscall_64+0xd2/0x200 [ 36.279057][ T3548] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.284961][ T3548] [ 36.287295][ T3548] value changed: 0x00000000000002b6 -> 0x00000000000002b7 [ 36.294401][ T3548] [ 36.296728][ T3548] Reported by Kernel Concurrency Sanitizer on: [ 36.302890][ T3548] CPU: 1 UID: 0 PID: 3548 Comm: syz.1.16 Not tainted syzkaller #0 PREEMPT(voluntary) [ 36.312449][ T3548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 36.322511][ T3548] ================================================================== [ 36.386267][ T3509] syz.4.10 (3509) used greatest stack depth: 7240 bytes left [ 36.486704][ T3311] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.837384][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110