last executing test programs: 584.926348ms ago: executing program 2 (id=3): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000002000000000000000100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000100000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b700000000000000"], &(0x7f0000000080)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, r3, 0x301, 0x70bd29, 0x25dfdbff, {0x24}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 511.969955ms ago: executing program 2 (id=6): r0 = memfd_secret(0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000380)='sched_switch\x00'}, 0x18) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280)={r1, r0, 0x2e, 0x4608, @void}, 0x10) close_range(r1, 0xffffffffffffffff, 0x0) 498.073536ms ago: executing program 2 (id=7): capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)={0x7ff, 0x6, 0x4, 0x87, 0xffffffff, 0x2}) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'tunl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xfff3}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0x8, 0x6, 0xc934, 0x0, 0x10001, 0x40003, 0x0, 0x42b, 0x8001}}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x4004010) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x12, 0x0, &(0x7f0000000640)="b44c806748f06309624431ed337301000000", 0x0, 0x407, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0x50) memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\xdenJ\xeb\x87\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38\x14\xcb\xfa\xb3j\x92\f\xe0\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf0\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f0000000100)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @rand_addr=0x4}, 0x3}}, 0x24) r3 = syz_io_uring_setup(0x497, &(0x7f0000000400)={0x0, 0x717e, 0x100, 0x14, 0x150}, &(0x7f0000000140)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}) io_uring_enter(r3, 0x3516, 0x0, 0x0, 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, 0x0, 0x0) r6 = syz_open_dev$sg(&(0x7f0000000140), 0x6f5e, 0x0) ioctl$FIBMAP(r6, 0x1, &(0x7f0000000040)=0x85) 448.5ms ago: executing program 0 (id=1): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) syz_mount_image$ext4(&(0x7f0000000840)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x214c1e, &(0x7f0000000440)={[{@quota}, {@nogrpid}, {@nolazytime}]}, 0xff, 0x523, &(0x7f0000000c00)="$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") mmap$xdp(&(0x7f0000c90000/0x4000)=nil, 0x4000, 0x4, 0xe83dd08838fb7637, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0b00000005000000020000000400000005", @ANYBLOB], 0x50) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000040)={0xa, &(0x7f0000000380)=[{0x7, 0x0, 0x4, 0x2}, {0x2, 0x8, 0xf, 0xf3}, {0x8, 0x7f, 0x9, 0xf}, {0x756, 0x0, 0x7, 0x4}, {0xe, 0xf8, 0x80, 0x9}, {0x8, 0x1, 0x3, 0xb28}, {0x4, 0x5, 0x4, 0x400}, {0xff7f, 0x4, 0x2b, 0xc}, {0x4, 0x79, 0x8, 0x9}, {0x7, 0x86, 0x0, 0x5}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xf, 0x59032, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b000000000000000000000000800000000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x21, &(0x7f0000001140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x80000000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_fd={0x18, 0x5, 0x1, 0x0, r5}, @map_fd={0x18, 0x1, 0x1, 0x0, r5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @call={0x85, 0x0, 0x0, 0x96}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r7}, &(0x7f0000000000), &(0x7f00000005c0)=r8}, 0x20) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) r10 = dup(r9) dup(r10) ioctl$VT_RELDISP(r10, 0x5605) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x22, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x40}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @jmp={0x5, 0x0, 0x0, 0x1, 0xb, 0x4, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @ldst={0x2, 0x3, 0x0, 0xb, 0x0, 0xfffffffffffffffe, 0x4}, @map_fd={0x18, 0xf, 0x1, 0x0, r5}, @map_val={0x18, 0x1, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000280)='GPL\x00', 0xd97, 0xe, &(0x7f0000000400)=""/14, 0x41000, 0x40, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f00000004c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0x9, 0x1, 0xfffffffd}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r0, r7, 0x1, r10, r0, r1, r0], 0x0, 0x10, 0x8}, 0x94) r11 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1c0000005200010000000000040000000200000008000100feffffff"], 0x1c}}, 0x0) utimes(&(0x7f0000000200)='./file1\x00', 0x0) 305.158423ms ago: executing program 1 (id=2): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000011c0)={&(0x7f0000001180)='kfree\x00', r0, 0x0, 0x4}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000900), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1000, 0x0, 0x106, 0x4}}, 0x20) 211.911121ms ago: executing program 2 (id=8): io_uring_setup(0x4194, &(0x7f00000002c0)={0x0, 0xeafe, 0x8000, 0xffffff}) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x1) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000000000000001000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000007000000df25240083b57511638d320ceb7889fc6ac37f9a00001800000014000200"], 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x4008000) close_range(r1, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x200000000000007c, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYRESOCT=r6], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000212c1400001e0a05010000000000000000070000000900020073797a31000000000900010073797a300000000000140380300000802c000180250001"], 0x14b0}}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0000cd", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[], 0x714}, 0x1, 0x0, 0x0, 0x1}, 0x4000) sendmsg$NL80211_CMD_SET_PMKSA(r4, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000780)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000fedbdf253400000008000300", @ANYRES32=0x0, @ANYBLOB="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"], 0x50}, 0x1, 0x0, 0x0, 0x20000080}, 0x40801) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r9}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r5}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r9, &(0x7f0000000040)}, 0x20) r10 = socket$inet(0x2, 0x4, 0x0) r11 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMP(r11, 0x1, 0x40, &(0x7f0000000000)=0xff, 0x4) bind$inet(r10, &(0x7f0000001c00)={0x2, 0x4e23, @multicast2}, 0x10) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x922, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb05001800000000000000180000001800000002000008000000005c640009000000000000000e5f2e0000002fb6d9166c354084d707cc0704922327d298b9ff62174e3fe2ac1d5d42584d32c760b0fb57f72cc705d34deb"], 0x0, 0x39, 0x0, 0x9, 0x1000}, 0x28) setsockopt$SO_TIMESTAMPING(r10, 0x1, 0x25, &(0x7f0000000040)=0x2263, 0x41) 211.269301ms ago: executing program 4 (id=5): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x20000000ec071, 0xffffffffffffffff, 0x0) socket(0x28, 0x5, 0x0) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x10, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xc}, 0x119310, 0x1, 0x1, 0x4, 0x8, 0x20005, 0x1b, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) setrlimit(0x40000000000008, &(0x7f0000000000)) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="6220d505ca90aeae39a7d14fc22a8c6e2a3a2a20727700eecf7a910cf14d3b5395c0a3d6a5904c2a5600004fffafac75ae09e80c9e6728d8b36e8c7ca30a7a565acf68e7fc28c6af8e5038be1e3ea1d1fb1b79fa2be3ce6d5033fdc1c5e7e758157cfccde44c7cf2365bf2db26a9510382"], 0x9) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2, 0x8}}, 0x20) renameat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) 197.981953ms ago: executing program 3 (id=4): r0 = syz_open_dev$sg(&(0x7f0000001600), 0x0, 0x22c01) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x80de, &(0x7f00000006c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@nombcache}, {@noload}]}, 0x3, 0x440, &(0x7f0000000280)="$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") r1 = open(&(0x7f00000004c0)='./bus\x00', 0x143042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./bus\x00', 0x40080, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)={0x10}) ftruncate(r1, 0x2008002) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xe, 0x4, 0x8, 0xa, 0x0, 0xffffffffffffffff, 0x1}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000780)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYRESOCT], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) sendmsg$nl_generic(r3, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000000300)=ANY=[@ANYBLOB="500000003f0001002cbd7000ffdbdf25010000003a0004002c"], 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x8000) setreuid(0x0, 0xee00) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000140), 0x2, 0x2) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="cc540011881a668300111200e68f8858acd630d5f1c170b60800000000", 0x1d}], 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x240540c7, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r6, &(0x7f0000000000)="04", 0x1, 0x44001, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYRES64=r0]) 184.588064ms ago: executing program 1 (id=9): mkdir(&(0x7f0000000400)='./file0\x00', 0x0) (async) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r2, @ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) (async, rerun: 32) getpriority(0x0, 0x0) (rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x3e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r4}, 0x10) (async) r5 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[], [], 0x6b}}) 60.784314ms ago: executing program 4 (id=10): r0 = io_uring_setup(0x4194, &(0x7f00000002c0)={0x0, 0x0, 0x100, 0x1000001}) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r1, 0x1) accept4$x25(r1, 0x0, 0x0, 0x80800) close_range(r0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000212c1400001e0a05010000000000000000070000000900020073797a31000000000900010073797a300000000000140380300000802c000180250001"], 0x14b0}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0000cd", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[], 0x714}, 0x1, 0x0, 0x0, 0x1}, 0x4000) sendmsg$NL80211_CMD_SET_PMKSA(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)={0x50, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x10}}}}, [@NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x41}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_PMK={0x14, 0xfe, "69cbffd75c7880cacd94970ea2871640"}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000080}, 0x40801) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r7}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r3}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r7, &(0x7f0000000040)}, 0x20) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) r9 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMP(r9, 0x1, 0x40, &(0x7f0000000000)=0xff, 0x4) bind$inet(r8, &(0x7f0000001c00)={0x2, 0x4e23, @multicast2}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0xa82, 0x0) write$cgroup_int(r11, &(0x7f0000000000)=0x922, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="9feb05001800000000000000180000001800000002000000000000005c640009000000000000000e5f2e0000002fb6d9166c354084d707ccb304922327d298b9ff62174e3fe2ac1d5dc2584d32c760b0fb57f72cc705d345eb"], 0x0, 0x39, 0x0, 0x9, 0x1000}, 0x28) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000000040)=0x2263, 0x41) connect$inet(r8, &(0x7f0000001bc0)={0x2, 0x4e23, @empty}, 0x10) sendto(r8, &(0x7f0000000740)='P', 0x1, 0x48044, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r8, 0x4000}], 0x1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) 56.385615ms ago: executing program 0 (id=11): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x8, 0x6}, 0x10, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0xfffffffc, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f0000000bc0)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@nombcache}, {@errors_remount}]}, 0x11, 0x553, &(0x7f0000001080)="$eJzs3d9rW1UcAPDvTdv91nUwhopIYQ9O5tK19ccEH+aj6HCg7zO0d2U0WUaTjrUO3B7ciy8yBBEH4ru++zj8B/wrBjoYMoo++BK56U2XrUmbddnSmc8Hbjkn9ybnfnPv9/TcnBsSwNCayP4UIl6OiG+SiIMRkeTrRiNfObG23er9q7PZkkSj8elfSXO7rN56rdbz9ueVlyLit68ijhc2tltbXlkolcvpYl6frFcuTdaWV05cqJTm0/n04vTMzKm3Z6bfe/edvsX6xtl/vv/k9oenvj66+t0vdw/dTOJ0HMjXtcfxBK61VyZiIn9PxuL0IxtO9aGxnSQZ9A6wLSN5no9F1gccjJE864H/vy8jogEMqUT+w5BqjQNa1/Z9ug5+btz7YO0CaGP8o2ufjcSe5rXRvtXkoSuj7Hp3vA/tZ238+uetm9kS/fscAmBL165HxMnR0Y39X5L3f9t3sodtHm1D/wfPzu1s/PNmp/FPYX38Ex3GP/s75O52bJ3/hbt9aKarbPz3fsfx7/qk1fhIXnuhOeYbS85fKKdZ3/ZiRByLsd1ZfbP5nFOrdxrd1rWP/7Ila781Fsz34+7o7oefM1eql54k5nb3rke80nH8m6wf/6TD8c/ej7M9tnEkvfVat3Vbx/90NX6KeL3j8X8wo5VsPj852TwfJltnxUZ/3zjye7f2Bx1/dvz3bR7/eNI+X1t7/DZ+3PNv2m3dQ/FH7+f/ruSzZnlX/tiVUr2+OBWxK/l44+PTD57bqre2z+I/dnTz/q/T+b83Ij7vMf4bh39+taf4B3T85x7r+D9+4c5HX/zQrf3e+r+3mqVj+SO99H+97uCTvHcAAAAAAACw0xQi4kAkheJ6uVAoFtfu7zgc+wrlaq1+/Hx16eJcNL8rOx5jhdZM98G2+yGm8vthW/XpR+ozEXEoIr4d2dusF2er5blBBw8AAAAAAAAAAAAAAAAAAAA7xP4u3//P/DEy6L0Dnjo/+Q3Da8v878cvPQE7kv//MLzkPwwv+Q/DS/7D8JL/MLzkPwwv+Q/DS/4DAAAAAAAAAAAAAAAAAAAAAAAAAABAX509cyZbGqv3r85m9bnLy0sL1csn5tLaQrGyNFucrS5eKs5Xq/PltDhbrWz1euVq9dLUdCxdmayntfpkbXnlXKW6dLF+7kKlNJ+eS8eeSVQAAAAAAAAAAAAAAAAAAADwfKktryyUyuV0UUFhW4XRnbEbCn0uDLpnAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAH/gsAAP//6AY3sQ==") r2 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x143142, 0x40) pwritev2(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r2, 0xc020662a, &(0x7f0000000380)={0x3fffffffbfb, 0x5, 0x5, 0x7f}) syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010200000000000000020000000900010073797a300000000040000000030a01010000000000000000020000000900010073797a30000000000900030073797a320000000014000480080001400000000008000240000000002c000000030a03000000000000000000020000000900010073797a30000000000900030073797a32"], 0xb4}, 0x1, 0x0, 0x0, 0x400c0d1}, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000009a40)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000040900010073797a30000000002c000000030a01080000000000000000010000000900030073797a32000000000900010073797a300000000050000000060a010400000000000000000100000008000b40000000000900010073797a30000000002800048024000180090001006d6574610000000014000280080001400000001208000240000000", @ANYRES16], 0xc4}}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r5, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 0s ago: executing program 2 (id=12): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x256581, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) unshare(0x64000680) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0xc040, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) msgget$private(0x0, 0x8) socket$nl_route(0x10, 0x3, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000004c0)={{0x0, 0xee00, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x1000000000000b, 0x6f76, 0x3, 0x0, 0x1, 0x8, 0x7b, 0x3}) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) io_setup(0x8, &(0x7f0000000040)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.135' (ED25519) to the list of known hosts. [ 25.773377][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 25.773391][ T29] audit: type=1400 audit(1767492118.541:70): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.802400][ T29] audit: type=1400 audit(1767492118.571:71): avc: denied { mount } for pid=3308 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.803145][ T3308] cgroup: Unknown subsys name 'net' [ 25.830153][ T29] audit: type=1400 audit(1767492118.601:72): avc: denied { unmount } for pid=3308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.969826][ T3308] cgroup: Unknown subsys name 'cpuset' [ 25.976007][ T3308] cgroup: Unknown subsys name 'rlimit' [ 26.165349][ T29] audit: type=1400 audit(1767492118.931:73): avc: denied { setattr } for pid=3308 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.189378][ T29] audit: type=1400 audit(1767492118.931:74): avc: denied { create } for pid=3308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.209909][ T29] audit: type=1400 audit(1767492118.931:75): avc: denied { write } for pid=3308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.230278][ T29] audit: type=1400 audit(1767492118.931:76): avc: denied { read } for pid=3308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.250542][ T29] audit: type=1400 audit(1767492118.941:77): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.257043][ T3310] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.275396][ T29] audit: type=1400 audit(1767492118.941:78): avc: denied { mount } for pid=3308 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.307667][ T29] audit: type=1400 audit(1767492118.981:79): avc: denied { read } for pid=3047 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 26.322342][ T3308] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.233609][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 28.281830][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 28.309754][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.316847][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.324059][ T3321] bridge_slave_0: entered allmulticast mode [ 28.330416][ T3321] bridge_slave_0: entered promiscuous mode [ 28.350576][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.357664][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.364892][ T3321] bridge_slave_1: entered allmulticast mode [ 28.371278][ T3321] bridge_slave_1: entered promiscuous mode [ 28.386353][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 28.412769][ T3322] chnl_net:caif_netlink_parms(): no params data found [ 28.422987][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.434775][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.496561][ T3321] team0: Port device team_slave_0 added [ 28.504587][ T3321] team0: Port device team_slave_1 added [ 28.510341][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.517373][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.524691][ T3317] bridge_slave_0: entered allmulticast mode [ 28.530986][ T3317] bridge_slave_0: entered promiscuous mode [ 28.541485][ T3327] chnl_net:caif_netlink_parms(): no params data found [ 28.554729][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.561808][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.568966][ T3317] bridge_slave_1: entered allmulticast mode [ 28.575393][ T3317] bridge_slave_1: entered promiscuous mode [ 28.609299][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.616245][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.642149][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.669273][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.676335][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.683493][ T3318] bridge_slave_0: entered allmulticast mode [ 28.689904][ T3318] bridge_slave_0: entered promiscuous mode [ 28.696664][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.703634][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.729598][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.741382][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.750669][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.757694][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.764821][ T3322] bridge_slave_0: entered allmulticast mode [ 28.771126][ T3322] bridge_slave_0: entered promiscuous mode [ 28.779914][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.786995][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.794205][ T3318] bridge_slave_1: entered allmulticast mode [ 28.800486][ T3318] bridge_slave_1: entered promiscuous mode [ 28.810319][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.819452][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.826512][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.833682][ T3322] bridge_slave_1: entered allmulticast mode [ 28.840155][ T3322] bridge_slave_1: entered promiscuous mode [ 28.888149][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.902530][ T3317] team0: Port device team_slave_0 added [ 28.909388][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.918521][ T3327] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.925650][ T3327] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.932883][ T3327] bridge_slave_0: entered allmulticast mode [ 28.939118][ T3327] bridge_slave_0: entered promiscuous mode [ 28.946202][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.960350][ T3317] team0: Port device team_slave_1 added [ 28.966844][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.975987][ T3327] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.983138][ T3327] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.990343][ T3327] bridge_slave_1: entered allmulticast mode [ 28.996627][ T3327] bridge_slave_1: entered promiscuous mode [ 29.009415][ T3321] hsr_slave_0: entered promiscuous mode [ 29.015272][ T3321] hsr_slave_1: entered promiscuous mode [ 29.051329][ T3327] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.060998][ T3318] team0: Port device team_slave_0 added [ 29.066816][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.073859][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.100001][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.111430][ T3322] team0: Port device team_slave_0 added [ 29.122854][ T3327] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.132740][ T3318] team0: Port device team_slave_1 added [ 29.138530][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.145478][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.171392][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.182676][ T3322] team0: Port device team_slave_1 added [ 29.213886][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.220847][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.246982][ T3322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.275696][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.282787][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.308690][ T3322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.322028][ T3327] team0: Port device team_slave_0 added [ 29.330639][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.337570][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.363999][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.381995][ T3327] team0: Port device team_slave_1 added [ 29.388471][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.395469][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.421584][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.448521][ T3317] hsr_slave_0: entered promiscuous mode [ 29.454725][ T3317] hsr_slave_1: entered promiscuous mode [ 29.460667][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 29.466370][ T3317] Cannot create hsr debugfs directory [ 29.485730][ T3327] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.492802][ T3327] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.518830][ T3327] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.544499][ T3327] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.551463][ T3327] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.577339][ T3327] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.590087][ T3322] hsr_slave_0: entered promiscuous mode [ 29.595971][ T3322] hsr_slave_1: entered promiscuous mode [ 29.601939][ T3322] debugfs: 'hsr0' already exists in 'hsr' [ 29.607645][ T3322] Cannot create hsr debugfs directory [ 29.630330][ T3318] hsr_slave_0: entered promiscuous mode [ 29.636165][ T3318] hsr_slave_1: entered promiscuous mode [ 29.642058][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 29.647769][ T3318] Cannot create hsr debugfs directory [ 29.703994][ T3327] hsr_slave_0: entered promiscuous mode [ 29.710167][ T3327] hsr_slave_1: entered promiscuous mode [ 29.716041][ T3327] debugfs: 'hsr0' already exists in 'hsr' [ 29.721803][ T3327] Cannot create hsr debugfs directory [ 29.812805][ T3321] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.821736][ T3321] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.839587][ T3321] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.856026][ T3321] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.895058][ T3317] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.904499][ T3317] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.915841][ T3317] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.927818][ T3317] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.949734][ T3318] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.967591][ T3318] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.978112][ T3318] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.986876][ T3318] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 30.014958][ T3322] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 30.023897][ T3322] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 30.040108][ T3322] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 30.048429][ T3322] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 30.078202][ T3327] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 30.090087][ T3327] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 30.100845][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.108748][ T3327] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 30.119151][ T3327] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 30.146464][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.159154][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.169000][ T299] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.176047][ T299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.195687][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.202743][ T299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.213619][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.239114][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.246192][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.263721][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.273650][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.282693][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.289734][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.319578][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.334007][ T3322] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.344123][ T401] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.351186][ T401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.366617][ T3327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.376527][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.383687][ T299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.400662][ T3327] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.411324][ T3317] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.425484][ T299] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.432604][ T299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.441151][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.448172][ T299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.471947][ T299] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.479007][ T299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.494630][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.509919][ T299] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.517021][ T299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.571158][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.674893][ T3321] veth0_vlan: entered promiscuous mode [ 30.686997][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.701085][ T3327] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.715091][ T3321] veth1_vlan: entered promiscuous mode [ 30.734995][ T3317] veth0_vlan: entered promiscuous mode [ 30.746973][ T3322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.768034][ T3317] veth1_vlan: entered promiscuous mode [ 30.784527][ T3321] veth0_macvtap: entered promiscuous mode [ 30.800979][ T3321] veth1_macvtap: entered promiscuous mode [ 30.817068][ T3317] veth0_macvtap: entered promiscuous mode [ 30.833191][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.850121][ T3317] veth1_macvtap: entered promiscuous mode [ 30.857728][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.877348][ T1890] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.888160][ T3318] veth0_vlan: entered promiscuous mode [ 30.893941][ T1890] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.905792][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.922539][ T1890] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.933969][ T1890] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.943970][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.952690][ T3327] veth0_vlan: entered promiscuous mode [ 30.962314][ T3318] veth1_vlan: entered promiscuous mode [ 30.971476][ T2662] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.982180][ T3327] veth1_vlan: entered promiscuous mode [ 30.990734][ T2662] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.008369][ T2662] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.017848][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 31.017889][ T29] audit: type=1400 audit(1767492123.791:90): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/root/syzkaller.L6oGGt/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 31.033385][ T3318] veth0_macvtap: entered promiscuous mode [ 31.055075][ T29] audit: type=1400 audit(1767492123.791:91): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 31.077219][ T29] audit: type=1400 audit(1767492123.791:92): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/root/syzkaller.L6oGGt/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 31.103010][ T29] audit: type=1400 audit(1767492123.821:93): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 31.119502][ T3327] veth0_macvtap: entered promiscuous mode [ 31.124831][ T29] audit: type=1400 audit(1767492123.821:94): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/root/syzkaller.L6oGGt/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 31.132107][ T2662] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.157046][ T29] audit: type=1400 audit(1767492123.821:95): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/root/syzkaller.L6oGGt/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4558 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 31.165801][ T3322] veth0_vlan: entered promiscuous mode [ 31.192901][ T29] audit: type=1400 audit(1767492123.821:96): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 31.205291][ T3327] veth1_macvtap: entered promiscuous mode [ 31.218271][ T29] audit: type=1400 audit(1767492123.871:97): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 31.246313][ T29] audit: type=1400 audit(1767492123.871:98): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="gadgetfs" ino=4565 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 31.248449][ T3318] veth1_macvtap: entered promiscuous mode [ 31.275565][ T3321] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 31.297594][ T29] audit: type=1400 audit(1767492124.061:99): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 31.298447][ T3327] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.337863][ T3322] veth1_vlan: entered promiscuous mode [ 31.349187][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.370936][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.386697][ T3322] veth0_macvtap: entered promiscuous mode [ 31.399678][ T3327] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.408069][ T3493] capability: warning: `syz.2.7' uses deprecated v2 capabilities in a way that may be insecure [ 31.422679][ T401] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.431791][ T3322] veth1_macvtap: entered promiscuous mode [ 31.440902][ T401] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.460463][ T401] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.474813][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.478910][ T3497] loop0: detected capacity change from 0 to 512 [ 31.484736][ T401] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.508869][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.509915][ T3497] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 31.518692][ T3493] program syz.2.7 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 31.536070][ T3497] ext4 filesystem being mounted at /0/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 31.556507][ T401] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.590673][ T401] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.609478][ T401] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.627056][ T401] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.642201][ T401] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.673246][ T401] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.702120][ T401] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.714779][ T3514] loop3: detected capacity change from 0 to 512 [ 31.739548][ T401] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.748643][ T3514] ======================================================= [ 31.748643][ T3514] WARNING: The mand mount option has been deprecated and [ 31.748643][ T3514] and is ignored by this kernel. Remove the mand [ 31.748643][ T3514] option from the mount to silence this warning. [ 31.748643][ T3514] ======================================================= [ 31.797773][ T3514] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 31.810905][ T3514] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 31.823637][ T3317] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.851527][ T3514] EXT4-fs warning (device loop3): ext4_expand_extra_isize_ea:2857: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 31.865497][ T3317] ================================================================== [ 31.873599][ T3317] BUG: KCSAN: data-race in __lru_add_drain_all / folio_add_lru [ 31.881170][ T3317] [ 31.883490][ T3317] read-write to 0xffff888237d26468 of 1 bytes by task 3526 on cpu 1: [ 31.891542][ T3317] folio_add_lru+0xa5/0x1f0 [ 31.896068][ T3317] shmem_get_folio_gfp+0x7a5/0xd50 [ 31.901189][ T3317] shmem_fault+0xf6/0x250 [ 31.905523][ T3317] __do_fault+0xbc/0x200 [ 31.909765][ T3317] handle_mm_fault+0xfab/0x2c60 [ 31.914610][ T3317] __get_user_pages+0x1024/0x1ed0 [ 31.919639][ T3317] __mm_populate+0x243/0x3a0 [ 31.924237][ T3317] vm_mmap_pgoff+0x232/0x2e0 [ 31.928860][ T3317] ksys_mmap_pgoff+0xc2/0x310 [ 31.933554][ T3317] x64_sys_call+0x16bb/0x3000 [ 31.938229][ T3317] do_syscall_64+0xca/0x2b0 [ 31.942735][ T3317] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 31.948613][ T3317] [ 31.950933][ T3317] read to 0xffff888237d26468 of 1 bytes by task 3317 on cpu 0: [ 31.958466][ T3317] __lru_add_drain_all+0x17e/0x450 [ 31.959787][ T3514] EXT4-fs (loop3): 1 truncate cleaned up [ 31.963615][ T3317] lru_add_drain_all+0x10/0x20 [ 31.970992][ T3514] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 31.973968][ T3317] invalidate_bdev+0x47/0x70 [ 31.990490][ T3317] ext4_put_super+0x624/0x7d0 [ 31.992885][ T3514] sg_write: process 2 (syz.3.4) changed security contexts after opening file descriptor, this is not allowed. [ 31.995171][ T3317] generic_shutdown_super+0xe6/0x210 [ 32.012031][ T3317] kill_block_super+0x2a/0x70 [ 32.016693][ T3317] ext4_kill_sb+0x42/0x80 [ 32.021003][ T3317] deactivate_locked_super+0x75/0x1c0 [ 32.026366][ T3317] deactivate_super+0x97/0xa0 [ 32.031032][ T3317] cleanup_mnt+0x2a9/0x320 [ 32.035434][ T3317] __cleanup_mnt+0x19/0x20 [ 32.039834][ T3317] task_work_run+0x131/0x1a0 [ 32.044405][ T3317] exit_to_user_mode_loop+0x1fe/0x740 [ 32.049763][ T3317] do_syscall_64+0x1e1/0x2b0 [ 32.054345][ T3317] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 32.060230][ T3317] [ 32.062536][ T3317] value changed: 0x03 -> 0x06 [ 32.067189][ T3317] [ 32.069491][ T3317] Reported by Kernel Concurrency Sanitizer on: [ 32.075634][ T3317] CPU: 0 UID: 0 PID: 3317 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 32.085595][ T3317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 32.095637][ T3317] ================================================================== [ 32.142447][ T3528] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 32.156081][ T3528] block device autoloading is deprecated and will be removed. [ 32.165460][ T3514] program syz.3.4 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 32.210191][ T3531] loop0: detected capacity change from 0 to 1024 [ 32.217532][ T3531] EXT4-fs: inline encryption not supported [ 32.231552][ T3318] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.341563][ T3531] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 32.689784][ T3317] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000.