last executing test programs: 6.014931354s ago: executing program 2 (id=218): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x4, 0x28}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000f00)='kfree\x00', r2}, 0x18) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x8c, &(0x7f0000000300)='trans=rdma,') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r3 = socket(0x1, 0x803, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae7}, 0x94) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000180)=ANY=[@ANYBLOB]) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="7fff0000000000002800128009000100766c616e000000001800028006000100340200000c0002001f0000001e00000008000500", @ANYRES32=r4], 0x50}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file2\x00', 0x10000, &(0x7f00000001c0), 0x1, 0x556, &(0x7f0000000fc0)="$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") ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x74, r6}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x400c055}, 0x0) 4.755027507s ago: executing program 1 (id=221): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x60, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000500)='kmem_cache_free\x00', r0}, 0x18) iopl(0xf8) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) open(0x0, 0x470000, 0x14) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e0000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000280)='./file0\x00', 0x800000, &(0x7f0000000500)=ANY=[@ANYRES8=0x0, @ANYRESHEX, @ANYRESOCT, @ANYRES32, @ANYBLOB="b7ad7cd65c46a5be7840094fc88ed3944440d445ac89758d3aa4a6c77ea3e1e50196a99f88ba68f3377383de4de11c07aa5d22d9f4f3c58344d6011b6ea5ee82cf40e4ca5976370cb73c872e576f936791a0ffa5639ac237214be5926acea5405e00f1a144cf7a5240bc1e56ed617e19d6a5a268505f0012b4baf36d3a71eb34c8b67281dbba4b20c3d724ef150deff6f7d908bc72575a1f43b608e0d118", @ANYBLOB="a1fffd2e4c38a7b17fef1a78ad1943012e7b7711a1517cd8b4288a2fbb7d202d8c4a1809add074e6dde0703158125f2f114c49f5ee5f249d63ac0d851c212ccd8d82b7c694ead23c417021e8bc78d646d07e3513568bb81d2179a012dcdcb845b0a58b6d5e46a177de56e3e77ed573967e4eea299078019693ca486edbaa44e947802c7f46f1de18cf7f0e1af02964d04cc84d979855e8d3a3fda262f6a7d2b4b4849fd880c9b9af9be818ba05386754a3505e833ca0b9770f63e91f3a9a04e9fca51d88273d5491ed", @ANYRES8], 0x3, 0x7dc, &(0x7f0000000d80)="$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") r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000002060103000000000000000000000004050001000700000013000300686173683a6e65742c696661636500000900020073797a30000000000500040000000000050005000a00000014000780050015000000000008001240"], 0x60}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0x1c, 0x3, 0x6, 0x101, 0x0, 0x0, {0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x10000000) 4.374682054s ago: executing program 1 (id=223): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2042, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r1, 0x6) r2 = socket$netlink(0x10, 0x3, 0x8000000004) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) writev(r2, &(0x7f0000000280)=[{&(0x7f0000000040)="580000001400192340834b80040d8c560a067fbc45ff000000010000000458000b480400945f64009400050038925a01000000000000008004000000ffe809000000fff5dd0000000800030006010000418e01400004fcff", 0x58}], 0x1) r3 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000640)=0x1802, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000fc0)='illinois', 0x8) recvmmsg(r3, &(0x7f0000000f00)=[{{&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/192, 0xc0}, {0x0}], 0x2, &(0x7f00000002c0)=""/3, 0x3}, 0x5df8}, {{&(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000003c0)=""/53, 0x35}, {&(0x7f0000000500)=""/231, 0xe7}, {&(0x7f0000000400)=""/158, 0x9e}, {&(0x7f0000000680)=""/225, 0xe1}, {&(0x7f0000000780)=""/206, 0xce}, {&(0x7f0000000880)=""/199, 0xc7}, {&(0x7f0000000980)=""/176, 0xb0}, {&(0x7f0000000a40)=""/215, 0xd7}], 0x8, &(0x7f0000000bc0)=""/95, 0x5f}, 0x4}, {{&(0x7f0000000c40)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000cc0)=""/241, 0xf1}], 0x1, &(0x7f0000000e00)=""/223, 0xdf}, 0x40}], 0x3, 0x8000, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0xfd, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848110000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x8084) ioctl$AUTOFS_IOC_FAIL(r0, 0x4c80, 0x7000000) 4.345417347s ago: executing program 3 (id=224): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f00000100000012"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffad, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000740), 0x80000002, r0}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) 4.273128234s ago: executing program 2 (id=225): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x13, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000"], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="010028bd7000fcdbdf2504"], 0x14}}, 0x0) 3.672200503s ago: executing program 1 (id=226): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) mkdir(&(0x7f0000000140)='./control\x00', 0x5) close(r2) r3 = inotify_init1(0x800) fcntl$setstatus(r2, 0x4, 0x2c00) r4 = gettid() fcntl$setown(r2, 0x8, r4) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000040)={[0xffffffffffff7ff8]}, 0x0, 0x0, 0x8) inotify_add_watch(r3, &(0x7f0000000180)='./control\x00', 0xa400080a) rmdir(&(0x7f0000000100)='./control\x00') 3.310593598s ago: executing program 2 (id=227): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x37, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket$packet(0x11, 0x3, 0x300) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) 3.235132085s ago: executing program 3 (id=228): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000e8f70000000000ff000044850000000e000000650000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) r3 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) sendmsg$tipc(r2, &(0x7f0000000400)={&(0x7f00000008c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2400c09d}, 0x20) r4 = socket$netlink(0x10, 0x3, 0x14) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) unshare(0x6020400) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800400001"], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r5, 0x0, 0x0}, 0x20) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000063000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8844) 3.08236093s ago: executing program 3 (id=230): unshare(0x10010080) fsopen(0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x60442, 0x0) r2 = dup(r1) ioctl$PTP_PEROUT_REQUEST2(r2, 0xc0403d11, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004041, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x2, @dev={0xfe, 0x80, '\x00', 0x13}, 0x7}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x10001, 0xee72}, 0x0, 0x10000, 0x8, 0x1, 0x7, 0x20005, 0xb, 0x0, 0x8, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) lstat(&(0x7f0000002000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000001640), r4) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0900000000000000000002000000140001800500020001"], 0x28}}, 0x0) 3.069726731s ago: executing program 1 (id=231): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x19000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, 0x0, 0x800, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x4, 0x4f}}}}, [@NL80211_ATTR_PS_STATE={0x8}, @NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000e8f70000000000ff000044850010000e000000650000005000000095ca0a3ccf88eebe881aeccd11cf78d97064429a96a9dce8e2d4eee0298b0ceb684b4ff2c55c4ff2"], &(0x7f0000000100)='GPL\x00', 0x8000, 0x0, 0x0, 0x41000, 0x0, '\x00', r1, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_msfilter(r3, 0x0, 0x29, 0x0, 0x18) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x1a00404, &(0x7f0000000340)={[{@grpquota}, {@nomblk_io_submit}, {@i_version}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x8}}]}, 0x1, 0xbb2, &(0x7f0000002700)="$eJzs3M9rHOUbAPBnJpvf+TbpF1FbBANSFcVt2pQKPbWeRQU9eGxMNiVk+8Mkggk9pPWuHkQ8FKR/guDdXjwJHupB619QxCJFL20PK7M/0rWb3YZ0d6dNPx94M+8772Se58k0mXdgpwE8taazL2nEgYg4nURM1venETFU7Y1EbNaOu3v74nzWkqhU3v8riSQi7ty+ON84V1LfjtcHIxFx/a0k/v9Za9zV9Y3luXK5tFIfH147e+Hw6vrGG0tn586UzpTOHZt989js8dnZLtZ688JH37zwyzsvX776+cy7X+/7KYmTMVGfa66jW6Zjeutn0qwQEXPdDpaTgXo9zXUmhRwTAgCgo7RpDfdsTMZA3F+8TcaPv+aaHAAAANAVlYGICgAAALDHJZ7/AQAAYI9rfA7gzu2L842W7ycS+uvWqYiYqtXfeL+5NlOIzep2JAYjYuzvJJpfa01q3/bIprNI3/9cylr06D3kTjYvRcTz213/pFr/VPUt7tb604iY6UL86QfGj3n9W685Z/Wf7EL8vOsH4Ol07VTtRtZ6/0u31j+xzf2/sM29azfyvv811n93W9Z/9+sfaLP+e6/jmfdt9Q7ee+16u6Oa138ffvH7QhY/2z5yYTt061LEwcJ29Sdb9Sdt6j+9wxjj8zevtJvL6s/qbbR+11+5GnGoupprrb8h6fT/Ex1eXCqXZmpftzn/+vHO8Zuvf9ay+I1ngX7Irv9Y7O76X9hhjKnn/jzQbu7h9ad/DCUfVHtD9T2fzq2trRyJGErebt1/tHMujWMa58jqf/Wlzr//29Wf/U3YrP8csn89l+rbbHz5gZjjh45+t/v6eyurf2GX1//LHcb49ocrH7eby7t+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJ4MaURMRJIWt/ppWixGjEfEMzGWls+vrr2+eP6TcwvZXMRUDKaLS+XSTERM1sZJNj5S7d8fH31gPBsR+yPiq8nR6rg4f768kHfxAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAbBmPiIlI0mJEpBHxz2SaFot5ZwUAAAB03VTeCQAAAAA95/kfAAAA9r6W5//Cf0Yj/cwFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAPWn/i9duJBGxeWK02jJD9bnBXDMDei3d2WFjvc4D6L+BvBMAclNo6lcqlUqOqQB95hkfSB4yP9J2ZrjruQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADw+HrlwLUbSURsnhittsxQfW4w18yAXkvzTgDIzUCnyeShO4AnWCHvBIDceMYHaiv7e5Wa1vmRtt85/MhRAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHhyTFRbkhYjIq3207RYjPhfREzFYLK4VC7NRMS+iPhtcnA4Gx/JO2kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC6bnV9Y3muXC6t6OjodLEzGn2LNVr/ZW5zzHD7qQ6dnP8wAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACQi9X1jeW5crm0spp3JgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDeVtc3lufK5dJKDzt51wgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQH7+DQAA//+AkQnB") socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_CLEAR_HALT(r5, 0x80045503, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), r0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0}, 0x94) prctl$PR_SET_NAME(0xf, &(0x7f00000001c0)='w\xde\xa3\x05\xff\a\x00\x00\x00\x00\x00\x00\x8f\xc0\x9b\x86\xef\\\xc0\x89\av\x9f\xd6\xd1\x98,\xc8\x18E/\x8c\x1a\xe3\xbd') sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01002dbd7000fedbdf2531000000180001801400020064756d6d7930"], 0x2c}, 0x1, 0x0, 0x0, 0x2004c890}, 0x2000c800) 1.770736908s ago: executing program 3 (id=234): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='cpu<20\t||') r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000440), 0x10) listen(r2, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10) writev(r3, &(0x7f0000000080)=[{&(0x7f00000001c0)='?', 0x1}], 0x1) r4 = accept4$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000001680)=[{{0x0, 0x0, &(0x7f0000003380)=[{&(0x7f0000000140)=""/120, 0x78}, {&(0x7f0000000040)=""/40, 0x28}, {&(0x7f0000003300)=""/107, 0x6b}], 0x3}}], 0x4000000000000a1, 0x2, 0x0) recvmsg(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)=""/68, 0x44}], 0x1}, 0x4c2103a0) 1.637568711s ago: executing program 3 (id=236): syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x50) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x6, @loopback, 0x3}], 0x1c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000000, 0x13, 0xffffffffffffffff, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FD_FRAMES(r2, 0x65, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f0000000480)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="06", 0x1}], 0x1, 0x0, 0x0, 0x4004}}], 0x1, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x4) splice(r3, 0x0, r6, 0x0, 0x39000, 0x0) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x4, 0x0, 0x5}]}) openat$selinux_policy(0xffffff9c, 0x0, 0x0, 0x0) close_range(r7, 0xffffffffffffffff, 0x0) 1.585263316s ago: executing program 0 (id=237): socket(0xa, 0x3, 0xff) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a5000000500000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x84, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r2 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r2, &(0x7f0000000000)={0x2a, 0x0, 0x2}, 0xc) pselect6(0x40, &(0x7f00000002c0)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0x0, 0x0) bind$qrtr(r2, &(0x7f00000000c0)={0x2a, 0x1}, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r3, 0x0, 0x44, 0x0, &(0x7f0000000080)="f6f4e9a10000502468da5eb1c6b2feff8833c0000000000000c548dc7914cb11ad63bf3707164aac031971c4be105eb953f86fbc6b204e076aa7a493e796123bbbd8e3b7e62d8fd097cf21d6d431a069ebc0aefd5fce80cc99fb38c771fa46e2c32a95fe99", 0x0, 0x86, 0x0, 0xffffffffffffff80, 0x0, &(0x7f0000000000)="daf9e846ab156efc71b59652333536dbfd26a6d0546366e36eb77dd0aaa2dbe567d168904cf0d5bce1771889c98ffc0abf", 0x0}, 0x15) close_range(r3, r1, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2c, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f00000009c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, @loopback, @private1={0xfc, 0x1, '\x00', 0x1}}}) dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40841}, 0x4) 1.03439671s ago: executing program 2 (id=238): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000900)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000060a0b040000000000000000020000000900010073797a300000000009"], 0x54}}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) socket$unix(0x1, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=@newqdisc={0x2c, 0x24, 0x200, 0x70bd2a, 0xffdfffff, {0x0, 0x0, 0x0, 0x0, {0x5, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_atm={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8014}, 0x480c0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=@newtfilter={0x24, 0x2c, 0xd27, 0x70bd2d, 0x25dfdc00, {0x0, 0x0, 0x0, 0x0, {0x0, 0x3}, {}, {0xfff3, 0xffe0}}}, 0x24}, 0x1, 0x0, 0x0, 0x50}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00'}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5100, 0x0, 0x0, 0x0, 0x0, 0xfee, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 995.529393ms ago: executing program 2 (id=239): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffc4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) socket$netlink(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000000900010073797a300000000078000000030a01030000000000000000050000000900010073797a300000000008000540000000001c0008800c00024000000000000000000c00014000000000000000000900030073797a3200000000280004800800024000000000140003007465616d5f736c6176655f30000000000800014000000001"], 0xd4}}, 0x8818) write$binfmt_misc(r5, &(0x7f0000000000), 0xfffffecc) splice(r4, 0x0, r6, 0x0, 0x4ffe6, 0x0) 951.594477ms ago: executing program 1 (id=241): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$sock_int(r0, 0x1, 0x20, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r3 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x870, 0x8ca80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)=r2}, 0x20) socket(0x40000000015, 0x5, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x1, &(0x7f0000000040)={[{@delalloc}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7bf}}]}, 0x1, 0x56e, &(0x7f0000000640)="$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") ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001000)) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r6, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0xea, 0x0, 0xfffd, 0x0, 0x9, 0x5}, {0x12, 0x2, 0x0, 0x401, 0x8001, 0x1400}, 0xa5, 0x5, 0x10000000}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}}, 0x44080) 867.287796ms ago: executing program 4 (id=242): bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000700000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000400000085000000060000008500df08230000009500000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r0}, 0x10) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f00000000c0), 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000180)='mm_page_free\x00', r2, 0x0, 0x1000000}, 0x18) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3af, 0x4}, 0x100000, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) 820.77516ms ago: executing program 1 (id=243): openat$sysfs(0xffffffffffffff9c, &(0x7f0000000580)='/sys/power/image_size', 0x1a1081, 0x18) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e0000000000000005000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x109a88, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioperm(0x3c, 0x1, 0x8) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000280)='./file1\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0xfb, 0x1219, &(0x7f0000001100)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x275a, 0x0) ftruncate(r1, 0x2000009) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) pwritev2(r2, &(0x7f00000001c0)=[{&(0x7f0000000400)="ba", 0xfdef}], 0x1, 0xe7b, 0x0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 768.983515ms ago: executing program 3 (id=244): mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x21c0, 0x103) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000500000008000000ca1fda86", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x8800, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) setreuid(0xee01, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1a, 0x5, 0x400, 0x4, 0x2, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5}, 0x38) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x2, 0x3, 0x0, 0x3, 0x1d, 0x0, 0x4070bd2c, 0x25dfdbfc, [@sadb_key={0x2, 0x9, 0x8, 0x0, "1c"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xc, 0x80000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xa}}}, @sadb_key={0x11, 0x8, 0x3f8, 0x0, "5630f6e8902e42edce8053fcc1ffae922948f2a67f26f317f8caa201a1f568b6276352479653234ae3146302b44884bde392ba28a038c01c09b89cb4c10a3dcdcdfde6f19f0b6226542353f5fa434da09050383066ba039209cf8cea541d1485cbe92a48534f0ab90115efe2d23bf80c826339ebbc2911ada72941105c3462"}]}, 0xe8}, 0x1, 0x7}, 0x0) 707.024081ms ago: executing program 0 (id=245): r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e24, @empty}, 0xa0, 0x0, 0x0, 0x0, 0x7ff, &(0x7f0000000080)='veth0_macvtap\x00', 0x6, 0x7, 0x7}) syz_mount_image$ext4(&(0x7f0000000d80)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x28881f, &(0x7f00000000c0)={[{@mb_optimize_scan}, {@delalloc}, {@stripe={'stripe', 0x3d, 0x84}}]}, 0x0, 0x518, &(0x7f0000001780)="$eJzs3c9vHFcdAPDvrLPrjePWaekBEG1DWwgoyjretFHVA5QLCKFKiB5BSo29sSzvei3vutQmB/fMFYlKnODIH8ANqSckjlwQ3LiUAxI/LFCNxGHQzI6dtbMbR7G9G7yfjzSa9+ZN9vt9cea97LO9L4CJdS0idiOiEhHvRcRccT0pjni7d2T3fbp3f2l/7/5SEmn67j+SvD27Fn1/JnOleM1qRHzvWxE/TB6O29neWVtsNhubRX2+29qY72zv3FxtLa40Vhrr9fqdhTu33rz9Rv3M+vpyq1KUXvzk97tf/XGW1mxxpb8fZ6nX9fJhnMyliPjOeQQbg6miP5VxJ8ITKUXE8xHxSv78z8VU/tUEAC6yNJ2LdK6/DgBcdKV8DSwp1Yq1gNkolWq13hreCzFTarY73Rv32lvryxGzScTVKJfurTYbt4q1wqtRTrL6Ql5+UK8fq9+OiOci4qfTl/N6bandXB7nf3wAYIJdOTb//3u6N/8DABdcddwJAAAjZ/4HgMlj/geAyWP+B4DJ05v/L487DQBghLz/B4DJY/4HgIny3XfeyY50v/j86+X3t7fW2u/fXG501mqtraXaUntzo7bSbq/kn9nTOun1mu32xsLrsfXB1a9tdLrzne2du6321nr3bv653ncb5fyu3RH0DAAY5rmXP/5Tks3Ib13Oj+jby6E81syA81YadwLA2EyNOwFgbOz2BZPrFO/xLQ/ABTFgi95Dv/tmmlYH/YJQmqbp+aYFnKPrn7P+D5Oqb/3fTwHDhLH+D5PL+j9MrjRNHrHn/4uVvko84kYA4P+INX5gyPf/ny/Ovyq+OfCD5eN3fHSeWQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDT7WD/31qxF/hslEq1WsQzEXE1ysm91WbjVkQ8GxF/nC5PZ/WFMecMAJxW6a9Jsf/X9bnXZo80vXTlsFiJiB/9/N2ffbDY7W7+IaKS/HP64Hr3o+J6ffTZAwAnO5in83PfG/lP9+4vHRyjzOdv34iIai/+/l4l9g/jX4pL+bka5YiY+VdS1HuSvrWL09j9MCI+O6j/SczmayC9nU+Px89iPzPS+KUj8Ut5W++c/V185gxygUnzcTb+vD3o+SvFtfw8+Pmv5iPU6RXjX/ZSS/v5GPgg/sH4NzVk/Lv2uDFe/+23e6XLD7d9GPH5SxEHsff7xp+D+MmQ+K8df7EhA+Kfv/DSK8NyS38RcT0Gx++PNd9tbcx3tndurrYWVxorjfV6/c7CnVtv3n6jPp+vUc8Pnw3+/taNZ4e1Zf2fGRK/ekL/vzQ04lG//O973//ioIapXvyvvDoofileeET8bE788mPGX5z5dXVYWxZ/eUj/T/r633jM+J/8ZeehbcMBgPHpbO+sLTabjc2hhd/MnHyPgsJICtk/2acgjYGFr48qViUGN/3k1d4zfawpTZ8o1tFx4sE7x7NYdQOeBocPfUT8Z9zJAAAAAAAAAAAAAAAAA43iN5bG3UcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAurv8FAAD//4iL0F8=") perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x62, 0x0, 0x81, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x7ff, 0x800003, 0x5, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000740)={0x0}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x95bda107d86ebb57, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f00000000c0)={r2}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000002780)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000080)={r3, 0x3, r1, 0x5}) open(&(0x7f00000000c0)='./file1\x00', 0x14927e, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', 0xffffffffffffffff, 0x0, 0xff}, 0x18) io_setup(0x239f, &(0x7f0000000380)=0x0) r5 = eventfd2(0x5, 0x1) io_submit(r4, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x6, r5, 0x0, 0x0, 0x800002, 0x0, 0x0, r5}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x9841, r5, &(0x7f0000000080)="e2", 0x36, 0x5, 0x0, 0x1, r5}]) 537.115118ms ago: executing program 4 (id=246): r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc0200000000000000ae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce896165127cb3f011a7d06602e2fc40848228567ffb400000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df2624f56da648d28ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71400fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada10eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d32940000088dde499000000fdffffff00000000000f000000ef0000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18aba6b16455a66c3b84b138efc20a546d3d5227e23b03f2a834391ade2ff3e93ee296c4082ee73e7c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1ce6d0b2fea02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0847a1ff2f7fc3c2b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f05c7f0be31491eb8c9ff68236c8600040000000000000000000066e034c81c3cab64e4fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f224baf1221c15fa12313ffbfa7c2730309f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca205081173bd03c4754fc4674812daab482fd390a1c903b5d28a1eb247b5837d7603b92495d5c569f6433c3fca5206cb0000003fdbbd3892c52c2e7612e05de32322e980a3d69931e2c9312dd517c96f2ee90362476ed853c4c9b7d4ebf13cbaa795860e92a3d7d004f2c491db38eb769f094d5d48b262cc35c40682138cf13a49aa9f27abec00002f01ba1251aaf2385416ca719300"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="c0020000100063d10000000000000000fe8000000000000000000000000000bbfe8000000000000000000000000000aa0000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc01000000000000000000000000000000000000330000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000b000000000000000000000000000000ffffffffffffffff000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001600000000020000000000000000000000bf010100636d61632861657329"], 0x2c0}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) sendmsg$RDMA_NLDEV_CMD_SET(r1, 0x0, 0x40810) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0x47, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaabbffffffffffff0c96d66f8cb459f5fffd01000000000000000000000000004e20002590782fa0721611d464856fa9d9b0ed3bdabc66e5050000101e23"], 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'macsec0\x00', 0x0}) setsockopt$inet6_mreq(r6, 0x29, 0x1b, &(0x7f0000000000)={@remote, r7}, 0x14) sendmsg$nl_route_sched(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x2000, {0x0, 0x0, 0x74, r7, {0xfffd, 0x10}, {0x1, 0xfff1}, {0xfff2, 0x3}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x14004804}, 0x840) 422.377619ms ago: executing program 0 (id=247): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x5, r0}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f0000000080)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x28, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x2, 0x2, @loopback, 0x8}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x240040c4, &(0x7f0000000040)={0xa, 0x2, 0x80398, @empty, 0xfffffffe}, 0x1c) shutdown(r4, 0x1) 362.729385ms ago: executing program 4 (id=248): fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x1, 0x0, 0x0, 0x2, 0xd381, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x800000000006}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') getdents64(r2, &(0x7f0000003080)=""/4096, 0x1000) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unshare(0x2a060400) r3 = openat(0xffffffffffffff9c, &(0x7f00000013c0)='./file0/file0\x00', 0x42, 0x0) close(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x1050c1, 0x170) fgetxattr(r4, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0xfe) 330.595568ms ago: executing program 0 (id=249): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000440)='kmem_cache_free\x00', r0, 0x0, 0x5}, 0x18) close(0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) statfs(0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/cgroup.procs\x00', 0x2, 0x128) utimensat(r2, 0x0, &(0x7f0000000080), 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000200), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) shmget(0x0, 0x4000, 0x602, &(0x7f0000ff9000/0x4000)=nil) 253.905315ms ago: executing program 0 (id=250): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_read_part_table(0x5e7, &(0x7f0000000600)="$eJzs3EFo01ccB/CXrMQpiPPmzWAOES8t9BgiaIh/SmAJwWEZIvNWD7koO3iIKRgQYcZLZOBFD4rQBWXoSUQYiJh4EHISy7pLW0oPo9BLoJSMbv/Aeuu2hiF8PvAO773vL7/3yP/6/wc+a8nw+3A4TIQQhgd2bST2Uv3NQvHcTLpypnp+p+BiCGHq59zc38tHv3oini/F8y9fTdTuLES3Wu3Dx16kt94n4/35eKz27l8adUn910syNievnfrl+KB/9GUpPOye7uYO1WbnOtlCo/Oh8vzs4/ST0f8+uasquW/9n+XfHrnZvBq1ruevfIzqy9FacnMj+vrHB5Opu41qdn0q7PVZ/ndq2xdSPz16U2iuHJx+VyqX208X72XqxdfNG/1e5tPg9uW/YomJsZ4CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAID9cvLaqW+PD/pHX5bCw+7pbu5QbXauky00Oh8qz88+Tj85Eecmx9T/Wf7tkZvNq1Hrev7Kx6i+HK0lNzeiL0IIqbuNanZ9Ks59N6b+te0L87OP3hSaKwen35XK5fbTxXuZevF180a/l/k0uH05zv16YEwHAAAAAAAAAAAAAAAAAAAAgBBC8dxMunKmej6ERLgYQsg9mFncWR/G77sn4tzoOwBLf65//8P0q4nanYXoVqt9+NiL9Nb73+L8fDxWe/cvha/+hwvxj/wRAAD//0yVh/I=") perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x66, 0x3, 0x29, 0x0, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x8, 0x10000, 0x3, 0x3, 0x9, 0xe8, 0x1, 0x0, 0xe1a0, 0x0, 0x9}, 0x0, 0xe, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000980), 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, 0x0, 0x5dc}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x20, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 170.204453ms ago: executing program 4 (id=251): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000208e052500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) move_mount(r4, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, 0x0, 0x262) ioctl$HIDIOCSUSAGES(r4, 0x501c4814, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'ip6tnl0\x00', @broadcast}) 113.517469ms ago: executing program 2 (id=252): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$key(0xf, 0x3, 0x2) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='xen_mmu_set_pud\x00', r4, 0x0, 0xfffffffffffffff1}, 0x18) setregid(0x0, 0xee01) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) syz_emit_ethernet(0xfed7, &(0x7f0000000340)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd6002adf700383a00fe880000000000000000000000000001ff020000000000000000000000000001"], 0x0) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="02030003110000002cbd7000fcdbdf2503000900800000001cdc0dca1d9f68846960e56de42944af05000600000000000a00ebff0000000000000000000000000000000000000001090000000000000002000100000000000000070c0000000005000500000000000a"], 0x88}, 0x1, 0x7}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x48) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX]) 64.579834ms ago: executing program 4 (id=253): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000010000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000fc0)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x3, 0x4, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(0x0, &(0x7f0000000040)={0x200000, 0x2, 0x0, 0x6, 0x7}) r1 = syz_io_uring_setup(0x45, &(0x7f0000000300)={0x0, 0x0, 0x40, 0x2, 0x18}, &(0x7f0000000100), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_PBUF_RING(r1, 0x22, &(0x7f0000000200)={&(0x7f0000001000)={[{0x0, 0x0, 0x1}]}, 0x1}, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu>=0||!') socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r2, 0xa, 0x13) fcntl$setlease(r2, 0x400, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01f71800000000000000240000002400000002000000000000000000000400000003000000000000000000000000000000000000000d020000000000000600"/94], 0xffffffffffffffff, 0x3e, 0xb1, 0xa}, 0x1b) fcntl$setlease(r2, 0x400, 0x2) 55.364705ms ago: executing program 0 (id=254): syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, @void, {@ipv4={0x800, @tcp={{0x7, 0x4, 0x2, 0x3, 0x30, 0x64, 0x0, 0x7, 0x6, 0x0, @remote, @remote, {[@cipso={0x86, 0x6, 0x2}]}}, {{0x4e22, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x9, 0x0, 0xe7}}}}}}, 0x0) socket(0x10, 0x803, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002a00000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x2}, 0x18) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000540), &(0x7f0000000580)=r3}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r2, &(0x7f0000000780)}, 0x20) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000000050005000200000c12000300686173683a6e65742c706f7274"], 0x4c}}, 0x2) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="50000000090601020000000000000000020000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) 0s ago: executing program 4 (id=255): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00'}) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) fcntl$lock(r2, 0x24, &(0x7f00000000c0)={0x2, 0x0, 0xc63, 0x401}) close(0x3) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000004000000950000000000000085100000fcffffff9500000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r3, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) socket$netlink(0x10, 0x3, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.145' (ED25519) to the list of known hosts. [ 33.791778][ T29] audit: type=1400 audit(1760126736.464:62): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.814822][ T29] audit: type=1400 audit(1760126736.484:63): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.815847][ T3302] cgroup: Unknown subsys name 'net' [ 33.842608][ T29] audit: type=1400 audit(1760126736.514:64): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.990742][ T3302] cgroup: Unknown subsys name 'cpuset' [ 33.997001][ T3302] cgroup: Unknown subsys name 'rlimit' [ 34.108208][ T29] audit: type=1400 audit(1760126736.774:65): avc: denied { setattr } for pid=3302 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 34.131478][ T29] audit: type=1400 audit(1760126736.774:66): avc: denied { create } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.152134][ T29] audit: type=1400 audit(1760126736.774:67): avc: denied { write } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.163166][ T3304] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 34.172617][ T29] audit: type=1400 audit(1760126736.774:68): avc: denied { read } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 34.201367][ T29] audit: type=1400 audit(1760126736.774:69): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 34.204997][ T3302] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 34.226363][ T29] audit: type=1400 audit(1760126736.774:70): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 34.258762][ T29] audit: type=1400 audit(1760126736.854:71): avc: denied { relabelto } for pid=3304 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 36.112313][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 36.127753][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 36.176545][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 36.189567][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 36.237311][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.244480][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.251765][ T3321] bridge_slave_0: entered allmulticast mode [ 36.258098][ T3321] bridge_slave_0: entered promiscuous mode [ 36.268489][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.275604][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.283045][ T3321] bridge_slave_1: entered allmulticast mode [ 36.289607][ T3321] bridge_slave_1: entered promiscuous mode [ 36.324616][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 36.337646][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.344920][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.352145][ T3314] bridge_slave_0: entered allmulticast mode [ 36.358561][ T3314] bridge_slave_0: entered promiscuous mode [ 36.365266][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.372430][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.379605][ T3314] bridge_slave_1: entered allmulticast mode [ 36.386086][ T3314] bridge_slave_1: entered promiscuous mode [ 36.420952][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.440909][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.448046][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.455192][ T3319] bridge_slave_0: entered allmulticast mode [ 36.461595][ T3319] bridge_slave_0: entered promiscuous mode [ 36.474702][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.485190][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.504319][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.511425][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.518593][ T3319] bridge_slave_1: entered allmulticast mode [ 36.525099][ T3319] bridge_slave_1: entered promiscuous mode [ 36.537769][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.549256][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.556482][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.563730][ T3312] bridge_slave_0: entered allmulticast mode [ 36.570270][ T3312] bridge_slave_0: entered promiscuous mode [ 36.594910][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.602101][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.609269][ T3312] bridge_slave_1: entered allmulticast mode [ 36.615673][ T3312] bridge_slave_1: entered promiscuous mode [ 36.627155][ T3321] team0: Port device team_slave_0 added [ 36.646337][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.661435][ T3321] team0: Port device team_slave_1 added [ 36.667966][ T3314] team0: Port device team_slave_0 added [ 36.678976][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.694458][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.709009][ T3314] team0: Port device team_slave_1 added [ 36.719647][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.726794][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.733936][ T3317] bridge_slave_0: entered allmulticast mode [ 36.740488][ T3317] bridge_slave_0: entered promiscuous mode [ 36.747816][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.756985][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.764090][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.771426][ T3317] bridge_slave_1: entered allmulticast mode [ 36.777849][ T3317] bridge_slave_1: entered promiscuous mode [ 36.810205][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.817161][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.843246][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.859341][ T3319] team0: Port device team_slave_0 added [ 36.875513][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.882505][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.908453][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.919456][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.926457][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.952447][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.964021][ T3319] team0: Port device team_slave_1 added [ 36.970735][ T3312] team0: Port device team_slave_0 added [ 36.977735][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.989858][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.996871][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.022849][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.039565][ T3312] team0: Port device team_slave_1 added [ 37.052431][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.070299][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.077263][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.103169][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.125661][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.132677][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.158606][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.184800][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.191796][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.217751][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.237256][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.244246][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.270177][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.287760][ T3321] hsr_slave_0: entered promiscuous mode [ 37.293917][ T3321] hsr_slave_1: entered promiscuous mode [ 37.316397][ T3314] hsr_slave_0: entered promiscuous mode [ 37.322716][ T3314] hsr_slave_1: entered promiscuous mode [ 37.328583][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 37.334386][ T3314] Cannot create hsr debugfs directory [ 37.340604][ T3317] team0: Port device team_slave_0 added [ 37.360651][ T3317] team0: Port device team_slave_1 added [ 37.368441][ T3319] hsr_slave_0: entered promiscuous mode [ 37.374709][ T3319] hsr_slave_1: entered promiscuous mode [ 37.380690][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 37.386419][ T3319] Cannot create hsr debugfs directory [ 37.441605][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.448623][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.474674][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.487564][ T3312] hsr_slave_0: entered promiscuous mode [ 37.493802][ T3312] hsr_slave_1: entered promiscuous mode [ 37.499683][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 37.505496][ T3312] Cannot create hsr debugfs directory [ 37.522816][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.529767][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.555705][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.648267][ T3317] hsr_slave_0: entered promiscuous mode [ 37.654390][ T3317] hsr_slave_1: entered promiscuous mode [ 37.660278][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 37.666022][ T3317] Cannot create hsr debugfs directory [ 37.754319][ T3321] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 37.763459][ T3321] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 37.784508][ T3321] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 37.793251][ T3321] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 37.824678][ T3314] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.833868][ T3314] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.850379][ T3314] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.869763][ T3314] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.881004][ T3319] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 37.889748][ T3319] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 37.905547][ T3319] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 37.923150][ T3319] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 37.950520][ T3312] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 37.962204][ T3312] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 37.971989][ T3312] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 37.981425][ T3312] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 38.013786][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.025736][ T3317] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 38.041303][ T3317] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 38.056948][ T3317] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 38.071888][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.079068][ T3317] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 38.101412][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.120629][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.128952][ T166] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.136069][ T166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.147863][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.155140][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.169128][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.188098][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.195381][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.223148][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.230264][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.253839][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.268065][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.275357][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.292569][ T3321] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.303054][ T3321] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.324682][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.331805][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.361668][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.381844][ T3314] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.392296][ T3314] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.415378][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.430226][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.446684][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.453806][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.469886][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.479832][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.492051][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.499156][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.517597][ T3312] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.528022][ T3312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.546676][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.553781][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.585314][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.599738][ T166] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.606844][ T166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.636299][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.683173][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.722213][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.821223][ T3321] veth0_vlan: entered promiscuous mode [ 38.843179][ T3321] veth1_vlan: entered promiscuous mode [ 38.858419][ T3319] veth0_vlan: entered promiscuous mode [ 38.874517][ T3317] veth0_vlan: entered promiscuous mode [ 38.896486][ T3321] veth0_macvtap: entered promiscuous mode [ 38.904607][ T3321] veth1_macvtap: entered promiscuous mode [ 38.912040][ T3319] veth1_vlan: entered promiscuous mode [ 38.925742][ T3312] veth0_vlan: entered promiscuous mode [ 38.933083][ T3317] veth1_vlan: entered promiscuous mode [ 38.954388][ T3314] veth0_vlan: entered promiscuous mode [ 38.967274][ T3319] veth0_macvtap: entered promiscuous mode [ 38.979366][ T3312] veth1_vlan: entered promiscuous mode [ 38.986516][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.994117][ T3317] veth0_macvtap: entered promiscuous mode [ 39.002448][ T3319] veth1_macvtap: entered promiscuous mode [ 39.012864][ T3317] veth1_macvtap: entered promiscuous mode [ 39.019773][ T3314] veth1_vlan: entered promiscuous mode [ 39.029038][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.046647][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.056823][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.065605][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.075143][ T37] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.084684][ T37] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.098136][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.106182][ T37] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.123735][ T37] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.133620][ T37] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.147711][ T37] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.163368][ T37] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.176349][ T37] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.188411][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 39.188428][ T29] audit: type=1400 audit(1760126741.854:81): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/root/syzkaller.h2BxZF/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 39.195547][ T3312] veth0_macvtap: entered promiscuous mode [ 39.223807][ T29] audit: type=1400 audit(1760126741.854:82): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 39.246354][ T29] audit: type=1400 audit(1760126741.854:83): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/root/syzkaller.h2BxZF/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 39.271668][ T29] audit: type=1400 audit(1760126741.864:84): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 39.293562][ T29] audit: type=1400 audit(1760126741.864:85): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/root/syzkaller.h2BxZF/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 39.320256][ T29] audit: type=1400 audit(1760126741.864:86): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/root/syzkaller.h2BxZF/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4566 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 39.347721][ T29] audit: type=1400 audit(1760126741.864:87): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 39.369745][ T37] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.380032][ T29] audit: type=1400 audit(1760126742.054:88): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 39.384054][ T37] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.402783][ T29] audit: type=1400 audit(1760126742.054:89): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="gadgetfs" ino=4006 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 39.432661][ T37] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.444556][ T3314] veth0_macvtap: entered promiscuous mode [ 39.458422][ T3312] veth1_macvtap: entered promiscuous mode [ 39.466744][ T3321] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 39.471448][ T3314] veth1_macvtap: entered promiscuous mode [ 39.487912][ T166] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.504583][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.512693][ T29] audit: type=1400 audit(1760126742.174:90): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 39.547365][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.576068][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.590949][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.608796][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.627180][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.645767][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.665325][ T3487] netlink: 'syz.3.4': attribute type 1 has an invalid length. [ 39.672881][ T3487] netlink: 224 bytes leftover after parsing attributes in process `syz.3.4'. [ 39.691391][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.715838][ T12] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.718278][ T3485] hub 6-0:1.0: USB hub found [ 39.726823][ T12] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.738496][ T3485] hub 6-0:1.0: 8 ports detected [ 39.754850][ T12] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.809335][ T3498] loop1: detected capacity change from 0 to 512 [ 39.815626][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.890958][ T3501] Ÿë: port 1(veth0_to_team) entered blocking state [ 39.897677][ T3501] Ÿë: port 1(veth0_to_team) entered disabled state [ 39.941112][ T3501] veth0_to_team: entered allmulticast mode [ 39.947553][ T3501] veth0_to_team: entered promiscuous mode [ 39.949613][ T3498] EXT4-fs error (device loop1): ext4_xattr_inode_iget:441: inode #12: comm syz.1.2: missing EA_INODE flag [ 39.983936][ C1] hrtimer: interrupt took 27043 ns [ 40.001853][ T3509] Driver unsupported XDP return value 0 on prog (id 9) dev N/A, expect packet loss! [ 40.011766][ T3498] EXT4-fs error (device loop1): ext4_xattr_inode_iget:446: comm syz.1.2: error while reading EA inode 12 err=-117 [ 40.037232][ T3498] EXT4-fs (loop1): 1 orphan inode deleted [ 40.059976][ T3498] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.062180][ T3515] loop3: detected capacity change from 0 to 512 [ 40.103058][ T3515] ext3: Bad value for 'max_batch_time' [ 40.169454][ T3520] netlink: 28 bytes leftover after parsing attributes in process `syz.0.14'. [ 40.178472][ T3520] netlink: 28 bytes leftover after parsing attributes in process `syz.0.14'. [ 40.236708][ T3312] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.599891][ T3533] loop1: detected capacity change from 0 to 1024 [ 40.608425][ T3533] ======================================================= [ 40.608425][ T3533] WARNING: The mand mount option has been deprecated and [ 40.608425][ T3533] and is ignored by this kernel. Remove the mand [ 40.608425][ T3533] option from the mount to silence this warning. [ 40.608425][ T3533] ======================================================= [ 40.670254][ T3533] EXT4-fs: Ignoring removed orlov option [ 40.682228][ T3533] EXT4-fs (loop1): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. [ 40.708930][ T3533] ext4 filesystem being mounted at /2/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 40.816670][ T3537] EXT4-fs error (device loop1): ext4_free_blocks:6706: comm syz.1.18: Freeing blocks not in datazone - block = 0, count = 16 [ 40.853085][ T12] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1289: group 0, block bitmap and bg descriptor inconsistent: 21 vs 268369941 free clusters [ 40.871504][ T12] EXT4-fs (loop1): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 1 with error 28 [ 40.883868][ T12] EXT4-fs (loop1): This should not happen!! Data will be lost [ 40.883868][ T12] [ 40.893753][ T12] EXT4-fs (loop1): Total free blocks count 0 [ 40.899751][ T12] EXT4-fs (loop1): Free/Dirty block details [ 40.905753][ T12] EXT4-fs (loop1): free_blocks=4293918736 [ 40.911539][ T12] EXT4-fs (loop1): dirty_blocks=16 [ 40.916688][ T12] EXT4-fs (loop1): Block reservation details [ 40.922734][ T12] EXT4-fs (loop1): i_reserved_data_blocks=1 [ 41.031650][ T3312] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 41.146912][ T3548] loop0: detected capacity change from 0 to 1024 [ 41.791488][ T3549] lo speed is unknown, defaulting to 1000 [ 41.797304][ T3549] lo speed is unknown, defaulting to 1000 [ 41.803432][ T3549] lo speed is unknown, defaulting to 1000 [ 41.809755][ T3549] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 41.817651][ T3549] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 41.928081][ T3549] lo speed is unknown, defaulting to 1000 [ 41.934649][ T3549] lo speed is unknown, defaulting to 1000 [ 41.941337][ T3549] lo speed is unknown, defaulting to 1000 [ 41.947703][ T3549] lo speed is unknown, defaulting to 1000 [ 41.954387][ T3549] lo speed is unknown, defaulting to 1000 [ 41.960857][ T3549] lo speed is unknown, defaulting to 1000 [ 41.990774][ T3549] +}[@ (3549) used greatest stack depth: 10600 bytes left [ 42.064369][ T3548] EXT4-fs: test_dummy_encryption option not supported [ 42.234674][ T3558] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 42.255882][ T3558] netlink: 4 bytes leftover after parsing attributes in process `syz.2.24'. [ 42.411598][ T3558] team0: Port device team_slave_1 removed [ 42.674392][ T3572] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 42.828921][ T3577] netlink: 4 bytes leftover after parsing attributes in process `syz.4.26'. [ 42.905795][ T3582] netlink: 280 bytes leftover after parsing attributes in process `syz.0.30'. [ 42.929469][ T3580] loop1: detected capacity change from 0 to 512 [ 42.941522][ T3580] EXT4-fs (loop1): The Hurd can't support 64-bit file systems [ 42.953967][ T3577] loop4: detected capacity change from 0 to 512 [ 42.971146][ T3577] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 42.984260][ T3577] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 43.007323][ T3577] EXT4-fs error (device loop4): ext4_init_orphan_info:618: comm syz.4.26: orphan file block 0: bad magic [ 43.062663][ T3577] EXT4-fs (loop4): mount failed [ 43.554193][ T3600] loop2: detected capacity change from 0 to 1024 [ 43.561249][ T3600] EXT4-fs: Ignoring removed orlov option [ 43.583229][ T3600] EXT4-fs (loop2): stripe (2) is not aligned with cluster size (16), stripe is disabled [ 43.627288][ T3600] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 44.087461][ T3607] netlink: 24 bytes leftover after parsing attributes in process `syz.1.37'. [ 44.107111][ T3607] netlink: 4 bytes leftover after parsing attributes in process `syz.1.37'. [ 44.193313][ T3314] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.209719][ T29] kauditd_printk_skb: 856 callbacks suppressed [ 44.209736][ T29] audit: type=1400 audit(1760126746.874:947): avc: denied { create } for pid=3608 comm="syz.4.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 44.235383][ T29] audit: type=1400 audit(1760126746.874:948): avc: denied { getopt } for pid=3608 comm="syz.4.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 44.256037][ T3609] Zero length message leads to an empty skb [ 44.285905][ T3612] loop2: detected capacity change from 0 to 128 [ 44.304296][ T3612] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 44.320381][ T3612] ext4 filesystem being mounted at /4/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 44.351384][ T29] audit: type=1400 audit(1760126747.014:949): avc: denied { write open } for pid=3611 comm="syz.2.38" path="/4/file0/bus" dev="loop2" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 44.374078][ T29] audit: type=1400 audit(1760126747.024:950): avc: denied { create } for pid=3611 comm="syz.2.38" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 44.394417][ T29] audit: type=1400 audit(1760126747.044:951): avc: denied { ioctl } for pid=3614 comm="syz.1.40" path="socket:[4854]" dev="sockfs" ino=4854 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 44.438002][ T29] audit: type=1400 audit(1760126747.104:952): avc: denied { read } for pid=3611 comm=77DEA305FF07 dev="nsfs" ino=4026532393 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 44.459152][ T29] audit: type=1400 audit(1760126747.104:953): avc: denied { open } for pid=3611 comm=77DEA305FF07 path="net:[4026532393]" dev="nsfs" ino=4026532393 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 44.482663][ T29] audit: type=1400 audit(1760126747.104:954): avc: denied { create } for pid=3611 comm=77DEA305FF07 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 44.503766][ T29] audit: type=1326 audit(1760126747.164:955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3615 comm="syz.4.41" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f68364deec9 code=0x0 [ 44.528405][ T3616] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.535816][ T3616] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.580273][ T3616] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 44.596287][ T3616] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 44.641044][ T3572] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.654846][ T3314] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 44.664856][ T12] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.680318][ T12] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.693090][ T3572] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.716783][ T12] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.731311][ T29] audit: type=1400 audit(1760126747.404:956): avc: denied { read write } for pid=3621 comm="syz.2.42" name="uhid" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 44.755242][ T12] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.774905][ T3626] netlink: 14 bytes leftover after parsing attributes in process `syz.1.44'. [ 44.786017][ T3572] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.799474][ T3626] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 44.810446][ T3626] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 44.819585][ T3626] bond0 (unregistering): Released all slaves [ 44.835026][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 44.835749][ T10] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 44.862642][ T57] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.882422][ T57] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.882553][ T57] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.882597][ T57] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 44.939064][ T3637] usb usb1: check_ctrlrecip: process 3637 (syz.0.45) requesting ep 01 but needs 81 [ 44.939102][ T3637] usb usb1: usbfs: process 3637 (syz.0.45) did not claim interface 0 before use [ 45.064604][ T3653] netlink: 8 bytes leftover after parsing attributes in process `syz.3.50'. [ 45.337048][ T3663] loop3: detected capacity change from 0 to 128 [ 45.833611][ T3669] netlink: 12 bytes leftover after parsing attributes in process `syz.2.56'. [ 46.125455][ T3669] netlink: 12 bytes leftover after parsing attributes in process `syz.2.56'. [ 46.206934][ T3669] netlink: 12 bytes leftover after parsing attributes in process `syz.2.56'. [ 46.817697][ T3690] IPv6: Can't replace route, no match found [ 47.024093][ T3702] usb usb1: check_ctrlrecip: process 3702 (syz.2.66) requesting ep 01 but needs 81 [ 47.033615][ T3702] usb usb1: usbfs: process 3702 (syz.2.66) did not claim interface 0 before use [ 47.080600][ T3699] netlink: 'syz.0.76': attribute type 1 has an invalid length. [ 47.088222][ T3699] netlink: 224 bytes leftover after parsing attributes in process `syz.0.76'. [ 47.182546][ T3705] loop2: detected capacity change from 0 to 1024 [ 47.196405][ T3705] EXT4-fs: Ignoring removed orlov option [ 47.219210][ T3705] ext4: Unknown parameter 'obj_type' [ 47.545565][ T3679] syz.4.58 (3679) used greatest stack depth: 10160 bytes left [ 47.565918][ T3707] hub 6-0:1.0: USB hub found [ 47.574415][ T3707] hub 6-0:1.0: 8 ports detected [ 48.058625][ T3722] loop4: detected capacity change from 0 to 128 [ 48.204845][ T3721] loop2: detected capacity change from 0 to 512 [ 48.240691][ T3725] netlink: 14 bytes leftover after parsing attributes in process `syz.0.74'. [ 48.253161][ T3721] EXT4-fs (loop2): The Hurd can't support 64-bit file systems [ 48.323477][ T3728] netlink: 64 bytes leftover after parsing attributes in process `+}[@'. [ 48.344408][ T3725] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 48.359468][ T3725] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 48.383340][ T3729] loop1: detected capacity change from 0 to 512 [ 48.391855][ T3725] bond0 (unregistering): Released all slaves [ 48.411666][ T3729] EXT4-fs: Ignoring removed orlov option [ 48.445743][ T3727] lo speed is unknown, defaulting to 1000 [ 48.458020][ T3729] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 48.500745][ T3729] ext4 filesystem being mounted at /12/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 48.553561][ T3728] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm +}[@: bg 0: block 328: padding at end of block bitmap is not set [ 49.057682][ T3312] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 49.703137][ T3752] usb usb1: check_ctrlrecip: process 3752 (syz.1.79) requesting ep 01 but needs 81 [ 49.712696][ T3752] usb usb1: usbfs: process 3752 (syz.1.79) did not claim interface 0 before use [ 49.724849][ T29] kauditd_printk_skb: 311 callbacks suppressed [ 49.724869][ T29] audit: type=1326 audit(1760126752.394:1268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3753 comm="syz.4.80" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68364deec9 code=0x7ffc0000 [ 49.757939][ T29] audit: type=1326 audit(1760126752.394:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3753 comm="syz.4.80" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68364deec9 code=0x7ffc0000 [ 49.795981][ T29] audit: type=1326 audit(1760126752.464:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3753 comm="syz.4.80" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68364deec9 code=0x7ffc0000 [ 49.802061][ T3754] netlink: 'syz.4.80': attribute type 1 has an invalid length. [ 49.802122][ T3754] netlink: 224 bytes leftover after parsing attributes in process `syz.4.80'. [ 49.829918][ T3763] netlink: 'syz.3.83': attribute type 30 has an invalid length. [ 49.840584][ T29] audit: type=1326 audit(1760126752.464:1271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3753 comm="syz.4.80" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68364deec9 code=0x7ffc0000 [ 49.908564][ T29] audit: type=1326 audit(1760126752.464:1272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3753 comm="syz.4.80" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68364deec9 code=0x7ffc0000 [ 49.931906][ T29] audit: type=1326 audit(1760126752.464:1273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3753 comm="syz.4.80" exe="/root/syz-executor" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f68364deec9 code=0x7ffc0000 [ 49.955533][ T29] audit: type=1326 audit(1760126752.464:1274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3753 comm="syz.4.80" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68364deec9 code=0x7ffc0000 [ 49.978897][ T29] audit: type=1326 audit(1760126752.464:1275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3753 comm="syz.4.80" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f68364deec9 code=0x7ffc0000 [ 50.002127][ T29] audit: type=1326 audit(1760126752.464:1276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3753 comm="syz.4.80" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68364deec9 code=0x7ffc0000 [ 50.025618][ T29] audit: type=1326 audit(1760126752.464:1277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3753 comm="syz.4.80" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f68364deec9 code=0x7ffc0000 [ 50.056277][ T3762] netlink: 40 bytes leftover after parsing attributes in process `syz.1.85'. [ 50.219443][ T3780] tipc: Started in network mode [ 50.224724][ T3780] tipc: Node identity fac43b8daf5e, cluster identity 4711 [ 50.232290][ T3780] tipc: Enabled bearer , priority 0 [ 50.256288][ T3772] lo speed is unknown, defaulting to 1000 [ 50.276315][ T3782] syzkaller0: entered promiscuous mode [ 50.281850][ T3782] syzkaller0: entered allmulticast mode [ 50.326857][ T3780] tipc: Resetting bearer [ 50.413340][ T3784] lo speed is unknown, defaulting to 1000 [ 50.721147][ T3779] tipc: Resetting bearer [ 50.749630][ T3779] tipc: Disabling bearer [ 51.536403][ T3789] tipc: New replicast peer: 255.255.255.255 [ 51.543169][ T3789] tipc: Enabled bearer , priority 10 [ 51.909175][ T3796] loop3: detected capacity change from 0 to 512 [ 51.935870][ T3796] EXT4-fs: Ignoring removed mblk_io_submit option [ 51.980365][ T3796] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 52.021323][ T3796] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a002c119, mo2=0082] [ 52.050060][ T3796] System zones: 1-12 [ 52.065241][ T3796] EXT4-fs (loop3): 1 truncate cleaned up [ 52.085041][ T3796] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 52.210434][ T3319] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 52.662242][ T3420] tipc: Node number set to 1436171149 [ 52.710171][ T3807] netlink: 'syz.3.101': attribute type 2 has an invalid length. [ 52.748518][ T3807] netlink: 4856 bytes leftover after parsing attributes in process `syz.3.101'. [ 53.017928][ T3826] loop3: detected capacity change from 0 to 1024 [ 53.018633][ T3826] EXT4-fs: Ignoring removed orlov option [ 53.036198][ T3826] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 53.121126][ T3319] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 53.400081][ T3846] mmap: syz.3.108 (3846) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 53.583400][ T3851] loop0: detected capacity change from 0 to 128 [ 53.584409][ T3851] FAT-fs (loop0): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 53.587096][ T3851] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 53.627569][ T3851] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 53.627599][ T3851] FAT-fs (loop0): Filesystem has been set read-only [ 53.855052][ T3859] bridge_slave_0: left allmulticast mode [ 53.860994][ T3859] bridge_slave_0: left promiscuous mode [ 53.866747][ T3859] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.895971][ T3859] bridge_slave_1: left allmulticast mode [ 53.901700][ T3859] bridge_slave_1: left promiscuous mode [ 53.907493][ T3859] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.951029][ T3862] netlink: 'syz.1.113': attribute type 10 has an invalid length. [ 53.958807][ T3862] netlink: 40 bytes leftover after parsing attributes in process `syz.1.113'. [ 53.982154][ T3859] team0: Port device team_slave_0 removed [ 54.000520][ T3859] team0: Port device team_slave_1 removed [ 54.009416][ T3859] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 54.045214][ T3859] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 54.065802][ T3859] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 54.093686][ T3862] veth1_vlan: left promiscuous mode [ 54.107601][ T3862] batman_adv: batadv0: Adding interface: veth1_vlan [ 54.114311][ T3862] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 54.168767][ T3862] batman_adv: batadv0: Interface activated: veth1_vlan [ 54.330235][ T3866] loop1: detected capacity change from 0 to 128 [ 54.359683][ T3866] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 54.386793][ T3866] ext4 filesystem being mounted at /19/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 54.535209][ T3312] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 54.615921][ T3880] netlink: 'wÞ£ÿ': attribute type 13 has an invalid length. [ 54.632072][ T3881] netlink: 3 bytes leftover after parsing attributes in process `syz.3.121'. [ 54.700908][ T3884] netlink: 20 bytes leftover after parsing attributes in process `syz.0.120'. [ 54.769913][ T3880] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.794533][ T3880] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 54.822059][ T3881] 0ªX¹¦À: renamed from caif0 [ 54.829770][ T3881] 0ªX¹¦À: entered allmulticast mode [ 54.835052][ T3881] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 54.874140][ T3884] loop0: detected capacity change from 0 to 8192 [ 54.966252][ T29] kauditd_printk_skb: 122 callbacks suppressed [ 54.966267][ T29] audit: type=1326 audit(1760126757.634:1400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3876 comm="syz.0.120" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff67a9ceec9 code=0x7ffc0000 [ 55.034019][ T29] audit: type=1326 audit(1760126757.664:1401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3876 comm="syz.0.120" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff67a9ceec9 code=0x7ffc0000 [ 55.057614][ T29] audit: type=1326 audit(1760126757.674:1402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3876 comm="syz.0.120" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff67a9ceec9 code=0x7ffc0000 [ 55.081136][ T29] audit: type=1326 audit(1760126757.674:1403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3876 comm="syz.0.120" exe="/root/syz-executor" sig=0 arch=c000003e syscall=310 compat=0 ip=0x7ff67a9ceec9 code=0x7ffc0000 [ 55.104570][ T29] audit: type=1326 audit(1760126757.674:1404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3876 comm="syz.0.120" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff67a9ceec9 code=0x7ffc0000 [ 55.127947][ T29] audit: type=1326 audit(1760126757.674:1405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3876 comm="syz.0.120" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff67a9ceec9 code=0x7ffc0000 [ 55.219147][ T3889] lo speed is unknown, defaulting to 1000 [ 55.455444][ T3891] SELinux: Context system_u:object_r:net_conf_t:s0 is not valid (left unmapped). [ 55.519082][ T3891] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 55.855485][ T29] audit: type=1400 audit(1760126758.124:1406): avc: denied { relabelfrom } for pid=3890 comm="syz.3.123" name="NETLINK" dev="sockfs" ino=6129 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 55.879441][ T29] audit: type=1400 audit(1760126758.134:1407): avc: denied { relabelto } for pid=3890 comm="syz.3.123" name="NETLINK" dev="sockfs" ino=6129 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=netlink_audit_socket permissive=1 trawcon="system_u:object_r:net_conf_t:s0" [ 55.907477][ T29] audit: type=1400 audit(1760126758.524:1408): avc: denied { nlmsg_write } for pid=3893 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 56.074386][ T29] audit: type=1400 audit(1760126758.594:1409): avc: denied { create } for pid=3896 comm="syz.3.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 56.681766][ T3906] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.689120][ T3906] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.729713][ T3906] bridge0: entered allmulticast mode [ 56.773302][ T3906] bridge_slave_1: left allmulticast mode [ 56.779067][ T3906] bridge_slave_1: left promiscuous mode [ 56.784880][ T3906] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.848022][ T3906] bridge_slave_0: left allmulticast mode [ 56.854106][ T3906] bridge_slave_0: left promiscuous mode [ 56.860100][ T3906] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.320420][ T3916] loop2: detected capacity change from 0 to 2048 [ 57.338175][ T3916] EXT4-fs: Ignoring removed bh option [ 57.596155][ T3925] netlink: 4 bytes leftover after parsing attributes in process `syz.1.134'. [ 57.605853][ T37] Bluetooth: hci0: Frame reassembly failed (-84) [ 57.612550][ T3926] Bluetooth: hci0: Malformed Event: 0x02 [ 57.662021][ T3925] batman_adv: batadv0: Interface deactivated: veth1_vlan [ 57.669119][ T3925] batman_adv: batadv0: Removing interface: veth1_vlan [ 57.910358][ T3919] netlink: 88 bytes leftover after parsing attributes in process `syz.3.133'. [ 58.340925][ T3916] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 58.370286][ T3916] netlink: 4 bytes leftover after parsing attributes in process `syz.2.131'. [ 58.382300][ T3936] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 58.395014][ T3936] netlink: 36 bytes leftover after parsing attributes in process `syz.3.136'. [ 58.634574][ T3314] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 58.670807][ T3938] ªªªªªªÿÿòÿÿÿòÿÿ: renamed from wg2 (while UP) [ 59.114290][ T3940] netlink: 8 bytes leftover after parsing attributes in process `syz.3.140'. [ 59.269874][ T3943] lo speed is unknown, defaulting to 1000 [ 59.485897][ T3946] bond1: entered promiscuous mode [ 59.491121][ T3946] bond1: entered allmulticast mode [ 59.496740][ T3946] 8021q: adding VLAN 0 to HW filter on device bond1 [ 59.519403][ T3946] bond1 (unregistering): Released all slaves [ 59.610997][ T3543] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 63.490902][ T29] kauditd_printk_skb: 61 callbacks suppressed [ 63.490924][ T29] audit: type=1326 audit(1760126766.164:1471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.3.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 63.521150][ T3965] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'filter' [ 63.547780][ T29] audit: type=1326 audit(1760126766.164:1472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.3.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 63.571098][ T29] audit: type=1326 audit(1760126766.164:1473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.3.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 63.594573][ T29] audit: type=1326 audit(1760126766.164:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.3.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 63.617951][ T29] audit: type=1326 audit(1760126766.164:1475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.3.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 63.641456][ T29] audit: type=1326 audit(1760126766.164:1476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.3.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 63.664850][ T29] audit: type=1326 audit(1760126766.164:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.3.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 63.688314][ T29] audit: type=1326 audit(1760126766.164:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.3.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 63.711857][ T29] audit: type=1326 audit(1760126766.164:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.3.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 63.735284][ T29] audit: type=1326 audit(1760126766.164:1480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.3.147" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 64.118620][ T3990] loop1: detected capacity change from 0 to 8192 [ 64.133063][ T3991] lo speed is unknown, defaulting to 1000 [ 65.256686][ T3998] netlink: 'syz.1.157': attribute type 12 has an invalid length. [ 65.503565][ T3973] netlink: 24 bytes leftover after parsing attributes in process `+}[@'. [ 66.376928][ T4009] loop2: detected capacity change from 0 to 512 [ 66.439113][ T4010] netlink: 4 bytes leftover after parsing attributes in process `syz.0.159'. [ 66.449214][ T4010] netlink: 4 bytes leftover after parsing attributes in process `syz.0.159'. [ 66.464962][ T4009] EXT4-fs: Ignoring removed i_version option [ 66.591044][ T4009] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 67.010632][ T3314] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 67.230950][ T4015] netlink: 60 bytes leftover after parsing attributes in process `syz.1.162'. [ 67.733799][ T4023] netlink: 12 bytes leftover after parsing attributes in process `syz.2.165'. [ 67.891620][ T4027] netlink: 12 bytes leftover after parsing attributes in process `syz.1.167'. [ 67.933423][ T4027] netlink: 52 bytes leftover after parsing attributes in process `syz.1.167'. [ 68.153881][ T4033] loop1: detected capacity change from 0 to 128 [ 68.262607][ T4034] syz.1.170: attempt to access beyond end of device [ 68.262607][ T4034] loop1: rw=2049, sector=145, nr_sectors = 16 limit=128 [ 68.276316][ T4034] syz.1.170: attempt to access beyond end of device [ 68.276316][ T4034] loop1: rw=2049, sector=169, nr_sectors = 8 limit=128 [ 68.380148][ T4034] syz.1.170: attempt to access beyond end of device [ 68.380148][ T4034] loop1: rw=2049, sector=185, nr_sectors = 8 limit=128 [ 68.552408][ T4036] loop1: detected capacity change from 0 to 128 [ 68.580913][ T4039] netlink: 8 bytes leftover after parsing attributes in process `syz.0.172'. [ 68.607585][ T4036] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 68.634590][ T4036] ext4 filesystem being mounted at /36/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 68.742742][ T3312] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 68.832364][ T29] kauditd_printk_skb: 165 callbacks suppressed [ 68.832381][ T29] audit: type=1400 audit(1760126771.504:1646): avc: denied { read } for pid=4045 comm="syz.0.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 68.873401][ T4043] loop2: detected capacity change from 0 to 8192 [ 69.076218][ T29] audit: type=1400 audit(1760126771.744:1647): avc: denied { execute } for pid=4049 comm="syz.1.176" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=7350 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 69.162780][ T4048] lo speed is unknown, defaulting to 1000 [ 69.304048][ T29] audit: type=1400 audit(1760126771.974:1648): avc: denied { read } for pid=4056 comm="syz.1.177" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 69.327137][ T29] audit: type=1400 audit(1760126771.974:1649): avc: denied { open } for pid=4056 comm="syz.1.177" path="/dev/snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 69.860341][ T4064] netlink: 8 bytes leftover after parsing attributes in process `syz.0.179'. [ 69.869166][ T4064] netlink: 8 bytes leftover after parsing attributes in process `syz.0.179'. [ 69.994055][ T4068] capability: warning: `syz.2.178' uses deprecated v2 capabilities in a way that may be insecure [ 70.040052][ T29] audit: type=1326 audit(1760126772.694:1650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4069 comm="syz.0.180" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7ff67a9ceec9 code=0x0 [ 70.075820][ T4071] netlink: 'syz.0.180': attribute type 10 has an invalid length. [ 70.218786][ T29] audit: type=1400 audit(1760126772.884:1651): avc: denied { connect } for pid=4072 comm="syz.2.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 70.317473][ T4073] infiniband syz!: set active [ 70.322228][ T4073] infiniband syz!: added team_slave_0 [ 70.337455][ T4073] RDS/IB: syz!: added [ 70.621038][ T4077] bond0: (slave veth1_to_bond): Error: Device can not be enslaved while up [ 70.669964][ T29] audit: type=1326 audit(1760126773.314:1652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4076 comm="syz.2.182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9349ceec9 code=0x7ffc0000 [ 70.693802][ T29] audit: type=1326 audit(1760126773.314:1653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4076 comm="syz.2.182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=194 compat=0 ip=0x7fb9349ceec9 code=0x7ffc0000 [ 70.717609][ T29] audit: type=1326 audit(1760126773.314:1654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4076 comm="syz.2.182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9349ceec9 code=0x7ffc0000 [ 70.741825][ T29] audit: type=1326 audit(1760126773.314:1655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4076 comm="syz.2.182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9349ceec9 code=0x7ffc0000 [ 70.922550][ T4082] loop2: detected capacity change from 0 to 512 [ 70.966738][ T4082] EXT4-fs: Ignoring removed bh option [ 70.990210][ T4082] EXT4-fs: Ignoring removed mblk_io_submit option [ 71.003015][ T4082] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 71.030749][ T4082] EXT4-fs (loop2): revision level too high, forcing read-only mode [ 71.041344][ T4084] netlink: 4 bytes leftover after parsing attributes in process `syz.0.185'. [ 71.050548][ T4082] EXT4-fs (loop2): orphan cleanup on readonly fs [ 71.060116][ T4084] veth0_macvtap: left promiscuous mode [ 71.070844][ T4082] EXT4-fs error (device loop2): ext4_acquire_dquot:6945: comm syz.2.183: Failed to acquire dquot type 1 [ 71.090322][ T4082] EXT4-fs error (device loop2): ext4_read_block_bitmap_nowait:483: comm syz.2.183: Invalid block bitmap block 0 in block_group 0 [ 71.203573][ T4082] EXT4-fs error (device loop2): ext4_read_block_bitmap_nowait:483: comm syz.2.183: Invalid block bitmap block 0 in block_group 0 [ 71.226859][ T4082] EXT4-fs error (device loop2): ext4_read_block_bitmap_nowait:483: comm syz.2.183: Invalid block bitmap block 0 in block_group 0 [ 71.263663][ T4082] EXT4-fs error (device loop2): ext4_acquire_dquot:6945: comm syz.2.183: Failed to acquire dquot type 1 [ 71.287406][ T4082] EXT4-fs error (device loop2): ext4_acquire_dquot:6945: comm syz.2.183: Failed to acquire dquot type 1 [ 71.305266][ T4082] EXT4-fs (loop2): 1 orphan inode deleted [ 71.312164][ T4082] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 71.389447][ T4092] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.470747][ T4092] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.526110][ T4092] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.539599][ T4082] syz.2.183 (4082) used greatest stack depth: 8992 bytes left [ 71.550150][ T3314] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 71.618548][ T4092] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.710808][ T37] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.722255][ T4101] loop2: detected capacity change from 0 to 512 [ 71.738986][ T4101] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 71.749846][ T37] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.774301][ T37] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.803598][ T4101] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2853: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 71.816738][ T12] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.870659][ T4101] EXT4-fs (loop2): 1 truncate cleaned up [ 71.877097][ T4101] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 71.905924][ T4112] hsr0: entered promiscuous mode [ 71.922084][ T4112] netlink: 4 bytes leftover after parsing attributes in process `syz.0.195'. [ 71.999047][ T4112] hsr_slave_0: left promiscuous mode [ 72.022590][ T4112] hsr_slave_1: left promiscuous mode [ 72.056469][ T4112] hsr0 (unregistering): left promiscuous mode [ 72.084666][ T3314] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 72.392522][ T4123] lo speed is unknown, defaulting to 1000 [ 73.739376][ T4110] syz.3.194 (4110) used greatest stack depth: 6312 bytes left [ 73.832787][ T4128] tipc: Enabling of bearer rejected, failed to enable media [ 74.127851][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 74.127869][ T29] audit: type=1400 audit(1760126776.794:1674): avc: denied { getopt } for pid=4132 comm="syz.4.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 74.389032][ T29] audit: type=1326 audit(1760126777.054:1675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4140 comm="syz.3.202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 74.434644][ T4142] sctp: [Deprecated]: syz.2.201 (pid 4142) Use of int in max_burst socket option deprecated. [ 74.434644][ T4142] Use struct sctp_assoc_value instead [ 74.435508][ T29] audit: type=1326 audit(1760126777.084:1676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4140 comm="syz.3.202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=435 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 74.473616][ T29] audit: type=1326 audit(1760126777.094:1677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4140 comm="syz.3.202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 74.497464][ T29] audit: type=1326 audit(1760126777.104:1678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4140 comm="syz.3.202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 74.520970][ T29] audit: type=1400 audit(1760126777.104:1679): avc: denied { shutdown } for pid=4138 comm="syz.2.201" lport=58363 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 74.573459][ T4142] netlink: 'syz.2.201': attribute type 10 has an invalid length. [ 74.592352][ T29] audit: type=1326 audit(1760126777.144:1680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4140 comm="syz.3.202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 74.615977][ T29] audit: type=1326 audit(1760126777.144:1681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4140 comm="syz.3.202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 74.621177][ T4142] team0: Port device dummy0 added [ 74.639473][ T29] audit: type=1326 audit(1760126777.144:1682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4140 comm="syz.3.202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 74.649425][ T4150] netlink: 'syz.2.201': attribute type 10 has an invalid length. [ 74.667799][ T29] audit: type=1326 audit(1760126777.144:1683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4140 comm="syz.3.202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=10 compat=0 ip=0x7fe028e5eec9 code=0x7ffc0000 [ 74.702187][ T4150] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 74.711169][ T4151] netlink: 'syz.4.205': attribute type 10 has an invalid length. [ 74.726716][ T4150] team0: Failed to send options change via netlink (err -105) [ 74.735038][ T4150] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 74.744324][ T4150] team0: Port device dummy0 removed [ 74.752517][ T4150] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 75.442730][ T4260] loop4: detected capacity change from 0 to 512 [ 76.675372][ T4315] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 76.684188][ T4315] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 76.779254][ T4316] lo speed is unknown, defaulting to 1000 [ 78.789855][ T4323] vlan2: entered promiscuous mode [ 78.795137][ T4323] vlan2: entered allmulticast mode [ 78.800375][ T4323] hsr_slave_1: entered allmulticast mode [ 78.871122][ T4327] loop2: detected capacity change from 0 to 512 [ 78.909945][ T4327] EXT4-fs (loop2): The Hurd can't support 64-bit file systems [ 78.969410][ T4321] lo speed is unknown, defaulting to 1000 [ 79.798787][ T4323] netlink: 4 bytes leftover after parsing attributes in process `syz.2.218'. [ 80.034948][ T4335] loop1: detected capacity change from 0 to 764 [ 80.053036][ T4335] rock: corrupted directory entry. extent=32, offset=2044, size=237 [ 80.070478][ T29] kauditd_printk_skb: 62 callbacks suppressed [ 80.070495][ T29] audit: type=1400 audit(1760126782.744:1746): avc: denied { mount } for pid=4334 comm="syz.1.221" name="/" dev="loop1" ino=1792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 80.151217][ T4339] xt_CT: You must specify a L4 protocol and not use inversions on it [ 80.175373][ T4341] loop4: detected capacity change from 0 to 512 [ 80.221047][ T29] audit: type=1400 audit(1760126782.884:1747): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 80.377881][ T29] audit: type=1400 audit(1760126782.984:1748): avc: denied { read write } for pid=4347 comm="syz.1.223" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 80.402828][ T29] audit: type=1400 audit(1760126782.984:1749): avc: denied { open } for pid=4347 comm="syz.1.223" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 80.487757][ T4352] netlink: 'syz.1.223': attribute type 10 has an invalid length. [ 80.541818][ T4353] netlink: 'syz.1.223': attribute type 10 has an invalid length. [ 80.589526][ T4352] team0: Port device dummy0 added [ 80.625720][ T4353] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 80.688194][ T4353] team0: Port device dummy0 removed [ 80.821153][ T29] audit: type=1400 audit(1760126783.284:1750): avc: denied { ioctl } for pid=4347 comm="syz.1.223" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 80.952050][ T29] audit: type=1326 audit(1760126783.624:1751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4355 comm="syz.1.226" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a5f65eec9 code=0x7ffc0000 [ 80.975796][ T29] audit: type=1326 audit(1760126783.624:1752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4355 comm="syz.1.226" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a5f65eec9 code=0x7ffc0000 [ 80.999205][ T29] audit: type=1326 audit(1760126783.624:1753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4355 comm="syz.1.226" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a5f65eec9 code=0x7ffc0000 [ 81.022851][ T29] audit: type=1326 audit(1760126783.624:1754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4355 comm="syz.1.226" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a5f65eec9 code=0x7ffc0000 [ 81.058942][ T4341] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 81.110394][ T4341] ext4 filesystem being mounted at /24/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 81.300087][ T29] audit: type=1326 audit(1760126783.714:1755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4355 comm="syz.1.226" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7a5f65eec9 code=0x7ffc0000 [ 81.380008][ T4363] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 81.492226][ T3321] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 82.444543][ T4370] loop1: detected capacity change from 0 to 4096 [ 82.542632][ T4370] EXT4-fs: Ignoring removed nomblk_io_submit option [ 82.549402][ T4370] EXT4-fs: Ignoring removed i_version option [ 82.619013][ T4373] netlink: 8 bytes leftover after parsing attributes in process `syz.3.230'. [ 82.628075][ T4373] netlink: 8 bytes leftover after parsing attributes in process `syz.3.230'. [ 82.643847][ T4370] EXT4-fs error (device loop1): ext4_ext_check_inode:523: inode #4: comm syz.1.231: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 256(256) [ 82.675261][ T4377] netlink: 14 bytes leftover after parsing attributes in process `syz.0.232'. [ 82.687023][ T4370] EXT4-fs error (device loop1): ext4_quota_enable:7139: comm syz.1.231: Bad quota inode: 4, type: 1 [ 82.861579][ T4370] EXT4-fs warning (device loop1): ext4_enable_quotas:7180: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 82.880968][ T4370] EXT4-fs (loop1): mount failed [ 82.979805][ T4384] netlink: 16 bytes leftover after parsing attributes in process `syz.4.235'. [ 83.616104][ T4394] loop4: detected capacity change from 0 to 1024 [ 83.642797][ T4394] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 83.670028][ T4394] netlink: 8 bytes leftover after parsing attributes in process `syz.4.240'. [ 83.680884][ T4399] loop1: detected capacity change from 0 to 512 [ 83.692409][ T4399] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 83.712787][ T4399] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 83.728363][ T3321] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 83.733209][ T4399] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 83.903934][ T4412] loop0: detected capacity change from 0 to 512 [ 83.963624][ T4405] loop1: detected capacity change from 0 to 8192 [ 84.088675][ T4416] netlink: 4 bytes leftover after parsing attributes in process `syz.4.246'. [ 84.098735][ T4416] veth1_macvtap: left promiscuous mode [ 84.377227][ T4426] loop0: detected capacity change from 0 to 2048 [ 84.467755][ T4428] ip6tnl0: entered promiscuous mode [ 84.473132][ T4428] ip6tnl0: entered allmulticast mode [ 84.601959][ T57] ================================================================== [ 84.610110][ T57] BUG: KCSAN: data-race in copy_folio_from_iter_atomic / fat16_ent_put [ 84.618560][ T57] [ 84.620931][ T57] write to 0xffff888126fad784 of 2 bytes by task 4414 on cpu 1: [ 84.628612][ T57] fat16_ent_put+0x28/0x60 [ 84.633053][ T57] fat_alloc_clusters+0x4ce/0xa80 [ 84.638187][ T57] fat_get_block+0x258/0x5e0 [ 84.642797][ T57] __block_write_begin_int+0x3fd/0xf90 [ 84.648330][ T57] cont_write_begin+0x5fc/0x970 [ 84.653580][ T57] fat_write_begin+0x4f/0xe0 [ 84.658206][ T57] generic_perform_write+0x181/0x490 [ 84.663570][ T57] __generic_file_write_iter+0x9e/0x120 [ 84.669139][ T57] generic_file_write_iter+0x8d/0x2f0 [ 84.674543][ T57] do_iter_readv_writev+0x49e/0x540 [ 84.679773][ T57] vfs_writev+0x2df/0x8b0 [ 84.684136][ T57] __se_sys_pwritev2+0xfc/0x1c0 [ 84.689011][ T57] __x64_sys_pwritev2+0x67/0x80 [ 84.693898][ T57] x64_sys_call+0x2c59/0x3000 [ 84.698637][ T57] do_syscall_64+0xd2/0x200 [ 84.703170][ T57] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 84.709101][ T57] [ 84.711433][ T57] read to 0xffff888126fad600 of 512 bytes by task 57 on cpu 0: [ 84.718986][ T57] copy_folio_from_iter_atomic+0x7fc/0x11b0 [ 84.724907][ T57] generic_perform_write+0x2c2/0x490 [ 84.730234][ T57] shmem_file_write_iter+0xc5/0xf0 [ 84.735367][ T57] lo_rw_aio+0x69d/0x760 [ 84.739659][ T57] loop_process_work+0x52d/0xa60 [ 84.744640][ T57] loop_workfn+0x31/0x40 [ 84.748911][ T57] process_scheduled_works+0x4cb/0x9d0 [ 84.754396][ T57] worker_thread+0x582/0x770 [ 84.759006][ T57] kthread+0x486/0x510 [ 84.763097][ T57] ret_from_fork+0x122/0x1b0 [ 84.767703][ T57] ret_from_fork_asm+0x1a/0x30 [ 84.772486][ T57] [ 84.774814][ T57] Reported by Kernel Concurrency Sanitizer on: [ 84.781003][ T57] CPU: 0 UID: 0 PID: 57 Comm: kworker/u8:4 Not tainted syzkaller #0 PREEMPT(voluntary) [ 84.790733][ T57] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 84.800800][ T57] Workqueue: loop1 loop_workfn [ 84.805583][ T57] ==================================================================