last executing test programs: 8.591404196s ago: executing program 1 (id=30): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x4}, 0x18) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r2, 0x84, 0x81, &(0x7f0000000280)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYRES8=r2], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000006c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="04f7659ce6cddb4107baf96f66ef713c1c20e416ab7858b3c5c00f44b1ac43f362b9287fff497992cf8555a14645f7e977a30bf43a00c1d68dfedea05934babe2061f7e0eb442a9bdb9276a3a417fd18fc077dafe984b3ab65fd9d024135ef4fe84951c4505fdb59ac7dd031d739e39760989085731b469bff7b219e44c22644747d01519a656745b5a9df2a54880eaf8538c4ed4c54698aa5297c30f247d297446adbe06ddb20f163e8de428315cae4630668ccdd0c733bc9"], 0x9) r4 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d530494c) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x13, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESHEX, @ANYRES64=r3], 0x0, 0x0, 0xffffffffffffff17, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) stat(0x0, 0x0) quotactl_fd$Q_GETINFO(r4, 0xffffffff00000a05, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64, @ANYBLOB="0000040000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb203000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000002c0)='rpm_return_int\x00', r6}, 0x10) syz_open_dev$usbfs(&(0x7f0000000040), 0xf, 0xc340) quotactl$Q_QUOTAON(0xffffffff80000202, &(0x7f0000000380)=@filename='./file0\x00', 0x0, &(0x7f0000000180)='./file0\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000380)={0x0, 0x6}, 0x8) sendmsg$nl_xfrm(r1, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000240)=ANY=[@ANYBLOB="240100001600010428bd700000000000fe8000000000000000000000000000bbfc01000000000000000000000000000100040000000000000000a00000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="ff02000000000000000000000000000100000000330000000a0101010000000000000000000000000000000000004e340100000000000000000000000000000004000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000a0000002bbd70000000000000000200000000000000000008000020ffffffdf2c0027cc"], 0x124}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050079102800000000001e500000000000009500"/32], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) sendmsg$nl_route(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000200)=ANY=[@ANYBLOB="440000001800010029bd7000fddbdf251d01010015000100040000a00401000073a8ac5dec6191140400000015000200010000e008011fd30527369d6478c9fa1f00809a"], 0x44}, 0x1, 0x0, 0x0, 0x91}, 0x8010) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r9, &(0x7f00000bd000), 0x492492492492846, 0x0) unshare(0x22020400) ppoll(&(0x7f00000000c0)=[{r9, 0x200}], 0x1, 0x0, 0x0, 0x0) connect$unix(r8, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) add_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='9', 0x1, 0xfffffffffffffffc) 7.607002805s ago: executing program 1 (id=36): mkdir(&(0x7f0000000580)='./file0\x00', 0x92) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0x100080c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x40}, 0x18) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004055}, 0xc00c880) socket$kcm(0x2, 0x5, 0x84) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="50000000090601020000000000000000020000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) r6 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$selinux_access(r6, &(0x7f00000004c0)=ANY=[], 0x56) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00'}, 0x10) sendmsg$NFT_BATCH(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f687372"], 0xfc}}, 0x0) faccessat2(0xffffffffffffffff, 0x0, 0x2, 0x1200) ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, &(0x7f0000000400)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x43, &(0x7f0000000080)={0x0, 0x2710}, 0x10) lsetxattr$security_selinux(&(0x7f0000000400)='./file0\x00', &(0x7f0000000000), &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x22, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) 7.349460469s ago: executing program 1 (id=39): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) fcntl$lock(r0, 0x7, &(0x7f0000000280)={0x1, 0x0, 0x2f, 0x9}) fcntl$lock(r0, 0x7, &(0x7f00000000c0)={0x0, 0x2, 0x7, 0x401}) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000008c0)={'\x00', 0x3e, 0x0, 0xde1}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0xc, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x109) pwrite64(r2, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) lseek(r2, 0x5, 0x4) r3 = getuid() mount$9p_fd(0x0, &(0x7f0000000280)='./file2\x00', &(0x7f0000000300), 0x800000, &(0x7f0000000640)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733d757365722c636163e8653d7265616461686561642c6d73697a653d3078303030303030303030303030666632332c756e616d653d6e656967685f757064617465002c63616368653d7265616461686561642c63616368657461673d6b6d656d5f63616368655f66726565002c66756e633d4d4f44554c455f434845434b2c7365636c6162656c2c736d61636b6673726f6f743d7d272e267d5b2c7065726d69745f646972656374696f2c6673757569643d32363900653639c22d626638372d5e3652332d363938332d38656515666434322c657569643c", @ANYRESDEC=r3, @ANYBLOB]) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000940)={{{@in6, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000a40)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x340800, &(0x7f0000000a80)={[], [{@euid_lt={'euid<', r3}}, {@euid_gt={'euid>', r4}}]}, 0x1, 0x512, &(0x7f0000000380)="$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") r5 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r5, &(0x7f0000000400), 0x10) setsockopt$CAN_RAW_FILTER(r5, 0x65, 0x1, &(0x7f00000000c0), 0xf00) setsockopt$CAN_RAW_FILTER(r5, 0x65, 0x1, 0x0, 0x0) r6 = fsopen(&(0x7f0000000000)='cgroup\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r6, 0x1, &(0x7f0000000080)='name', &(0x7f00000000c0)='\x00\x1f\"\f\x00\x00\"\x00\x04\x00\x00', 0x0) readv(r6, &(0x7f0000000040)=[{&(0x7f0000002300)=""/4077, 0xfed}], 0x1) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002a00000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r7, 0x0, 0x2}, 0x18) r8 = socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc3c0000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a3100000000100003800c00008008000340000000022c0000000e0a010200000000000000000a0000000900010073797a31000000000900020073797a31"], 0xcc}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) bind$can_raw(r8, &(0x7f00000001c0)={0x1d, r10}, 0x10) bind$can_raw(r8, &(0x7f0000000000), 0x10) 6.405616378s ago: executing program 1 (id=42): r0 = creat(&(0x7f0000000240)='./file0\x00', 0x103) dup2(r0, r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x4, &(0x7f0000006680)) r1 = gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000d900000000000000", @ANYRES32, @ANYBLOB="000000009cb9ecb38e156102989411c3910000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000400000000000000010000008e", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r3}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000100000000000000", @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB="19"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000400, &(0x7f0000000080), 0xbe, 0x7c0, &(0x7f0000000f80)="$eJzs3c9rG9kdAPDvyJZ/Ja1dKLTpyVBoDSFynbpJCz2k9FAKDQTacxMjKya1bAVLDrExJKEUeim0pYfC7iXn/ZG97XV/XHf/iz0sCdldx6yXPSxaRh7Zciw5dtaSDPl8YDzvvZnxe1+/mfGT3iAF8MqaTH/kIs5FxL+TiPGsPImIfCM1GHFlZ7/tzY1iuiRRr//586Sxz9bmRjFajkmdyTI/jogP/hFxPpcWjOyrt7q2vjhXLpdWsvx0ben2dHVt/cKtpbmF0kJp+dLM7OzFy7+6fOnkYv3y4/WzT/7zh5+/feXrv//o0b8+TOJKnM22tcZxUiZjMvub5NM/4T6/P+nK+izpdwN4KemlObBzlce5GI+BRqqD0V62DADolnsRUd8zVAcAXgFJ9LsFAEBvNd8H2NrcKDaX/r4j0VtPf7czNbmVzW1u78Y/mM3ZjTTmQce2kn0zI0lETJxA/ZMR8fq7f30zXaJL85AA7dx/EBE3JiYP3v+TA88sHNcvDttYH26sJp8rdv+D3nkvHf/8ut34L7c7/ok245/hNtfuy3jx9Z97fALVdJSO/37b8mzbdkv8mYmBLPe9xpgvn9y8VS6l97bvR8RU5IfT/Exj1/ZPQU09++ZZp/pbx39f/Pdvb6T1p+u9PXKPB4f3HzM/V5v7rnE3PX0Q8ZPBdvEnu/2fdBj/XjtiHX/8zT9f67QtjT+Nt7kcjL+76g8jfta2//f6Mjn0+cTpxukw3Twp2njnk/+Pdap/r/+HG+u0/uZrgV5I+3/s8PgnktbnNavHr+Ojh+Pvd9rWev63j7/9+T+U/KWRHsrK7s7VaiszEUPJnw6WX9w79m4+S2T7p/FP/bT99d/p/M9lz8be2M0dbvDJZ29lv6pt/A33O8XfXWn888fq/0MS9eyY5zY92l4c6FT/0fp/tpGaykqOcv97QUubiRd3HgAAAAAAAAAAAAAAAAAAAAAAAACcgFxEnI0kV9hN53KFws53eP8wxnLlSrV2/mZldXk+Gt+VPRH5XPOjLsdbPg91Jvs8/Gb+4nP5X0bEDyLif8OjjXyhWCnP9zt4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMic2f/9//fSVaGws+3T4X63DgDompF+NwAA6Dn//wHg1XO8//+jXWsHANA7x379X0+60xAAoGdGIn+0HW90uyUAQK+Y/wcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKDLrl29mi71rzY3iml+/s7a6mLlzoX5UnWxsLRaLBQrK7cLC5XKQrlUKFaWOv6i+zurcqVyezaWV+9O10rV2nR1bf36UmV1uXb91tLcQul6Kd+zyAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg6Kpr64tz5XJpReLQxOjpaMapSQzGqWjGiSXqAzvXw+loz2A0S4b61ozWu8Ron+5OAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKfftwEAAP//uwceNw==") mkdir(&(0x7f0000000000)='./control\x00', 0x81) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095", @ANYBLOB="2ecbb6d0e629feb8740e6f3e793baf4ce177d6e081443c86f577f4c18cd64e641c2694d88aba1d1829d501d6e5055e9b59f2f155946fd183decbe629e284bdfe04d88bed950fae69d0f0e0bf74d2dbb709f191f009a88b6381d84f28ada16ca4a3b4c31112b9b8544591d0e4", @ANYRES8, @ANYRESHEX, @ANYRESHEX=r5, @ANYRESHEX, @ANYRESDEC=r4, @ANYBLOB="8e4fbeb1b1a97c10c376633b6eea8c1a62f584668ea3dc69c079", @ANYBLOB="3a0264a3512cd27ab1d33557e81b8214ef2387b8c4e643fb14921672e0dadd6fe85a9cd208eada985385979cb3723df502399ec5e6f4fbcc95c4ce07ddbfa168feedd85cfde93f299d5655238119ee39c7570e8e7d7a403f68ef34e305eaca93ae2a544b821f7ba46680158820d8a79527eb5a56791c8c8613f3dd35b43973d0161820fe292b3663cd2d2ff29efad8b4707cbb3370215dbd836f0ca09dc6da3838a878dbeec497a204f458a52bbc78d66b13d19d7658bf4044a0c518f83d486c4ce48baa1557ed634abe3199b9454d4930683bccc2acd6e3e0dd", @ANYRESOCT=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000004c0)='kmem_cache_free\x00', r8}, 0x18) r9 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r9, &(0x7f0000000400)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x8) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x3) fcntl$setsig(r6, 0xa, 0x12) dup2(r6, r7) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0xf2de1000) fcntl$setown(r6, 0x8, r1) tkill(r1, 0x13) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018040000", @ANYRES32, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) r11 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2060, 0x0) fsetxattr$trusted_overlay_redirect(r11, &(0x7f0000000040), 0x0, 0x0, 0x0) fremovexattr(r11, &(0x7f00000000c0)=@known='trusted.overlay.redirect\x00') syz_emit_ethernet(0x2a, &(0x7f0000001f80)=ANY=[@ANYBLOB="0380c2001e00bbbbbbbbbbbb08004500001c0000000000019078ac1e0001ac1414aa0000907800670008"], 0x0) 4.22837255s ago: executing program 2 (id=60): mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x6, 0x42032, 0xffffffffffffffff, 0x80000000) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f0000000340)='9p\x00', 0x1840, &(0x7f00000003c0)='\xbe#\x0eS\xa9tWA\x11\x8aZyW\x9d\xd2\xad\xaf\xbcy\xe2@s\xe5Q\x9b\x10{Oh\xf8\x17\x98\x06\xb9 4\xb8M\xfcC\xd4\xfa\xa06:\xc98\xfa\xa7MX\xcef\xc1,z\xaa\x8b\x8c/\x05\x00\x00\x00\x06\x00\x00\x00\xb2S\xbf\xd8\f\x83\xda[F\xe0\xa7\xbf\xb3\xef\x1f\x9c\r\xcbwm\xa9U\xe3\x98\x9e:\xac\x1eJ\x99\xcd\xcf\xb4\x9f(1\x9c\xfa\xdc\xe4n|\x905\xf1\xe0\x9f\xf4\xc2,j\rC\xb9R\xdf\xf3\xbe3\xba\xf5\x04') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x1}, 0x1205, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000540)='cachefiles_trunc\x00', r0, 0x0, 0x10002}, 0x18) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000003e000701fcf7fffffedbdf25017c00000c0004"], 0x20}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a2, &(0x7f0000000000)='bridge0\x00') ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f00000000c0)={0x9, 0x1, 0x5, 0x7f, 0x4924924924925e5}) r2 = socket$nl_route(0x10, 0x3, 0x0) openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r3 = syz_io_uring_setup(0x38, &(0x7f0000000580)={0x0, 0xbbd7, 0x13500}, &(0x7f0000000240), &(0x7f0000000480)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r3, 0x21, &(0x7f0000000440), 0x1) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps\x00') preadv(r4, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}], 0x1, 0x5f0e, 0x2) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) 4.080351432s ago: executing program 0 (id=62): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) io_setup(0x27e, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'veth1\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xf, [0xa, 0x1, 0x7fff, 0x1, 0x4, 0x9, 0xa4, 0xffb, 0x7, 0xb69, 0xc1, 0x4, 0x1, 0x3, 0x5, 0x101, 0x65d, 0x9, 0x3, 0x3, 0x1, 0xfffffffa, 0x0, 0x6, 0x9, 0x4, 0x7, 0x1000005, 0x100000, 0x75f, 0x3, 0xd, 0xe, 0x2b12, 0x100, 0x6, 0x1c00, 0xfffffff9, 0x8, 0xbed4, 0x8, 0x8000100, 0x61, 0x0, 0x11000, 0x1008, 0x1, 0x79b, 0x2, 0x1, 0x7f, 0x4, 0x400, 0x7, 0xf, 0x101, 0xd7, 0x1fa0860a, 0x7, 0xaa, 0x81, 0x2, 0x180000, 0x4007, 0x8b, 0x5, 0x2af, 0xf7, 0x5, 0x2, 0x6, 0xb, 0x4, 0x7, 0x4009, 0x0, 0x5, 0x100002, 0x8, 0x752, 0x0, 0x3, 0x0, 0x10001, 0x82, 0xd, 0x6, 0x6, 0xa, 0x80000000, 0xfdffffff, 0x2, 0x2, 0x84, 0x100, 0x5, 0x252, 0x81, 0xb, 0x5, 0x20006, 0x5, 0x2, 0x15f, 0x84ac, 0xd9a, 0x5, 0x82a2, 0xfff, 0x3, 0x2, 0x5, 0x8, 0x0, 0x4, 0x2, 0x40, 0x8, 0x7, 0x4, 0x401, 0x66cd, 0x8, 0x8, 0x1, 0x1fc, 0xc5c, 0xffffffff]}}) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r3, 0x0, 0x200000000000006}, 0x18) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x88002, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) pwritev(r4, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000140)}], 0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x0, 0x0}) sysinfo(0x0) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x9c) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020073797a30000000000800410073697700140033006c6f"], 0xffaf}, 0x1, 0x0, 0x0, 0x854}, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x3) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r6, 0x40089413, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x94, 0x1) setresgid(0xee00, 0xee01, r7) setuid(0xee00) 3.994229344s ago: executing program 0 (id=63): mkdir(&(0x7f0000000580)='./file0\x00', 0x92) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0x100080c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x40}, 0x18) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004055}, 0xc00c880) socket$kcm(0x2, 0x5, 0x84) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="50000000090601020000000000000000020000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) r6 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$selinux_access(r6, &(0x7f00000004c0)=ANY=[], 0x56) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r7}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f687372"], 0xfc}}, 0x0) faccessat2(0xffffffffffffffff, 0x0, 0x2, 0x1200) ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, &(0x7f0000000400)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x43, &(0x7f0000000080)={0x0, 0x2710}, 0x10) lsetxattr$security_selinux(&(0x7f0000000400)='./file0\x00', &(0x7f0000000000), &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x22, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) 3.935964165s ago: executing program 0 (id=64): ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000000)={0x0, 0x37, "004f5db569dd696341c30aa7241b624abbfba9d66ad8177a7c45654a7a47d7ee2d126ef18c30f0c3e844eb55620121f1614f311d6f03da"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa33"], 0xfdef) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) getrlimit(0xc73be9cdcf0e8bf5, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0xf5ffffff, &(0x7f0000000000)='%', 0x0, 0xd01, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2, 0x31}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a9a4850000000400000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000e"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7030000ec000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) r3 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300", 0xffffffff}, 0x48, 0xffffffffffffffff) r4 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) r5 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "6075ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x4, r5, r4, r4, 0x0) keyctl$KEYCTL_MOVE(0x4, r3, r3, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r6}, &(0x7f0000000380), &(0x7f0000000ac0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYRESOCT=0x0], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x94) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000140), 0x1, 0x4fa, &(0x7f0000000ac0)="$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") r7 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$can_raw(0xffffffffffffffff, &(0x7f00000000c0)={0x1d, r8}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240), 0x208e24b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) 3.753075768s ago: executing program 2 (id=66): r0 = creat(&(0x7f0000000240)='./file0\x00', 0x103) dup2(r0, r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x4, &(0x7f0000006680)) r1 = gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000d900000000000000", @ANYRES32, @ANYBLOB="000000009cb9ecb38e156102989411c3910000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000400000000000000010000008e", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r3}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000100000000000000", @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB="19"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000400, &(0x7f0000000080), 0xbe, 0x7c0, &(0x7f0000000f80)="$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") mkdir(&(0x7f0000000000)='./control\x00', 0x81) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095", @ANYBLOB="2ecbb6d0e629feb8740e6f3e793baf4ce177d6e081443c86f577f4c18cd64e641c2694d88aba1d1829d501d6e5055e9b59f2f155946fd183decbe629e284bdfe04d88bed950fae69d0f0e0bf74d2dbb709f191f009a88b6381d84f28ada16ca4a3b4c31112b9b8544591d0e4", @ANYRES8, @ANYRESHEX, @ANYRESHEX=r5, @ANYRESHEX, @ANYRESDEC=r4, @ANYBLOB="8e4fbeb1b1a97c10c376633b6eea8c1a62f584668ea3dc69c079", @ANYBLOB="3a0264a3512cd27ab1d33557e81b8214ef2387b8c4e643fb14921672e0dadd6fe85a9cd208eada985385979cb3723df502399ec5e6f4fbcc95c4ce07ddbfa168feedd85cfde93f299d5655238119ee39c7570e8e7d7a403f68ef34e305eaca93ae2a544b821f7ba46680158820d8a79527eb5a56791c8c8613f3dd35b43973d0161820fe292b3663cd2d2ff29efad8b4707cbb3370215dbd836f0ca09dc6da3838a878dbeec497a204f458a52bbc78d66b13d19d7658bf4044a0c518f83d486c4ce48baa1557ed634abe3199b9454d4930683bccc2acd6e3e0dd", @ANYRESOCT=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000004c0)='kmem_cache_free\x00', r8}, 0x18) r9 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r9, &(0x7f0000000400)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x8) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x3) fcntl$setsig(r6, 0xa, 0x12) dup2(r6, r7) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0xf2de1000) fcntl$setown(r6, 0x8, r1) tkill(r1, 0x13) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018040000", @ANYRES32, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) r11 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2060, 0x0) fsetxattr$trusted_overlay_redirect(r11, &(0x7f0000000040), 0x0, 0x0, 0x0) fremovexattr(r11, &(0x7f00000000c0)=@known='trusted.overlay.redirect\x00') syz_emit_ethernet(0x2a, &(0x7f0000001f80)=ANY=[@ANYBLOB="0380c2001e00bbbbbbbbbbbb08004500001c0000000000019078ac1e0001ac1414aa0000907800670008"], 0x0) 3.615089231s ago: executing program 0 (id=68): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[], 0xf0}, 0x1, 0x0, 0x0, 0x8801}, 0x4000) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffec2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r4}, 0x18) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x408400, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0xab7399f7a016bc92, &(0x7f0000000380)=[@in={0x2, 0x0, @rand_addr=0x64010101}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000003c0)={r6, @in6={{0xa, 0x4e24, 0xffffffff, @empty, 0x2f}}, 0x75, 0xad}, &(0x7f0000000080)=0x90) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000380)={r6, 0x1, 0x3, 0x1, 0x9, 0x9}, &(0x7f00000003c0)=0x14) r7 = socket$key(0xf, 0x3, 0x2) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x20000178, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00'}, 0x10) r9 = io_uring_setup(0x20, &(0x7f00000000c0)={0x0, 0x0, 0x3000, 0x80000000, 0xfefffffd}) io_uring_register$IORING_REGISTER_RESIZE_RINGS(r9, 0x21, &(0x7f0000000580)={0x0, 0x4, 0x10, 0x1, 0x119}, 0x1) sendmsg$key(r7, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000800)={0x2, 0xa, 0x0, 0x3, 0xf, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3, 0x4, 0x59, 0x4, 0xef7c}, @sadb_address={0x3, 0x6, 0x6c}, @sadb_sa={0x2, 0x1, 0x4d4, 0x0, 0x2, 0x6, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @empty}}, @sadb_x_sec_ctx={0x1, 0x18, 0x3, 0x6}]}, 0x78}, 0x1, 0x7}, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSW2(r3, 0x5408, &(0x7f0000000040)={0x7fff, 0x0, 0x38f, 0x8, 0x0, "23f555d9adb42d4408020e90d1beaa07dc1ecf", 0xfffffffc, 0x9}) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000030000000000000007006d9f9a3ede7fc716f940a8ff0301000085005fc74db8a97b498263a490066e33763e57f4821d5e606cec9b9cc279a0f6f34d82e2b7687a6421ac9aa72faea02a275c90cb16875c238c2fa99693f5d860cb37bbd4c84d57466ef09f3049666f597cc3ceb01a4db8262eb070c348ae2c645c8a7ebb81ad9b868a827281f10c501c7cbf60828fd637a91d837c3e3c3d14473aeb0dd73c6741a8e4682a745fb67e1a8728ed5f310d6f21a7ed99fdf96ed157598b457bedd7b1741ada4a"], &(0x7f0000000340)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TIOCGPGRP(r2, 0x5437, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000b80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0xadc}}, 0x24040810) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socket$rds(0x15, 0x5, 0x0) 3.539629652s ago: executing program 3 (id=69): mkdir(&(0x7f0000000580)='./file0\x00', 0x92) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0x100080c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x40}, 0x18) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004055}, 0xc00c880) socket$kcm(0x2, 0x5, 0x84) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="50000000090601020000000000000000020000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) r6 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$selinux_access(r6, &(0x7f00000004c0)=ANY=[], 0x56) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r7}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f687372"], 0xfc}}, 0x0) faccessat2(0xffffffffffffffff, 0x0, 0x2, 0x1200) ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, &(0x7f0000000400)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x43, &(0x7f0000000080)={0x0, 0x2710}, 0x10) lsetxattr$security_selinux(&(0x7f0000000400)='./file0\x00', &(0x7f0000000000), &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x22, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) 3.508924933s ago: executing program 3 (id=70): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000180)={0x1, 0x10}) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x9) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket(0x0, 0x800, 0x8e6e) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r7, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000060c0)={0x34, r8, 0x301, 0x0, 0x25dfdbfb, {0x1c}, [@ETHTOOL_A_LINKMODES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x34}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='block_bio_remap\x00', r4}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r9 = socket(0x10, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendfile(r1, r2, 0x0, 0x7fffffffffffffff) r10 = getpid() unshare(0x2c020400) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r11 = syz_pidfd_open(r10, 0x0) setns(r11, 0x8020000) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4}, 0x94) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000b00)=@filter={'filter\x00', 0xe, 0x4, 0x350, 0xffffffff, 0x1f0, 0x1f0, 0xd0, 0xffffffff, 0xffffffff, 0x2b8, 0x2b8, 0x2b8, 0xffffffff, 0x4, &(0x7f0000000040), {[{{@ip={@rand_addr=0x64010101, @private=0xa010102, 0xff000000, 0xff000000, 'bond_slave_0\x00', 'ipvlan0\x00', {}, {}, 0xb314e828b2fce06e, 0x0, 0x10}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x7, 0x2, 0x3, 0x3, 0x4, 0x6], 0x5}, {0xffffffffffffffff, [0x0, 0x4aee1de731b25b79, 0x4, 0x2, 0x3, 0x2], 0x2, 0x2}}}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@addrtype={{0x30}, {0x242, 0x18, 0x1}}, @common=@socket0={{0x20}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x3, [0x2, 0x2, 0x1, 0x1, 0x2, 0x1], 0x4, 0x3}, {0x2, [0x7, 0x4, 0x4, 0x6, 0x0, 0xd205d636531791e1], 0x81, 0x4}}}}, {{@ip={@local, @local, 0x0, 0xffffff00, 'pim6reg\x00', 'caif0\x00', {}, {}, 0x33, 0x0, 0x3}, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@inet=@dccp={{0x30}, {[0x4e24, 0x4e24], [0x4e23, 0x4e22], 0x0, 0x0, 0xffff, 0x6}}]}, @REJECT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r12}, 0x10) r13 = socket(0x10, 0x3, 0x9) connect$netlink(r13, &(0x7f0000000240)=@proc={0x10, 0x0, 0x25dfdbf8}, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r13, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1400000000"], 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x14000000) 3.351331906s ago: executing program 1 (id=71): socket$inet6_sctp(0xa, 0x1, 0x84) syz_read_part_table(0x5d4, &(0x7f0000000000)="$eJzs279rW1cUB/AjxcI0GbJkyuRkaKFkScgYQZMgKQkJCDVeQgsJJIQ0mhQIKFRgSIZEQ0I0GI9ejEGLf0yWRXEXGxs8G9PBYPBgKC32UvBiFdu3S4fiYplS+Hzgcbj3fu877/wBL/hfy8bvvV4vExG9wcONb/6e6P3D7eF2oXh3qHyz8jAiEz9ExK9DX/10cJL56/bRW+NyWm+k9cT42e6H3Tu59i/f/vHl48VmNp2PlLIxEhHnJjvDfRuSUzOVXzr/9l2t9LGef7Feamy9X1t9ML1TqHTuN1sz93K3n6bccqoDqb6KeryJl/EkqlGNZ1HrU/+x9ubV/Yul9tzzG3vF7qeFaylXjogzJ5z1OP1fX/r8qNW4dWX2wuj1+vxKZfuwaS+qg6fQHAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAvpvKL51/+65W+ljPv1gvNbber60+mN4pVDr3m62Ze7nbT1NuOdWBVF9FPd7Ey3gS1cjEs6j1qf9Ye/Pq/sVSe+75jb1i99PCtZQrn3DO4/Z/fenzo1bj1pXZC6PX6/Mrle0zR7nq4Cl9AAAAAAAAAAAAAAAAAAAAAEREoXh3qHyz8jAiE9/FQHz924/Zg/1e+t89E/H9zxFxOeU30v7E+Nnuh907ufbB4vFi84t0PpKec5Od4f9gHP6lPwMAAP//+g2V7g==") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001e00)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x2}, 0x8) sendto$inet6(r1, &(0x7f0000000b80)="be", 0x1, 0x4008014, &(0x7f0000000000)={0xa, 0x4e22, 0x1, @remote, 0x7}, 0x1c) shutdown(r1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) syz_usb_disconnect(r2) syz_usb_connect(0x4, 0x65, &(0x7f0000000500)=ANY=[], 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) creat(&(0x7f0000000380)='./bus\x00', 0x198) r3 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=@newtaction={0x98, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x84, 0x1, [@m_tunnel_key={0x80, 0x1, 0x0, 0x0, {{0xf}, {0x50, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e21}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x9, 0x408, 0xfffffffffffffff5, 0x6, 0x1}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @private0={0xfc, 0x0, '\x00', 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @empty}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)='trans=rdma,') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x88640, 0x0) r6 = syz_open_pts(r5, 0x141601) write(r6, &(0x7f0000000000)="d5", 0xfffffedf) close_range(r4, 0xffffffffffffffff, 0x0) 3.293726187s ago: executing program 0 (id=72): r0 = creat(&(0x7f0000000240)='./file0\x00', 0x103) dup2(r0, r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x4, &(0x7f0000006680)) r1 = gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000d900000000000000", @ANYRES32, @ANYBLOB="000000009cb9ecb38e156102989411c3910000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000400000000000000010000008e", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r3}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000100000000000000", @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB="19"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000400, &(0x7f0000000080), 0xbe, 0x7c0, &(0x7f0000000f80)="$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") mkdir(&(0x7f0000000000)='./control\x00', 0x81) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095", @ANYBLOB="2ecbb6d0e629feb8740e6f3e793baf4ce177d6e081443c86f577f4c18cd64e641c2694d88aba1d1829d501d6e5055e9b59f2f155946fd183decbe629e284bdfe04d88bed950fae69d0f0e0bf74d2dbb709f191f009a88b6381d84f28ada16ca4a3b4c31112b9b8544591d0e4", @ANYRES8, @ANYRESHEX, @ANYRESHEX=r5, @ANYRESHEX, @ANYRESDEC=r4, @ANYBLOB="8e4fbeb1b1a97c10c376633b6eea8c1a62f584668ea3dc69c079", @ANYBLOB="3a0264a3512cd27ab1d33557e81b8214ef2387b8c4e643fb14921672e0dadd6fe85a9cd208eada985385979cb3723df502399ec5e6f4fbcc95c4ce07ddbfa168feedd85cfde93f299d5655238119ee39c7570e8e7d7a403f68ef34e305eaca93ae2a544b821f7ba46680158820d8a79527eb5a56791c8c8613f3dd35b43973d0161820fe292b3663cd2d2ff29efad8b4707cbb3370215dbd836f0ca09dc6da3838a878dbeec497a204f458a52bbc78d66b13d19d7658bf4044a0c518f83d486c4ce48baa1557ed634abe3199b9454d4930683bccc2acd6e3e0dd", @ANYRESOCT=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000004c0)='kmem_cache_free\x00', r8}, 0x18) r9 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r9, &(0x7f0000000400)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x8) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x3) poll(&(0x7f0000b2c000)=[{r7}], 0x2c, 0xffffffffffbffff8) dup2(r6, r7) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0xf2de1000) fcntl$setown(r6, 0x8, r1) tkill(r1, 0x13) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018040000", @ANYRES32, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) r11 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2060, 0x0) fsetxattr$trusted_overlay_redirect(r11, &(0x7f0000000040), 0x0, 0x0, 0x0) fremovexattr(r11, &(0x7f00000000c0)=@known='trusted.overlay.redirect\x00') syz_emit_ethernet(0x2a, &(0x7f0000001f80)=ANY=[@ANYBLOB="0380c2001e00bbbbbbbbbbbb08004500001c0000000000019078ac1e0001ac1414aa0000907800670008"], 0x0) 3.245849368s ago: executing program 3 (id=73): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x1, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff000000009408000000001700638af0ff00000000bfa100000000000007"], 0x0, 0xc}, 0x94) r2 = open(&(0x7f00000009c0)='./file1\x00', 0x0, 0xa9) copy_file_range(r2, 0x0, r2, &(0x7f0000000080)=0xff80000000000000, 0x1, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000700)=@newlink={0x44, 0x10, 0x401, 0x8000, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPVLAN_FLAGS={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4001}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000005c0)={'gretap0\x00', &(0x7f0000000500)={'syztnl2\x00', 0x0, 0x0, 0x40, 0x44d1, 0x6, {{0x26, 0x4, 0x1, 0x6, 0x98, 0x66, 0x0, 0x3, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, {[@lsrr={0x83, 0x13, 0x97, [@private=0xa010102, @multicast2, @remote, @broadcast]}, @timestamp_addr={0x44, 0x24, 0x8c, 0x1, 0x4, [{@multicast2}, {@loopback, 0x3}, {@empty, 0x3b2}, {@remote, 0x2e35fc8b}]}, @generic={0x44, 0x2}, @lsrr={0x83, 0x1f, 0x5e, [@broadcast, @loopback, @rand_addr=0x64010100, @broadcast, @rand_addr=0x64010102, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_prespec={0x44, 0x2c, 0x12, 0x3, 0x7, [{@dev={0xac, 0x14, 0x14, 0xf}, 0x5}, {@rand_addr=0x64010102, 0xd305}, {@loopback, 0x5}, {@rand_addr=0x64010100, 0xde}, {@loopback, 0x1}]}]}}}}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000680)={@empty, 0x0}, &(0x7f00000006c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000007c0)=0x14) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r2, &(0x7f0000000980)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000940)={&(0x7f0000000a80)=ANY=[@ANYBLOB="10010000", @ANYRES16=r3, @ANYBLOB="00042dbd7000fddbdf2511000000580001801400020076657468305f6d6163767461700000001400020076657468305f766972745f776966690008000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="14000200766972745f7769666930000000000000080003000100000020000180080003000100000014000200626f6e645f736c6176655f3000000000380001800800030002000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="089b7b9e54000000141502006475002d79300000000000175f00000000004c0001801400020077673000000000feff817f87cefd85aa1400000000000000080003000300000008000100", @ANYRES32=r7, @ANYBLOB="08000300010000001400020070696d3672656700000000000000000008000100", @ANYRES32=r8, @ANYBLOB], 0x110}}, 0x20004000) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa1780c2060500"], 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200008, &(0x7f0000000380)={[{@nolazytime}, {@auto_da_alloc}, {@sysvgroups}, {@norecovery}, {@jqfmt_vfsv0}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@user_xattr}]}, 0x3, 0x56a, &(0x7f00000015c0)="$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") r9 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) sendmsg$nl_route(r10, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)=@bridge_getneigh={0x28, 0x1e, 0x3c964e403b131b43, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r11}]}, 0x28}}, 0x2000c058) writev(r9, &(0x7f00000004c0)=[{&(0x7f0000000400)="4419040ab0eca862e6c082f1aa83f9466978f47cf52163ce7a8848332e2df0610f7d1c0f2a51c085ddcfa6557e711d420b5080b9e4830df7b642447ddd69b95546", 0x41}], 0x1) preadv2(r9, &(0x7f0000000340)=[{&(0x7f0000002200)=""/4096, 0x1000}, {&(0x7f0000000540)=""/76, 0x4c}], 0x2, 0x0, 0x40000000, 0x0) r12 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000008082295"], &(0x7f00000002c0)='GPL\x00'}, 0x94) accept4$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x1000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r12, 0x5, 0xb68, 0xffffffffffffff62, &(0x7f0000000000)="ff", 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x48) r13 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_SECURITY(r13, 0x112, 0x4, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) timer_create(0x3, &(0x7f0000000a00)={0x0, 0xd}, &(0x7f0000000a40)) 3.094239491s ago: executing program 3 (id=74): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) io_setup(0x27e, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'veth1\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xf, [0xa, 0x1, 0x7fff, 0x1, 0x4, 0x9, 0xa4, 0xffb, 0x7, 0xb69, 0xc1, 0x4, 0x1, 0x3, 0x5, 0x101, 0x65d, 0x9, 0x3, 0x3, 0x1, 0xfffffffa, 0x0, 0x6, 0x9, 0x4, 0x7, 0x1000005, 0x100000, 0x75f, 0x3, 0xd, 0xe, 0x2b12, 0x100, 0x6, 0x1c00, 0xfffffff9, 0x8, 0xbed4, 0x8, 0x8000100, 0x61, 0x0, 0x11000, 0x1008, 0x1, 0x79b, 0x2, 0x1, 0x7f, 0x4, 0x400, 0x7, 0xf, 0x101, 0xd7, 0x1fa0860a, 0x7, 0xaa, 0x81, 0x2, 0x180000, 0x4007, 0x8b, 0x5, 0x2af, 0xf7, 0x5, 0x2, 0x6, 0xb, 0x4, 0x7, 0x4009, 0x0, 0x5, 0x100002, 0x8, 0x752, 0x0, 0x3, 0x0, 0x10001, 0x82, 0xd, 0x6, 0x6, 0xa, 0x80000000, 0xfdffffff, 0x2, 0x2, 0x84, 0x100, 0x5, 0x252, 0x81, 0xb, 0x5, 0x20006, 0x5, 0x2, 0x15f, 0x84ac, 0xd9a, 0x5, 0x82a2, 0xfff, 0x3, 0x2, 0x5, 0x8, 0x0, 0x4, 0x2, 0x40, 0x8, 0x7, 0x4, 0x401, 0x66cd, 0x8, 0x8, 0x1, 0x1fc, 0xc5c, 0xffffffff]}}) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r3, 0x0, 0x200000000000006}, 0x18) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x88002, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) pwritev(r4, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000140)}], 0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x0, 0x0}) sysinfo(0x0) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x9c) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020073797a30000000000800410073697700140033006c6f"], 0xffaf}, 0x1, 0x0, 0x0, 0x854}, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x3) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r6, 0x40089413, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x94, 0x1) setresgid(0xee00, 0xee01, r7) setuid(0xee00) 3.054259032s ago: executing program 3 (id=75): r0 = creat(&(0x7f0000000240)='./file0\x00', 0x103) dup2(r0, r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x4, &(0x7f0000006680)) r1 = gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000d900000000000000", @ANYRES32, @ANYBLOB="000000009cb9ecb38e156102989411c3910000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000400000000000000010000008e", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r3}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000100000000000000", @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB="19"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000400, &(0x7f0000000080), 0xbe, 0x7c0, &(0x7f0000000f80)="$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") mkdir(&(0x7f0000000000)='./control\x00', 0x81) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095", @ANYBLOB="2ecbb6d0e629feb8740e6f3e793baf4ce177d6e081443c86f577f4c18cd64e641c2694d88aba1d1829d501d6e5055e9b59f2f155946fd183decbe629e284bdfe04d88bed950fae69d0f0e0bf74d2dbb709f191f009a88b6381d84f28ada16ca4a3b4c31112b9b8544591d0e4", @ANYRES8, @ANYRESHEX, @ANYRESHEX=r5, @ANYRESHEX, @ANYRESDEC=r4, @ANYBLOB="8e4fbeb1b1a97c10c376633b6eea8c1a62f584668ea3dc69c079", @ANYBLOB="3a0264a3512cd27ab1d33557e81b8214ef2387b8c4e643fb14921672e0dadd6fe85a9cd208eada985385979cb3723df502399ec5e6f4fbcc95c4ce07ddbfa168feedd85cfde93f299d5655238119ee39c7570e8e7d7a403f68ef34e305eaca93ae2a544b821f7ba46680158820d8a79527eb5a56791c8c8613f3dd35b43973d0161820fe292b3663cd2d2ff29efad8b4707cbb3370215dbd836f0ca09dc6da3838a878dbeec497a204f458a52bbc78d66b13d19d7658bf4044a0c518f83d486c4ce48baa1557ed634abe3199b9454d4930683bccc2acd6e3e0dd", @ANYRESOCT=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000004c0)='kmem_cache_free\x00', r8}, 0x18) r9 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r9, &(0x7f0000000400)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x8) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x3) poll(&(0x7f0000b2c000)=[{r7}], 0x2c, 0xffffffffffbffff8) dup2(r6, r7) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0xf2de1000) fcntl$setown(r6, 0x8, r1) tkill(r1, 0x13) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018040000", @ANYRES32, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) r11 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2060, 0x0) fsetxattr$trusted_overlay_redirect(r11, &(0x7f0000000040), 0x0, 0x0, 0x0) fremovexattr(r11, &(0x7f00000000c0)=@known='trusted.overlay.redirect\x00') syz_emit_ethernet(0x2a, &(0x7f0000001f80)=ANY=[@ANYBLOB="0380c2001e00bbbbbbbbbbbb08004500001c0000000000019078ac1e0001ac1414aa0000907800670008"], 0x0) 2.512374392s ago: executing program 1 (id=82): r0 = creat(&(0x7f0000000240)='./file0\x00', 0x103) dup2(r0, r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x4, &(0x7f0000006680)) r1 = gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000d900000000000000", @ANYRES32, @ANYBLOB="000000009cb9ecb38e156102989411c3910000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000400000000000000010000008e", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r3}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000100000000000000", @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB="19"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000400, &(0x7f0000000080), 0xbe, 0x7c0, &(0x7f0000000f80)="$eJzs3c9rG9kdAPDvyJZ/Ja1dKLTpyVBoDSFynbpJCz2k9FAKDQTacxMjKya1bAVLDrExJKEUeim0pYfC7iXn/ZG97XV/XHf/iz0sCdldx6yXPSxaRh7Zciw5dtaSDPl8YDzvvZnxe1+/mfGT3iAF8MqaTH/kIs5FxL+TiPGsPImIfCM1GHFlZ7/tzY1iuiRRr//586Sxz9bmRjFajkmdyTI/jogP/hFxPpcWjOyrt7q2vjhXLpdWsvx0ben2dHVt/cKtpbmF0kJp+dLM7OzFy7+6fOnkYv3y4/WzT/7zh5+/feXrv//o0b8+TOJKnM22tcZxUiZjMvub5NM/4T6/P+nK+izpdwN4KemlObBzlce5GI+BRqqD0V62DADolnsRUd8zVAcAXgFJ9LsFAEBvNd8H2NrcKDaX/r4j0VtPf7czNbmVzW1u78Y/mM3ZjTTmQce2kn0zI0lETJxA/ZMR8fq7f30zXaJL85AA7dx/EBE3JiYP3v+TA88sHNcvDttYH26sJp8rdv+D3nkvHf/8ut34L7c7/ok245/hNtfuy3jx9Z97fALVdJSO/37b8mzbdkv8mYmBLPe9xpgvn9y8VS6l97bvR8RU5IfT/Exj1/ZPQU09++ZZp/pbx39f/Pdvb6T1p+u9PXKPB4f3HzM/V5v7rnE3PX0Q8ZPBdvEnu/2fdBj/XjtiHX/8zT9f67QtjT+Nt7kcjL+76g8jfta2//f6Mjn0+cTpxukw3Twp2njnk/+Pdap/r/+HG+u0/uZrgV5I+3/s8PgnktbnNavHr+Ojh+Pvd9rWev63j7/9+T+U/KWRHsrK7s7VaiszEUPJnw6WX9w79m4+S2T7p/FP/bT99d/p/M9lz8be2M0dbvDJZ29lv6pt/A33O8XfXWn888fq/0MS9eyY5zY92l4c6FT/0fp/tpGaykqOcv97QUubiRd3HgAAAAAAAAAAAAAAAAAAAAAAAACcgFxEnI0kV9hN53KFws53eP8wxnLlSrV2/mZldXk+Gt+VPRH5XPOjLsdbPg91Jvs8/Gb+4nP5X0bEDyLif8OjjXyhWCnP9zt4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMic2f/9//fSVaGws+3T4X63DgDompF+NwAA6Dn//wHg1XO8//+jXWsHANA7x379X0+60xAAoGdGIn+0HW90uyUAQK+Y/wcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKDLrl29mi71rzY3iml+/s7a6mLlzoX5UnWxsLRaLBQrK7cLC5XKQrlUKFaWOv6i+zurcqVyezaWV+9O10rV2nR1bf36UmV1uXb91tLcQul6Kd+zyAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg6Kpr64tz5XJpReLQxOjpaMapSQzGqWjGiSXqAzvXw+loz2A0S4b61ozWu8Ron+5OAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKfftwEAAP//uwceNw==") mkdir(&(0x7f0000000000)='./control\x00', 0x81) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095", @ANYBLOB="2ecbb6d0e629feb8740e6f3e793baf4ce177d6e081443c86f577f4c18cd64e641c2694d88aba1d1829d501d6e5055e9b59f2f155946fd183decbe629e284bdfe04d88bed950fae69d0f0e0bf74d2dbb709f191f009a88b6381d84f28ada16ca4a3b4c31112b9b8544591d0e4", @ANYRES8, @ANYRESHEX, @ANYRESHEX=r5, @ANYRESHEX, @ANYRESDEC=r4, @ANYBLOB="8e4fbeb1b1a97c10c376633b6eea8c1a62f584668ea3dc69c079", @ANYBLOB="3a0264a3512cd27ab1d33557e81b8214ef2387b8c4e643fb14921672e0dadd6fe85a9cd208eada985385979cb3723df502399ec5e6f4fbcc95c4ce07ddbfa168feedd85cfde93f299d5655238119ee39c7570e8e7d7a403f68ef34e305eaca93ae2a544b821f7ba46680158820d8a79527eb5a56791c8c8613f3dd35b43973d0161820fe292b3663cd2d2ff29efad8b4707cbb3370215dbd836f0ca09dc6da3838a878dbeec497a204f458a52bbc78d66b13d19d7658bf4044a0c518f83d486c4ce48baa1557ed634abe3199b9454d4930683bccc2acd6e3e0dd", @ANYRESOCT=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000004c0)='kmem_cache_free\x00', r8}, 0x18) r9 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r9, &(0x7f0000000400)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x8) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x3) poll(&(0x7f0000b2c000)=[{r7}], 0x2c, 0xffffffffffbffff8) dup2(r6, r7) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0xf2de1000) fcntl$setown(r6, 0x8, r1) tkill(r1, 0x13) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018040000", @ANYRES32, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) r11 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2060, 0x0) fsetxattr$trusted_overlay_redirect(r11, &(0x7f0000000040), 0x0, 0x0, 0x0) fremovexattr(r11, &(0x7f00000000c0)=@known='trusted.overlay.redirect\x00') syz_emit_ethernet(0x2a, &(0x7f0000001f80)=ANY=[@ANYBLOB="0380c2001e00bbbbbbbbbbbb08004500001c0000000000019078ac1e0001ac1414aa0000907800670008"], 0x0) 2.485292313s ago: executing program 4 (id=83): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[], 0xf0}, 0x1, 0x0, 0x0, 0x8801}, 0x4000) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffec2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r4}, 0x18) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x408400, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0xab7399f7a016bc92, &(0x7f0000000380)=[@in={0x2, 0x0, @rand_addr=0x64010101}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000003c0)={r6, @in6={{0xa, 0x4e24, 0xffffffff, @empty, 0x2f}}, 0x75, 0xad}, &(0x7f0000000080)=0x90) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000380)={r6, 0x1, 0x3, 0x1, 0x9, 0x9}, &(0x7f00000003c0)=0x14) r7 = socket$key(0xf, 0x3, 0x2) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x20000178, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00'}, 0x10) r9 = io_uring_setup(0x20, &(0x7f00000000c0)={0x0, 0x0, 0x3000, 0x80000000, 0xfefffffd}) io_uring_register$IORING_REGISTER_RESIZE_RINGS(r9, 0x21, &(0x7f0000000580)={0x0, 0x4, 0x10, 0x1, 0x119}, 0x1) sendmsg$key(r7, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000800)={0x2, 0xa, 0x0, 0x3, 0xf, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3, 0x4, 0x59, 0x4, 0xef7c}, @sadb_address={0x3, 0x6, 0x6c}, @sadb_sa={0x2, 0x1, 0x4d4, 0x0, 0x2, 0x6, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @empty}}, @sadb_x_sec_ctx={0x1, 0x18, 0x3, 0x6}]}, 0x78}, 0x1, 0x7}, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSW2(r3, 0x5408, &(0x7f0000000040)={0x7fff, 0x0, 0x38f, 0x8, 0x0, "23f555d9adb42d4408020e90d1beaa07dc1ecf", 0xfffffffc, 0x9}) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000030000000000000007006d9f9a3ede7fc716f940a8ff0301000085005fc74db8a97b498263a490066e33763e57f4821d5e606cec9b9cc279a0f6f34d82e2b7687a6421ac9aa72faea02a275c90cb16875c238c2fa99693f5d860cb37bbd4c84d57466ef09f3049666f597cc3ceb01a4db8262eb070c348ae2c645c8a7ebb81ad9b868a827281f10c501c7cbf60828fd637a91d837c3e3c3d14473aeb0dd73c6741a8e4682a745fb67e1a8728ed5f310d6f21a7ed99fdf96ed157598b457bedd7b1741ada4a"], &(0x7f0000000340)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TIOCGPGRP(r2, 0x5437, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000b80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0xadc}}, 0x24040810) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socket$rds(0x15, 0x5, 0x0) 2.157096659s ago: executing program 4 (id=84): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xfec8d000) socket$inet6(0xa, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) io_setup(0x3, &(0x7f0000000340)=0x0) io_cancel(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x5, 0x58a, r0, &(0x7f0000000500)="31c29075ddfa959ff93fa313cb9496aea4ca95b431f71d371214ed8a7cff9547787e5fec4e064beef6894fc30a56aa3292e8da7d6477048b1911011ca767decb4b276f4a812a17bc789796ae74f235e6bc0a90e741acd5cde9834d5d2d5c4dfb969b30590433e4a229252dd23201951cfc14a1a758ca1bd57b09683535c68521", 0xb1, 0x3a, 0x0, 0x3}, &(0x7f0000000740)) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)=ANY=[], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb:\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000x0}) r8 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020073797a30000000000800410073697700140033006c6f"], 0xffaf}, 0x1, 0x0, 0x0, 0x854}, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x3) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r6, 0x40089413, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x94, 0x1) setresgid(0xee00, 0xee01, r7) setuid(0xee00) 1.857088935s ago: executing program 4 (id=86): creat(0x0, 0x182) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000400)=[{0x2, 0x6c, 0x0, 0x4}]}) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB], 0x48) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f000000fe40)={&(0x7f0000000240)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="b16b6e00000000001c000400ffff4e214e220000fe8000000000000000000000000000aa9c0011000a010101000000000000000000000000fc0200000000000000000000000000010a010101000000000000000000000000e0000002000000000000444ab6092d1922088b8a0e1adcdd000000000000000000000235000002000a000a010101000000000000000000000000fc02000000000000000000000000000000000000000000000000000000000000000000016c020000ff34000002"], 0x108}, 0x1, 0x0, 0x0, 0x882}, 0x4000091) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3, 0x0, 0x3}, 0x18) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r5 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) r6 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0100000004000000080000000b"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) syz_mount_image$iso9660(&(0x7f0000000500), &(0x7f0000000580)='./file0\x00', 0x800040, &(0x7f0000000600)=ANY=[@ANYRES64=r3, @ANYRES64=r6, @ANYRESHEX=r1], 0x1, 0x599, &(0x7f0000000740)="$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") openat$dir(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file0\x00', 0x2b2440, 0x184) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c000000020601080000000000000000031700000900020073797a31000000000500010007000000050005000200080000000300686173683a6e65742c6e6574000000000500040000000000"], 0x4c}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r9}, 0x10) r10 = syz_open_dev$usbfs(&(0x7f0000000080), 0x74, 0x101301) r11 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet_opts(r11, 0x0, 0x6, &(0x7f0000000d00)='\a', 0x1) ioctl$USBDEVFS_IOCTL(r10, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) close_range(r4, 0xffffffffffffffff, 0x0) 1.785352516s ago: executing program 4 (id=87): mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x6, 0x42032, 0xffffffffffffffff, 0x80000000) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f0000000340)='9p\x00', 0x1840, &(0x7f00000003c0)='\xbe#\x0eS\xa9tWA\x11\x8aZyW\x9d\xd2\xad\xaf\xbcy\xe2@s\xe5Q\x9b\x10{Oh\xf8\x17\x98\x06\xb9 4\xb8M\xfcC\xd4\xfa\xa06:\xc98\xfa\xa7MX\xcef\xc1,z\xaa\x8b\x8c/\x05\x00\x00\x00\x06\x00\x00\x00\xb2S\xbf\xd8\f\x83\xda[F\xe0\xa7\xbf\xb3\xef\x1f\x9c\r\xcbwm\xa9U\xe3\x98\x9e:\xac\x1eJ\x99\xcd\xcf\xb4\x9f(1\x9c\xfa\xdc\xe4n|\x905\xf1\xe0\x9f\xf4\xc2,j\rC\xb9R\xdf\xf3\xbe3\xba\xf5\x04') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x1}, 0x1205, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000540)='cachefiles_trunc\x00', r0, 0x0, 0x10002}, 0x18) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000003e000701fcf7fffffedbdf25017c00000c0004"], 0x20}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a2, &(0x7f0000000000)='bridge0\x00') ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f00000000c0)={0x9, 0x1, 0x5, 0x7f, 0x4924924924925e5}) r2 = socket$nl_route(0x10, 0x3, 0x0) openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r3 = syz_io_uring_setup(0x38, &(0x7f0000000580)={0x0, 0xbbd7, 0x13500}, &(0x7f0000000240), &(0x7f0000000480)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r3, 0x21, &(0x7f0000000440), 0x1) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps\x00') preadv(r4, &(0x7f0000000080)=[{&(0x7f0000000100)=""/217, 0xd9}], 0x1, 0x5f0e, 0x2) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) 1.649552708s ago: executing program 4 (id=88): r0 = creat(&(0x7f0000000240)='./file0\x00', 0x103) dup2(r0, r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x4, &(0x7f0000006680)) r1 = gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000d900000000000000", @ANYRES32, @ANYBLOB="000000009cb9ecb38e156102989411c3910000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000400000000000000010000008e", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r3}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000100000000000000", @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB="19"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000400, &(0x7f0000000080), 0xbe, 0x7c0, &(0x7f0000000f80)="$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") mkdir(&(0x7f0000000000)='./control\x00', 0x81) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095", @ANYBLOB="2ecbb6d0e629feb8740e6f3e793baf4ce177d6e081443c86f577f4c18cd64e641c2694d88aba1d1829d501d6e5055e9b59f2f155946fd183decbe629e284bdfe04d88bed950fae69d0f0e0bf74d2dbb709f191f009a88b6381d84f28ada16ca4a3b4c31112b9b8544591d0e4", @ANYRES8, @ANYRESHEX, @ANYRESHEX=r5, @ANYRESHEX, @ANYRESDEC=r4, @ANYBLOB="8e4fbeb1b1a97c10c376633b6eea8c1a62f584668ea3dc69c079", @ANYBLOB="3a0264a3512cd27ab1d33557e81b8214ef2387b8c4e643fb14921672e0dadd6fe85a9cd208eada985385979cb3723df502399ec5e6f4fbcc95c4ce07ddbfa168feedd85cfde93f299d5655238119ee39c7570e8e7d7a403f68ef34e305eaca93ae2a544b821f7ba46680158820d8a79527eb5a56791c8c8613f3dd35b43973d0161820fe292b3663cd2d2ff29efad8b4707cbb3370215dbd836f0ca09dc6da3838a878dbeec497a204f458a52bbc78d66b13d19d7658bf4044a0c518f83d486c4ce48baa1557ed634abe3199b9454d4930683bccc2acd6e3e0dd", @ANYRESOCT=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000004c0)='kmem_cache_free\x00', r8}, 0x18) r9 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r9, &(0x7f0000000400)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x8) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x3) poll(&(0x7f0000b2c000)=[{r7}], 0x2c, 0xffffffffffbffff8) dup2(r6, r7) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0xf2de1000) fcntl$setown(r6, 0x8, r1) tkill(r1, 0x13) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018040000", @ANYRES32, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) r11 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2060, 0x0) fsetxattr$trusted_overlay_redirect(r11, &(0x7f0000000040), 0x0, 0x0, 0x0) fremovexattr(r11, &(0x7f00000000c0)=@known='trusted.overlay.redirect\x00') syz_emit_ethernet(0x2a, &(0x7f0000001f80)=ANY=[@ANYBLOB="0380c2001e00bbbbbbbbbbbb08004500001c0000000000019078ac1e0001ac1414aa0000907800670008"], 0x0) 732.006517ms ago: executing program 2 (id=89): ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r1 = syz_io_uring_setup(0x38, &(0x7f0000000580)={0x0, 0xbbd7, 0x13500}, &(0x7f0000000240), &(0x7f0000000480)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x21, 0x0, 0x1) syz_open_procfs(0x0, &(0x7f00000000c0)='smaps\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) 697.302137ms ago: executing program 2 (id=90): mkdir(&(0x7f0000000580)='./file0\x00', 0x92) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0x100080c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x40}, 0x18) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004055}, 0xc00c880) socket$kcm(0x2, 0x5, 0x84) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="50000000090601020000000000000000020000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$selinux_access(r5, &(0x7f00000004c0)=ANY=[], 0x56) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r7}, 0x10) sendmsg$NFT_BATCH(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f687372"], 0xfc}}, 0x0) faccessat2(0xffffffffffffffff, 0x0, 0x2, 0x1200) ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, &(0x7f0000000400)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x43, &(0x7f0000000080)={0x0, 0x2710}, 0x10) lsetxattr$security_selinux(&(0x7f0000000400)='./file0\x00', &(0x7f0000000000), &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x22, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) 681.474968ms ago: executing program 2 (id=91): mkdir(&(0x7f0000000580)='./file0\x00', 0x92) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0x100080c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x40}, 0x18) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004055}, 0xc00c880) socket$kcm(0x2, 0x5, 0x84) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="50000000090601020000000000000000020000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r7}, 0x10) sendmsg$NFT_BATCH(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f687372"], 0xfc}}, 0x0) faccessat2(0xffffffffffffffff, 0x0, 0x2, 0x1200) ioctl$SNAPSHOT_GET_IMAGE_SIZE(0xffffffffffffffff, 0x8008330e, &(0x7f0000000400)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x43, &(0x7f0000000080)={0x0, 0x2710}, 0x10) lsetxattr$security_selinux(&(0x7f0000000400)='./file0\x00', &(0x7f0000000000), &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x22, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) 660.823828ms ago: executing program 2 (id=92): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x8040) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0x8, &(0x7f00000000c0)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$caif_stream(0x25, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') preadv(r1, &(0x7f0000002540)=[{&(0x7f0000001140)=""/4096, 0x1000}], 0x1, 0x47fff, 0x6) syz_read_part_table(0x406c, &(0x7f0000008100)="$eJzszzFKxGAQBeCXjcEogUXQShAXe4mdVW6xjZXsGaxVzE0sxQN4IkuvEMHF1aSwU1S+r5rhzQv5wx9Rb6YiydPqcS/J8SJ9267Drfd856PUnqXarWdpklwluRh/c/nwM/8OAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8QrPRdjNJ6820Okx/3eW8SeqDeXJXpuqOiuwni9P1Sfm5WSbPSYokL0mW8298AwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwj1yOtu1p3HxRvT9J31Vv422SYRiG8UGRV3bnmAgAGASC4JcxGJP4wBcKaKh3+5u59NK+5NdhFwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYduBAAAAAAADI/7URqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqrADBzIAAAAAwvyt82g/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKwUAAP//BkAT8g==") fchdir(0xffffffffffffffff) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001a00010000000000000000000a000000000000000000000006001d000000000006001c000000000008001900", @ANYRES32], 0x44}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0xffffffff, 0xff}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0xcb, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x94eb2000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) r5 = gettid() process_vm_writev(r5, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) write$cgroup_pid(r6, &(0x7f00000002c0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fdf, 0x81}, 0x50) dup(r3) 221.510466ms ago: executing program 0 (id=93): socket$inet6_sctp(0xa, 0x1, 0x84) syz_read_part_table(0x5d4, &(0x7f0000000000)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001e00)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x2}, 0x8) sendto$inet6(r1, &(0x7f0000000b80)="be", 0x1, 0x4008014, &(0x7f0000000000)={0xa, 0x4e22, 0x1, @remote, 0x7}, 0x1c) shutdown(r1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) syz_usb_disconnect(r2) syz_usb_connect(0x4, 0x65, &(0x7f0000000500)=ANY=[], 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) creat(&(0x7f0000000380)='./bus\x00', 0x198) r3 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=@newtaction={0x98, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x84, 0x1, [@m_tunnel_key={0x80, 0x1, 0x0, 0x0, {{0xf}, {0x50, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e21}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x9, 0x408, 0xfffffffffffffff5, 0x6, 0x1}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @private0={0xfc, 0x0, '\x00', 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @empty}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)='trans=rdma,') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x88640, 0x0) r6 = syz_open_pts(r5, 0x141601) write(r6, &(0x7f0000000000)="d5", 0xfffffedf) close_range(r4, 0xffffffffffffffff, 0x0) 0s ago: executing program 3 (id=94): ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000000)={0x0, 0x37, "004f5db569dd696341c30aa7241b624abbfba9d66ad8177a7c45654a7a47d7ee2d126ef18c30f0c3e844eb55620121f1614f311d6f03da"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa33"], 0xfdef) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) getrlimit(0xc73be9cdcf0e8bf5, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0xf5ffffff, &(0x7f0000000000)='%', 0x0, 0xd01, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2, 0x31}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a9a4850000000400000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000e"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7030000ec000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) r3 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300", 0xffffffff}, 0x48, 0xffffffffffffffff) r4 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) r5 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "6075ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x4, r5, r4, r4, 0x0) keyctl$KEYCTL_MOVE(0x4, r3, r3, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r6}, &(0x7f0000000380), &(0x7f0000000ac0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYRESOCT=0x0], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x94) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000140), 0x1, 0x4fa, &(0x7f0000000ac0)="$eJzs3c9vG1kdAPCvnThx0uwmu+wBEOyW3YWCqjqJuxut9gDLCSFUCdEjSG1I3CiKHUexU5rQQ3rmikQlTnDkD+DcE3cuCG5cygGJHxGoQeLg1YwnqZvaTdQkdhR/PtJo3ps39fe9pvNe/U3iF8DQuhoRuxExFhF3I2I6u57LjvisfST3Pdt7uLS/93ApF63W7X/l0vbkWnT8mcSV7DWLEfGj70X8NPdy3Mb2ztpitVrZzOqzzdrGbGN758ZqbXGlslJZL5cX5hfmPrn5cfnMxvpebSwrffXpH3e/9fOkW1PZlc5xnKX20AuHcRKjEfGD8wg2ACPZeMYG3RFeSz4i3o6I99PnfzpG0q8mAHCZtVrT0ZrurAMAl10+zYHl8qUsFzAV+Xyp1M7hvROT+Wq90bx+r761vtzOlc1EIX9vtVqZy3KFM1HIJfX5tPy8Xj5SvxkRb0XEL8cn0nppqV5dHuR/fABgiF05sv7/d7y9/gMAl1xx0B0AAPrO+g8Aw8f6DwDDx/oPAMOnvf5PDLobAEAfef8PAMPH+g8AQ+WHt24lR2s/+/zr5fvbW2v1+zeWK421Um1rqbRU39wordTrK+ln9tSOe71qvb4x/1FsPZj59kajOdvY3rlTq2+tN++kn+t9p1JI79rtw8gAgF7eeu/JX3LJivzpRHpEx14OhYH2DDhv+UF3ABiYkUF3ABgYu33B8DrFe3zpAbgkumzR+4Jit18QarVarfPrEnDOrn1J/h+GVUf+308Bw5CR/4fhJf8Pw6vVyp10z/846Y0AwMUmxw/0+P7/29n5d9k3B36yfPSOx+fZKwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALjYDvb/LWV7gU9FPl8qRbwRETNRyN1brVbmIuLNiPjzeGE8qc8PuM8AwGnl/57L9v+6Nv3h1AtN7145LI5FxM9+fftXDxabzc0/RYzl/j1+cL35OLte7n/vAYDjHazT6bnjjfyzvYdLB0c/+/OP70ZEsR1/f28s9g/jj8Zoei5GISIm/5PL6m25jtzFaew+iogvdht/LqbSHEh759Oj8ZPYb/Q1fv6F+Pm0rX1O/i6+cAZ9gWHzJJl/Puv2/OXjanru/vwX0xnq9LL5L3mppf10Dnwe/2D+G+kx/109aYyP/vD9dmni5bZHEV8ejTiIvd8x/xzEz/WI/+EJ4//1K+++36ut9ZuIa9E9fmes2WZtY7axvXNjtba4UlmprJfLC/MLc5/c/Lg8m+aoZ3uvBv/89PqbvdqS8U/2iF88ZvxfP+H4f/v/uz/+2ivif/ODbvHz8c4r4idr4jdOGH9x8vfFXm1J/OUe4z/u63/9hPGf/m3npW3DAYDBaWzvrC1Wq5VNBYWLX0j+yV6AbnQtfKdfscaie9MvPmg/00eaWq3XitVrxjiLrBtwERw+9BHxv0F3BgAAAAAAAAAAAAAA6Kofv7E06DECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABweX0eAAD//19xzyM=") r7 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$can_raw(0xffffffffffffffff, &(0x7f00000000c0)={0x1d, r8}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240), 0x208e24b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.237' (ED25519) to the list of known hosts. [ 26.115352][ T29] audit: type=1400 audit(1757201257.709:62): avc: denied { mounton } for pid=3276 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.116495][ T3276] cgroup: Unknown subsys name 'net' [ 26.138262][ T29] audit: type=1400 audit(1757201257.709:63): avc: denied { mount } for pid=3276 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.165529][ T29] audit: type=1400 audit(1757201257.749:64): avc: denied { unmount } for pid=3276 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.277792][ T3276] cgroup: Unknown subsys name 'cpuset' [ 26.284014][ T3276] cgroup: Unknown subsys name 'rlimit' [ 26.473857][ T29] audit: type=1400 audit(1757201258.069:65): avc: denied { setattr } for pid=3276 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.497163][ T29] audit: type=1400 audit(1757201258.069:66): avc: denied { create } for pid=3276 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.518677][ T29] audit: type=1400 audit(1757201258.069:67): avc: denied { write } for pid=3276 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.539131][ T29] audit: type=1400 audit(1757201258.069:68): avc: denied { read } for pid=3276 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.540995][ T3296] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 26.560222][ T29] audit: type=1400 audit(1757201258.079:69): avc: denied { mounton } for pid=3276 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.593613][ T29] audit: type=1400 audit(1757201258.079:70): avc: denied { mount } for pid=3276 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.601438][ T3276] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.616921][ T29] audit: type=1400 audit(1757201258.179:71): avc: denied { relabelto } for pid=3296 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.818788][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 27.835822][ T3304] chnl_net:caif_netlink_parms(): no params data found [ 27.858398][ T3307] chnl_net:caif_netlink_parms(): no params data found [ 27.904683][ T3309] chnl_net:caif_netlink_parms(): no params data found [ 27.984597][ T3304] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.991721][ T3304] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.999127][ T3304] bridge_slave_0: entered allmulticast mode [ 28.005815][ T3304] bridge_slave_0: entered promiscuous mode [ 28.014267][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.021431][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.028572][ T3312] bridge_slave_0: entered allmulticast mode [ 28.034990][ T3312] bridge_slave_0: entered promiscuous mode [ 28.048172][ T3304] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.055274][ T3304] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.062559][ T3304] bridge_slave_1: entered allmulticast mode [ 28.069078][ T3304] bridge_slave_1: entered promiscuous mode [ 28.077407][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.084451][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.091612][ T3312] bridge_slave_1: entered allmulticast mode [ 28.097830][ T3312] bridge_slave_1: entered promiscuous mode [ 28.107961][ T3303] chnl_net:caif_netlink_parms(): no params data found [ 28.121502][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.128626][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.135736][ T3307] bridge_slave_0: entered allmulticast mode [ 28.143008][ T3307] bridge_slave_0: entered promiscuous mode [ 28.168266][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.177437][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.184481][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.191774][ T3307] bridge_slave_1: entered allmulticast mode [ 28.198314][ T3307] bridge_slave_1: entered promiscuous mode [ 28.209001][ T3309] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.216163][ T3309] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.223839][ T3309] bridge_slave_0: entered allmulticast mode [ 28.230279][ T3309] bridge_slave_0: entered promiscuous mode [ 28.239838][ T3309] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.247030][ T3309] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.254229][ T3309] bridge_slave_1: entered allmulticast mode [ 28.260802][ T3309] bridge_slave_1: entered promiscuous mode [ 28.268053][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.283868][ T3304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.312330][ T3304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.322816][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.340240][ T3309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.364564][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.376898][ T3309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.386696][ T3312] team0: Port device team_slave_0 added [ 28.393123][ T3304] team0: Port device team_slave_0 added [ 28.412249][ T3312] team0: Port device team_slave_1 added [ 28.418622][ T3304] team0: Port device team_slave_1 added [ 28.453368][ T3307] team0: Port device team_slave_0 added [ 28.464535][ T3309] team0: Port device team_slave_0 added [ 28.471483][ T3309] team0: Port device team_slave_1 added [ 28.482552][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.489563][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.516317][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.527618][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.534626][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.560687][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.572065][ T3307] team0: Port device team_slave_1 added [ 28.583147][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.590329][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.597531][ T3303] bridge_slave_0: entered allmulticast mode [ 28.603939][ T3303] bridge_slave_0: entered promiscuous mode [ 28.615522][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.622524][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.648443][ T3304] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.661906][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.668900][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.696545][ T3304] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.712653][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.719840][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.726974][ T3303] bridge_slave_1: entered allmulticast mode [ 28.733568][ T3303] bridge_slave_1: entered promiscuous mode [ 28.745531][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.752511][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.778445][ T3309] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.791594][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.798612][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.824526][ T3309] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.835533][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.842496][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.868448][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.899295][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.906253][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.932236][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.950897][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.974066][ T3304] hsr_slave_0: entered promiscuous mode [ 28.980291][ T3304] hsr_slave_1: entered promiscuous mode [ 28.992093][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.003098][ T3312] hsr_slave_0: entered promiscuous mode [ 29.009226][ T3312] hsr_slave_1: entered promiscuous mode [ 29.015184][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 29.020926][ T3312] Cannot create hsr debugfs directory [ 29.043954][ T3309] hsr_slave_0: entered promiscuous mode [ 29.050758][ T3309] hsr_slave_1: entered promiscuous mode [ 29.056521][ T3309] debugfs: 'hsr0' already exists in 'hsr' [ 29.062280][ T3309] Cannot create hsr debugfs directory [ 29.095568][ T3307] hsr_slave_0: entered promiscuous mode [ 29.101703][ T3307] hsr_slave_1: entered promiscuous mode [ 29.107717][ T3307] debugfs: 'hsr0' already exists in 'hsr' [ 29.113430][ T3307] Cannot create hsr debugfs directory [ 29.124589][ T3303] team0: Port device team_slave_0 added [ 29.150330][ T3303] team0: Port device team_slave_1 added [ 29.199237][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.206257][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.232268][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.245555][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.252579][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.278495][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.376275][ T3303] hsr_slave_0: entered promiscuous mode [ 29.382337][ T3303] hsr_slave_1: entered promiscuous mode [ 29.388144][ T3303] debugfs: 'hsr0' already exists in 'hsr' [ 29.393859][ T3303] Cannot create hsr debugfs directory [ 29.439986][ T3312] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.458067][ T3312] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.469198][ T3312] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 29.478086][ T3312] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.514624][ T3309] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.523541][ T3309] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.537775][ T3309] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.553386][ T3309] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.576499][ T3307] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.601568][ T3304] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 29.610330][ T3307] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.620922][ T3304] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 29.638294][ T3307] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.646890][ T3304] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 29.663004][ T3307] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.671910][ T3304] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 29.682280][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.692496][ T3303] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.701470][ T3303] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.712556][ T3303] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.722282][ T3303] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.750865][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.772123][ T59] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.779270][ T59] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.791157][ T2301] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.798306][ T2301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.876213][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.890891][ T3304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.899912][ T3309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.921142][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.931854][ T3307] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.940880][ T3309] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.950943][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.958009][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.969400][ T3304] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.980898][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.988000][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.999294][ T1003] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.006359][ T1003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.019506][ T1003] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.026622][ T1003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.045062][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.052152][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.061418][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.068488][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.085346][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.100285][ T2301] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.107423][ T2301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.117921][ T2301] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.125076][ T2301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.135358][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.150885][ T3307] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.161384][ T3307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.286002][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.308974][ T3309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.321678][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.339466][ T3304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.379172][ T3312] veth0_vlan: entered promiscuous mode [ 30.398011][ T3312] veth1_vlan: entered promiscuous mode [ 30.447603][ T3312] veth0_macvtap: entered promiscuous mode [ 30.454589][ T3312] veth1_macvtap: entered promiscuous mode [ 30.491717][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.515197][ T3307] veth0_vlan: entered promiscuous mode [ 30.529753][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.542798][ T3307] veth1_vlan: entered promiscuous mode [ 30.557454][ T3303] veth0_vlan: entered promiscuous mode [ 30.565783][ T37] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.578935][ T3303] veth1_vlan: entered promiscuous mode [ 30.589881][ T37] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.600807][ T3309] veth0_vlan: entered promiscuous mode [ 30.613222][ T37] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.642046][ T3307] veth0_macvtap: entered promiscuous mode [ 30.658433][ T37] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.673790][ T3307] veth1_macvtap: entered promiscuous mode [ 30.681696][ T3303] veth0_macvtap: entered promiscuous mode [ 30.688483][ T3312] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 30.689005][ T3309] veth1_vlan: entered promiscuous mode [ 30.710994][ T3303] veth1_macvtap: entered promiscuous mode [ 30.738586][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.748786][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.766162][ T3309] veth0_macvtap: entered promiscuous mode [ 30.773856][ T3309] veth1_macvtap: entered promiscuous mode [ 30.783788][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.801107][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.818929][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.829235][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.850152][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.857515][ T3304] veth0_vlan: entered promiscuous mode [ 30.863202][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.874387][ T3472] netlink: 'syz.1.2': attribute type 1 has an invalid length. [ 30.895830][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.909725][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.936333][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.946781][ T3304] veth1_vlan: entered promiscuous mode [ 30.979572][ T12] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.996873][ T1003] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.997218][ T1003] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.997598][ T1003] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.997965][ T1003] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.998268][ T1003] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.998367][ T1003] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.022070][ T3304] veth0_macvtap: entered promiscuous mode [ 31.024069][ T3304] veth1_macvtap: entered promiscuous mode [ 31.064477][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.084046][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.126302][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 31.126321][ T29] audit: type=1400 audit(1757201262.719:110): avc: denied { create } for pid=3480 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.170455][ T3486] loop2: detected capacity change from 0 to 512 [ 31.220599][ T3485] vlan2: entered allmulticast mode [ 31.220618][ T3485] dummy0: entered allmulticast mode [ 31.233903][ T3481] loop3: detected capacity change from 0 to 2048 [ 31.242197][ T37] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.247588][ T1003] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.248021][ T1003] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.248271][ T31] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.257367][ T3486] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 31.257549][ T3486] ext4 filesystem being mounted at /0/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 31.271028][ T3481] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000900 r/w without journal. Quota mode: writeback. [ 31.326357][ T3486] ======================================================= [ 31.326357][ T3486] WARNING: The mand mount option has been deprecated and [ 31.326357][ T3486] and is ignored by this kernel. Remove the mand [ 31.326357][ T3486] option from the mount to silence this warning. [ 31.326357][ T3486] ======================================================= [ 31.328284][ T29] audit: type=1400 audit(1757201262.769:111): avc: denied { write } for pid=3479 comm="syz.2.3" lport=38574 faddr=::ffff:10.1.1.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 31.396448][ T29] audit: type=1400 audit(1757201262.769:112): avc: denied { ioctl } for pid=3480 comm="syz.3.4" path="socket:[4347]" dev="sockfs" ino=4347 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.396480][ T29] audit: type=1326 audit(1757201262.769:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3480 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8b7944ebe9 code=0x7ffc0000 [ 31.396504][ T29] audit: type=1326 audit(1757201262.769:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3480 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8b7944ebe9 code=0x7ffc0000 [ 31.396527][ T29] audit: type=1326 audit(1757201262.819:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3480 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8b7944ebe9 code=0x7ffc0000 [ 31.396585][ T29] audit: type=1326 audit(1757201262.819:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3480 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f8b7944ec23 code=0x7ffc0000 [ 31.396609][ T29] audit: type=1326 audit(1757201262.829:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3480 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f8b7944d69f code=0x7ffc0000 [ 31.396675][ T29] audit: type=1326 audit(1757201262.829:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3480 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f8b7944ec77 code=0x7ffc0000 [ 31.396707][ T29] audit: type=1326 audit(1757201262.829:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3480 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8b7944d550 code=0x7ffc0000 [ 31.430044][ T3486] EXT4-fs: Cannot change journaled quota options when quota turned on [ 31.433455][ T3485] Zero length message leads to an empty skb [ 31.760026][ T3498] loop1: detected capacity change from 0 to 1024 [ 31.771045][ T3498] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 31.782036][ T3498] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 31.793380][ T3498] JBD2: no valid journal superblock found [ 31.799209][ T3498] EXT4-fs (loop1): Could not load journal inode [ 31.812247][ T3498] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 31.857696][ T3507] sd 0:0:1:0: device reset [ 31.891727][ T3307] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000900. [ 31.928166][ T3309] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.960311][ T3512] loop1: detected capacity change from 0 to 1024 [ 31.990706][ T3512] EXT4-fs (loop1): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. [ 32.012617][ T3512] ext4 filesystem being mounted at /3/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 32.051918][ T3521] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 32.060149][ T3521] netdevsim netdevsim3: Direct firmware load for . failed with error -22 [ 32.070254][ T3522] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10'. [ 32.110347][ T1003] EXT4-fs error (device loop1): ext4_map_blocks:814: inode #15: comm kworker/u8:7: lblock 0 mapped to illegal pblock 0 (length 1) [ 32.125827][ T1003] EXT4-fs (loop1): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 1 with error 117 [ 32.138266][ T1003] EXT4-fs (loop1): This should not happen!! Data will be lost [ 32.138266][ T1003] [ 32.152404][ T3312] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 32.267062][ T3508] v: renamed from ip6_vti0 (while UP) [ 32.357120][ T3531] netlink: 64 bytes leftover after parsing attributes in process `syz.1.13'. [ 32.434045][ T3548] loop2: detected capacity change from 0 to 512 [ 32.448471][ T3548] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 32.457226][ T3548] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 32.504281][ T3508] syz.4.5 (3508) used greatest stack depth: 10496 bytes left [ 32.506610][ T3548] EXT4-fs (loop2): 1 orphan inode deleted [ 32.517958][ T31] EXT4-fs error (device loop2): ext4_release_dquot:6973: comm kworker/u8:1: Failed to release dquot type 1 [ 32.520361][ T3548] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 32.544076][ T3548] ext4 filesystem being mounted at /2/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 32.610913][ T3556] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 32.635801][ T3554] loop4: detected capacity change from 0 to 2048 [ 32.647085][ T3556] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 32.672489][ T3560] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=35 sclass=netlink_tcpdiag_socket pid=3560 comm=syz.0.19 [ 32.701547][ T3554] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 32.788090][ T3572] mmap: syz.0.19 (3572) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 33.037605][ T3587] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3587 comm=syz.1.21 [ 33.070483][ T3589] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 33.107057][ T3309] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 33.119816][ T3591] lo speed is unknown, defaulting to 1000 [ 33.125788][ T3591] lo speed is unknown, defaulting to 1000 [ 33.165587][ T3591] lo speed is unknown, defaulting to 1000 [ 33.165955][ T3591] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 33.166475][ T3591] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 33.184930][ T3591] lo speed is unknown, defaulting to 1000 [ 33.185169][ T3591] lo speed is unknown, defaulting to 1000 [ 33.185513][ T3591] lo speed is unknown, defaulting to 1000 [ 33.185740][ T3591] lo speed is unknown, defaulting to 1000 [ 33.186220][ T3591] lo speed is unknown, defaulting to 1000 [ 33.463947][ T3605] lo speed is unknown, defaulting to 1000 [ 33.508133][ T31] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1289: group 0, block bitmap and bg descriptor inconsistent: 0 vs 150994969 free clusters [ 33.523117][ T31] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 1 with error 28 [ 33.535362][ T31] EXT4-fs (loop4): This should not happen!! Data will be lost [ 33.535362][ T31] [ 33.545141][ T31] EXT4-fs (loop4): Total free blocks count 0 [ 33.551241][ T31] EXT4-fs (loop4): Free/Dirty block details [ 33.557170][ T31] EXT4-fs (loop4): free_blocks=2415919504 [ 33.562919][ T31] EXT4-fs (loop4): dirty_blocks=5872 [ 33.568292][ T31] EXT4-fs (loop4): Block reservation details [ 33.574293][ T31] EXT4-fs (loop4): i_reserved_data_blocks=369 [ 33.694232][ T31] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 18 with max blocks 2048 with error 28 [ 33.821421][ T3622] unsupported nla_type 52263 [ 33.916764][ T3625] netlink: 112 bytes leftover after parsing attributes in process `syz.4.31'. [ 34.031406][ T3625] loop4: detected capacity change from 0 to 8192 [ 34.272654][ T3635] loop0: detected capacity change from 0 to 128 [ 34.295680][ T3635] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 34.335655][ T3635] ext4 filesystem being mounted at /7/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 34.996816][ T3643] lo speed is unknown, defaulting to 1000 [ 35.075927][ T3653] lo speed is unknown, defaulting to 1000 [ 35.186326][ T3653] bridge_slave_0: left allmulticast mode [ 35.192122][ T3653] bridge_slave_0: left promiscuous mode [ 35.197826][ T3653] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.206231][ T3660] 9pnet_fd: Insufficient options for proto=fd [ 35.228807][ T3303] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 35.351171][ T3660] loop1: detected capacity change from 0 to 512 [ 35.368104][ T3653] bridge_slave_1: left allmulticast mode [ 35.373793][ T3653] bridge_slave_1: left promiscuous mode [ 35.379553][ T3653] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.468066][ T3664] loop0: detected capacity change from 0 to 512 [ 35.475128][ T3664] EXT4-fs: test_dummy_encryption option not supported [ 35.520343][ T3653] bond0: (slave bond_slave_0): Releasing backup interface [ 35.569832][ T3653] bond0: (slave bond_slave_1): Releasing backup interface [ 35.713232][ T3653] team0: Port device team_slave_0 removed [ 35.781950][ T3653] team0: Port device team_slave_1 removed [ 35.800925][ T3653] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 35.808816][ T3653] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 35.817788][ T3653] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 35.825203][ T3653] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 35.975027][ T3668] loop3: detected capacity change from 0 to 1024 [ 36.009556][ T3668] EXT4-fs: Ignoring removed nomblk_io_submit option [ 36.038183][ T3668] EXT4-fs: test_dummy_encryption option not supported [ 36.056916][ T3670] loop1: detected capacity change from 0 to 2048 [ 36.127549][ T29] kauditd_printk_skb: 1026 callbacks suppressed [ 36.127563][ T29] audit: type=1326 audit(1757201267.729:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3639 comm="syz.2.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fd1fb3714a5 code=0x7ffc0000 [ 36.196774][ T29] audit: type=1326 audit(1757201267.769:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3639 comm="syz.2.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fd1fb3714a5 code=0x7ffc0000 [ 36.200083][ T3670] EXT4-fs (loop1): mounted filesystem 00000800-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 36.220123][ T29] audit: type=1326 audit(1757201267.769:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3639 comm="syz.2.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fd1fb3714a5 code=0x7ffc0000 [ 36.256598][ T29] audit: type=1326 audit(1757201267.769:1148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3639 comm="syz.2.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fd1fb3714a5 code=0x7ffc0000 [ 36.279846][ T29] audit: type=1326 audit(1757201267.779:1149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3639 comm="syz.2.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fd1fb3714a5 code=0x7ffc0000 [ 36.303380][ T29] audit: type=1326 audit(1757201267.779:1150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3639 comm="syz.2.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fd1fb3714a5 code=0x7ffc0000 [ 36.325046][ T3670] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz.1.42: bg 0: block 120: padding at end of block bitmap is not set [ 36.326886][ T29] audit: type=1326 audit(1757201267.779:1151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3639 comm="syz.2.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fd1fb3714a5 code=0x7ffc0000 [ 36.364063][ T29] audit: type=1326 audit(1757201267.779:1152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3639 comm="syz.2.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fd1fb3714a5 code=0x7ffc0000 [ 36.387504][ T29] audit: type=1326 audit(1757201267.779:1153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3639 comm="syz.2.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fd1fb3714a5 code=0x7ffc0000 [ 36.410877][ T29] audit: type=1326 audit(1757201267.779:1154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3639 comm="syz.2.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fd1fb3714a5 code=0x7ffc0000 [ 36.543343][ T3688] loop0: detected capacity change from 0 to 512 [ 36.556627][ C0] hrtimer: interrupt took 26311 ns [ 36.608832][ T3689] netlink: 'syz.4.46': attribute type 13 has an invalid length. [ 36.708604][ T3689] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.715822][ T3689] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.808500][ T3695] netlink: 88 bytes leftover after parsing attributes in process `syz.3.47'. [ 37.013268][ T23] IPVS: starting estimator thread 0... [ 37.085387][ T3689] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 37.106763][ T3697] IPVS: using max 2352 ests per chain, 117600 per kthread [ 37.128220][ T3689] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 37.169970][ T3702] siw: device registration error -23 [ 37.217900][ T31] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 37.229830][ T31] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 37.251196][ T31] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 37.266006][ T31] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 37.455559][ T3709] loop4: detected capacity change from 0 to 128 [ 37.515130][ T3711] loop3: detected capacity change from 0 to 2048 [ 37.540468][ T3711] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 37.550569][ T3709] syz.4.54: attempt to access beyond end of device [ 37.550569][ T3709] loop4: rw=2049, sector=145, nr_sectors = 8 limit=128 [ 37.571544][ T3709] syz.4.54: attempt to access beyond end of device [ 37.571544][ T3709] loop4: rw=2049, sector=161, nr_sectors = 8 limit=128 [ 37.586292][ T3709] syz.4.54: attempt to access beyond end of device [ 37.586292][ T3709] loop4: rw=2049, sector=177, nr_sectors = 8 limit=128 [ 37.599804][ T3709] syz.4.54: attempt to access beyond end of device [ 37.599804][ T3709] loop4: rw=2049, sector=193, nr_sectors = 8 limit=128 [ 37.613437][ T3709] syz.4.54: attempt to access beyond end of device [ 37.613437][ T3709] loop4: rw=2049, sector=209, nr_sectors = 8 limit=128 [ 37.639204][ T3709] syz.4.54: attempt to access beyond end of device [ 37.639204][ T3709] loop4: rw=2049, sector=225, nr_sectors = 8 limit=128 [ 37.652634][ T3709] syz.4.54: attempt to access beyond end of device [ 37.652634][ T3709] loop4: rw=2049, sector=241, nr_sectors = 8 limit=128 [ 37.665969][ T3709] syz.4.54: attempt to access beyond end of device [ 37.665969][ T3709] loop4: rw=2049, sector=257, nr_sectors = 8 limit=128 [ 37.679650][ T3709] syz.4.54: attempt to access beyond end of device [ 37.679650][ T3709] loop4: rw=2049, sector=273, nr_sectors = 8 limit=128 [ 37.692992][ T3709] syz.4.54: attempt to access beyond end of device [ 37.692992][ T3709] loop4: rw=2049, sector=289, nr_sectors = 8 limit=128 [ 37.918223][ T3721] loop4: detected capacity change from 0 to 164 [ 37.978733][ T3720] process '{' launched '/dev/fd/6' with NULL argv: empty string added [ 38.113925][ T3725] netlink: 'syz.4.58': attribute type 4 has an invalid length. [ 38.121583][ T3725] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.58'. [ 38.159416][ T3727] pim6reg: entered allmulticast mode [ 38.166782][ T3727] pim6reg: left allmulticast mode [ 38.196118][ T3729] lo speed is unknown, defaulting to 1000 [ 38.225282][ T3725] netlink: 'syz.4.58': attribute type 3 has an invalid length. [ 38.244918][ T3725] netlink: 'syz.4.58': attribute type 3 has an invalid length. [ 38.272968][ T3725] syz.4.58 uses obsolete (PF_INET,SOCK_PACKET) [ 38.295637][ T3729] bridge_slave_0: left allmulticast mode [ 38.301471][ T3729] bridge_slave_0: left promiscuous mode [ 38.307271][ T3729] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.318741][ T31] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1289: group 0, block bitmap and bg descriptor inconsistent: 0 vs 150994969 free clusters [ 38.339677][ T31] EXT4-fs (loop3): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 1 with error 28 [ 38.352001][ T31] EXT4-fs (loop3): This should not happen!! Data will be lost [ 38.352001][ T31] [ 38.358679][ T3735] siw: device registration error -23 [ 38.361678][ T31] EXT4-fs (loop3): Total free blocks count 0 [ 38.372931][ T31] EXT4-fs (loop3): Free/Dirty block details [ 38.378865][ T31] EXT4-fs (loop3): free_blocks=2415919504 [ 38.384618][ T31] EXT4-fs (loop3): dirty_blocks=8224 [ 38.389965][ T31] EXT4-fs (loop3): Block reservation details [ 38.395952][ T31] EXT4-fs (loop3): i_reserved_data_blocks=514 [ 38.403816][ T3729] bridge_slave_1: left allmulticast mode [ 38.407884][ T31] EXT4-fs (loop3): Delayed block allocation failed for inode 15 at logical offset 18 with max blocks 2048 with error 28 [ 38.409739][ T3729] bridge_slave_1: left promiscuous mode [ 38.427866][ T3729] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.442628][ T3729] bond0: (slave bond_slave_0): Releasing backup interface [ 38.457501][ T3729] bond0: (slave bond_slave_1): Releasing backup interface [ 38.489549][ T3729] team0: Port device team_slave_0 removed [ 38.510111][ T3729] team0: Port device team_slave_1 removed [ 38.519222][ T3729] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 38.526778][ T3729] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 38.542033][ T3729] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 38.549568][ T3729] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 38.598194][ T3744] loop3: detected capacity change from 0 to 1024 [ 38.641162][ T3744] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.650842][ T3746] loop2: detected capacity change from 0 to 2048 [ 38.693650][ T3746] EXT4-fs (loop2): mounted filesystem 00000800-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.706438][ T3750] loop4: detected capacity change from 0 to 2048 [ 38.725939][ T3744] EXT4-fs (loop3): Delayed block allocation failed for inode 15 at logical offset 49 with max blocks 1 with error 28 [ 38.730098][ T3746] EXT4-fs error (device loop2): ext4_validate_block_bitmap:441: comm syz.2.66: bg 0: block 120: padding at end of block bitmap is not set [ 38.738342][ T3744] EXT4-fs (loop3): This should not happen!! Data will be lost [ 38.738342][ T3744] [ 38.762233][ T3744] EXT4-fs (loop3): Total free blocks count 0 [ 38.768278][ T3744] EXT4-fs (loop3): Free/Dirty block details [ 38.774223][ T3744] EXT4-fs (loop3): free_blocks=0 [ 38.779262][ T3744] EXT4-fs (loop3): dirty_blocks=0 [ 38.784307][ T3744] EXT4-fs (loop3): Block reservation details [ 38.790376][ T3744] EXT4-fs (loop3): i_reserved_data_blocks=0 [ 38.808170][ T3750] EXT4-fs (loop4): mounted filesystem 00000800-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.829960][ T3744] syz.3.65 (3744) used greatest stack depth: 10296 bytes left [ 38.847243][ T3307] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.876299][ T3762] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz.4.67: bg 0: block 120: padding at end of block bitmap is not set [ 38.989791][ T3768] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3768 comm=syz.3.70 [ 39.034921][ T3312] EXT4-fs (loop1): unmounting filesystem 00000800-0000-0000-0000-000000000000. [ 39.084982][ T3771] loop1: detected capacity change from 0 to 2048 [ 39.150016][ T3775] ipvlan2: entered promiscuous mode [ 39.161558][ T3775] loop3: detected capacity change from 0 to 1024 [ 39.168409][ T3775] EXT4-fs: Ignoring removed orlov option [ 39.198203][ T3775] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.292349][ T3307] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.312581][ T3780] siw: device registration error -23 [ 39.347911][ T3782] loop3: detected capacity change from 0 to 2048 [ 39.368040][ T3782] EXT4-fs (loop3): mounted filesystem 00000800-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.383466][ T3782] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz.3.75: bg 0: block 120: padding at end of block bitmap is not set [ 39.525053][ T3304] EXT4-fs (loop4): unmounting filesystem 00000800-0000-0000-0000-000000000000. [ 39.558075][ T3787] lo speed is unknown, defaulting to 1000 [ 39.593158][ T3787] bridge_slave_0: left allmulticast mode [ 39.598989][ T3787] bridge_slave_0: left promiscuous mode [ 39.604727][ T3787] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.612485][ T3787] bridge_slave_1: left allmulticast mode [ 39.618162][ T3787] bridge_slave_1: left promiscuous mode [ 39.623970][ T3787] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.632311][ T3787] bond0: (slave bond_slave_0): Releasing backup interface [ 39.641056][ T3787] bond0: (slave bond_slave_1): Releasing backup interface [ 39.650087][ T3787] team0: Port device team_slave_0 removed [ 39.657122][ T3787] team0: Port device team_slave_1 removed [ 39.663213][ T3787] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 39.670851][ T3787] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 39.775754][ T3799] loop4: detected capacity change from 0 to 1024 [ 39.789640][ T3799] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.809886][ T3799] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 49 with max blocks 1 with error 28 [ 39.822240][ T3799] EXT4-fs (loop4): This should not happen!! Data will be lost [ 39.822240][ T3799] [ 39.831964][ T3799] EXT4-fs (loop4): Total free blocks count 0 [ 39.837975][ T3799] EXT4-fs (loop4): Free/Dirty block details [ 39.843858][ T3799] EXT4-fs (loop4): free_blocks=0 [ 39.846792][ T3771] syz.1.71 (3771) used greatest stack depth: 10016 bytes left [ 39.848826][ T3799] EXT4-fs (loop4): dirty_blocks=0 [ 39.861403][ T3799] EXT4-fs (loop4): Block reservation details [ 39.867418][ T3799] EXT4-fs (loop4): i_reserved_data_blocks=0 [ 39.899083][ T3804] loop1: detected capacity change from 0 to 2048 [ 39.912395][ T3304] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.924062][ T3804] EXT4-fs (loop1): mounted filesystem 00000800-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.940127][ T3804] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz.1.82: bg 0: block 120: padding at end of block bitmap is not set [ 40.342353][ T3814] loop4: detected capacity change from 0 to 1024 [ 40.350697][ T3814] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 40.361633][ T3814] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 40.371456][ T3814] JBD2: no valid journal superblock found [ 40.377252][ T3814] EXT4-fs (loop4): Could not load journal inode [ 40.388641][ T3814] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 40.511789][ T3818] siw: device registration error -23 [ 40.542054][ T3820] loop4: detected capacity change from 0 to 164 [ 40.552555][ T3820] iso9660: Unknown parameter '' [ 40.562304][ T3820] netlink: 28 bytes leftover after parsing attributes in process `syz.4.86'. [ 40.573554][ T3820] hub 6-0:1.0: USB hub found [ 40.578570][ T3820] hub 6-0:1.0: 8 ports detected [ 40.625520][ T3822] lo speed is unknown, defaulting to 1000 [ 40.715536][ T3825] loop4: detected capacity change from 0 to 2048 [ 40.743218][ T3825] EXT4-fs (loop4): mounted filesystem 00000800-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.760095][ T3825] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz.4.88: bg 0: block 120: padding at end of block bitmap is not set [ 41.654900][ T3309] EXT4-fs (loop2): unmounting filesystem 00000800-0000-0000-0000-000000000000. [ 41.785779][ T29] kauditd_printk_skb: 985 callbacks suppressed [ 41.785797][ T29] audit: type=1400 audit(1757201273.379:2140): avc: denied { create } for pid=3839 comm="syz.2.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 41.827231][ T29] audit: type=1400 audit(1757201273.379:2141): avc: denied { write } for pid=3839 comm="syz.2.92" name="protocols" dev="proc" ino=4026532502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 42.016203][ T3841] loop2: detected capacity change from 0 to 32768 [ 42.079306][ T3841] loop2: p1 p3 < > [ 42.169181][ T29] audit: type=1326 audit(1757201273.769:2142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3839 comm="syz.2.92" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1fb33ebe9 code=0x7ffc0000 [ 42.194495][ T3841] netlink: 16 bytes leftover after parsing attributes in process `syz.2.92'. [ 42.203196][ T29] audit: type=1326 audit(1757201273.769:2143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3839 comm="syz.2.92" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1fb33ebe9 code=0x7ffc0000 [ 42.226676][ T29] audit: type=1326 audit(1757201273.799:2144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3839 comm="syz.2.92" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd1fb33ebe9 code=0x7ffc0000 [ 42.249858][ T29] audit: type=1326 audit(1757201273.799:2145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3839 comm="syz.2.92" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1fb33ebe9 code=0x7ffc0000 [ 42.273191][ T29] audit: type=1326 audit(1757201273.799:2146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3839 comm="syz.2.92" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1fb33ebe9 code=0x7ffc0000 [ 42.297300][ T29] audit: type=1326 audit(1757201273.799:2147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3839 comm="syz.2.92" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd1fb33ebe9 code=0x7ffc0000 [ 42.320582][ T29] audit: type=1326 audit(1757201273.799:2148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3839 comm="syz.2.92" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1fb33ebe9 code=0x7ffc0000 [ 42.343852][ T29] audit: type=1326 audit(1757201273.799:2149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3839 comm="syz.2.92" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1fb33ebe9 code=0x7ffc0000 [ 42.376360][ T3307] EXT4-fs (loop3): unmounting filesystem 00000800-0000-0000-0000-000000000000. [ 42.449132][ T2996] ================================================================== [ 42.457286][ T2996] BUG: KCSAN: data-race in dont_mount / step_into [ 42.463726][ T2996] [ 42.466090][ T2996] read-write to 0xffff88811a12d480 of 4 bytes by task 3598 on cpu 1: [ 42.474173][ T2996] dont_mount+0x2a/0x40 [ 42.478346][ T2996] vfs_unlink+0x28f/0x420 [ 42.482707][ T2996] do_unlinkat+0x24e/0x480 [ 42.487150][ T2996] __x64_sys_unlink+0x2e/0x40 [ 42.491845][ T2996] x64_sys_call+0x2dc0/0x2ff0 [ 42.496544][ T2996] do_syscall_64+0xd2/0x200 [ 42.501066][ T2996] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.506969][ T2996] [ 42.509294][ T2996] read to 0xffff88811a12d480 of 4 bytes by task 2996 on cpu 0: [ 42.516931][ T2996] step_into+0xe3/0x820 [ 42.521112][ T2996] walk_component+0x162/0x220 [ 42.526067][ T2996] path_lookupat+0xfe/0x2a0 [ 42.530590][ T2996] filename_lookup+0x147/0x340 [ 42.535384][ T2996] do_readlinkat+0x7d/0x320 [ 42.539897][ T2996] __x64_sys_readlink+0x47/0x60 [ 42.544765][ T2996] x64_sys_call+0x28da/0x2ff0 [ 42.549448][ T2996] do_syscall_64+0xd2/0x200 [ 42.553972][ T2996] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.559879][ T2996] [ 42.562219][ T2996] value changed: 0x00300080 -> 0x00004080 [ 42.567944][ T2996] [ 42.570280][ T2996] Reported by Kernel Concurrency Sanitizer on: [ 42.576467][ T2996] CPU: 0 UID: 0 PID: 2996 Comm: udevd Not tainted syzkaller #0 PREEMPT(voluntary) [ 42.585853][ T2996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 42.595926][ T2996] ================================================================== [ 42.610477][ T3848] loop3: detected capacity change from 0 to 512 [ 42.642671][ T3848] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 42.662174][ T3848] ext4 filesystem being mounted at /19/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 42.776415][ T3307] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.899361][ T3312] EXT4-fs (loop1): unmounting filesystem 00000800-0000-0000-0000-000000000000. [ 42.976219][ T3840] syz.2.92 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 42.990234][ T3840] CPU: 1 UID: 0 PID: 3840 Comm: syz.2.92 Not tainted syzkaller #0 PREEMPT(voluntary) [ 42.990260][ T3840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 42.990272][ T3840] Call Trace: [ 42.990278][ T3840] [ 42.990285][ T3840] __dump_stack+0x1d/0x30 [ 42.990379][ T3840] dump_stack_lvl+0xe8/0x140 [ 42.990411][ T3840] dump_stack+0x15/0x1b [ 42.990433][ T3840] dump_header+0x81/0x220 [ 42.990478][ T3840] oom_kill_process+0x342/0x400 [ 42.990547][ T3840] out_of_memory+0x979/0xb80 [ 42.990660][ T3840] try_charge_memcg+0x5e6/0x9e0 [ 42.990747][ T3840] obj_cgroup_charge_pages+0xa6/0x150 [ 42.990784][ T3840] __memcg_kmem_charge_page+0x9f/0x170 [ 42.990874][ T3840] __alloc_frozen_pages_noprof+0x188/0x360 [ 42.990913][ T3840] alloc_pages_mpol+0xb3/0x250 [ 42.990950][ T3840] alloc_pages_noprof+0x90/0x130 [ 42.991026][ T3840] __vmalloc_node_range_noprof+0x6f2/0xe00 [ 42.991125][ T3840] __kvmalloc_node_noprof+0x30f/0x4e0 [ 42.991225][ T3840] ? ip_set_alloc+0x1f/0x30 [ 42.991243][ T3840] ? ip_set_alloc+0x1f/0x30 [ 42.991262][ T3840] ? hash_netiface_create+0x21b/0x740 [ 42.991283][ T3840] ? __kmalloc_cache_noprof+0x189/0x320 [ 42.991319][ T3840] ip_set_alloc+0x1f/0x30 [ 42.991407][ T3840] hash_netiface_create+0x282/0x740 [ 42.991436][ T3840] ? __pfx_hash_netiface_create+0x10/0x10 [ 42.991463][ T3840] ip_set_create+0x3c9/0x960 [ 42.991563][ T3840] ? __nla_parse+0x40/0x60 [ 42.991606][ T3840] nfnetlink_rcv_msg+0x4c3/0x590 [ 42.991646][ T3840] netlink_rcv_skb+0x123/0x220 [ 42.991673][ T3840] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 42.991742][ T3840] nfnetlink_rcv+0x16b/0x1690 [ 42.991788][ T3840] ? nlmon_xmit+0x4f/0x60 [ 42.991816][ T3840] ? consume_skb+0x49/0x150 [ 42.991913][ T3840] ? nlmon_xmit+0x4f/0x60 [ 42.991938][ T3840] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 42.991970][ T3840] ? __dev_queue_xmit+0x1200/0x2000 [ 42.992002][ T3840] ? __dev_queue_xmit+0x182/0x2000 [ 42.992025][ T3840] ? ref_tracker_free+0x37d/0x3e0 [ 42.992050][ T3840] ? __netlink_deliver_tap+0x4dc/0x500 [ 42.992105][ T3840] netlink_unicast+0x5bd/0x690 [ 42.992127][ T3840] netlink_sendmsg+0x58b/0x6b0 [ 42.992150][ T3840] ? __pfx_netlink_sendmsg+0x10/0x10 [ 42.992192][ T3840] __sock_sendmsg+0x142/0x180 [ 42.992263][ T3840] ____sys_sendmsg+0x31e/0x4e0 [ 42.992312][ T3840] ___sys_sendmsg+0x17b/0x1d0 [ 42.992416][ T3840] __x64_sys_sendmsg+0xd4/0x160 [ 42.992507][ T3840] x64_sys_call+0x191e/0x2ff0 [ 42.992528][ T3840] do_syscall_64+0xd2/0x200 [ 42.992559][ T3840] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 42.992586][ T3840] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 42.992629][ T3840] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.992651][ T3840] RIP: 0033:0x7fd1fb33ebe9 [ 42.992668][ T3840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.992689][ T3840] RSP: 002b:00007fd1f9d9f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 42.992710][ T3840] RAX: ffffffffffffffda RBX: 00007fd1fb575fa0 RCX: 00007fd1fb33ebe9 [ 42.992724][ T3840] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000003 [ 42.992736][ T3840] RBP: 00007fd1fb3c1e19 R08: 0000000000000000 R09: 0000000000000000 [ 42.992756][ T3840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 42.992770][ T3840] R13: 00007fd1fb576038 R14: 00007fd1fb575fa0 R15: 00007ffc6df64218 [ 42.992829][ T3840] [ 42.992837][ T3840] memory: usage 307200kB, limit 307200kB, failcnt 3905 [ 43.012564][ T3839] ================================================================== [ 43.015789][ T3840] memory+swap: usage 332152kB, limit 9007199254740988kB, failcnt 0 [ 43.018746][ T3839] BUG: KCSAN: data-race in mem_cgroup_flush_stats_ratelimited / tick_do_update_jiffies64 [ 43.023127][ T3840] kmem: usage 307200kB, limit 9007199254740988kB, failcnt 0 [ 43.027691][ T3839] [ 43.027696][ T3839] read-write to 0xffffffff868099c0 of 8 bytes by interrupt on cpu 1: [ 43.027715][ T3839] tick_do_update_jiffies64+0x113/0x1c0 [ 43.027739][ T3839] tick_nohz_handler+0x7f/0x2d0 [ 43.031890][ T3840] Memory cgroup stats for /syz2 [ 43.036203][ T3839] __hrtimer_run_queues+0x20f/0x5a0 [ 43.041071][ T3840] : [ 43.045613][ T3839] hrtimer_interrupt+0x21a/0x460 [ 43.051270][ T3840] cache 0 [ 43.055807][ T3839] __sysvec_apic_timer_interrupt+0x5c/0x1d0 [ 43.061306][ T3840] rss 0 [ 43.067071][ T3839] sysvec_apic_timer_interrupt+0x6f/0x80 [ 43.071848][ T3840] shmem 0 [ 43.071858][ T3840] mapped_file 0 [ 43.076772][ T3839] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 43.076803][ T3839] console_flush_all+0x55b/0x730 [ 43.082624][ T3840] dirty 0 [ 43.082635][ T3840] writeback 0 [ 43.087985][ T3839] console_unlock+0xa1/0x330 [ 43.088001][ T3839] vprintk_emit+0x388/0x650 [ 43.088025][ T3839] vprintk_default+0x26/0x30 [ 43.088044][ T3839] vprintk+0x1d/0x30 [ 43.092538][ T3840] workingset_refault_anon 223 [ 43.097029][ T3839] _printk+0x79/0xa0 [ 43.102409][ T3840] workingset_refault_file 475 [ 43.107940][ T3839] mem_cgroup_print_oom_meminfo+0x84/0x250 [ 43.107965][ T3839] dump_header+0xa0/0x220 [ 43.112281][ T3840] swap 25550848 [ 43.112290][ T3840] swapcached 0 [ 43.117462][ T3839] oom_kill_process+0x342/0x400 [ 43.117500][ T3839] out_of_memory+0x979/0xb80 [ 43.123202][ T3840] pgpgin 16763 [ 43.123211][ T3840] pgpgout 16763 [ 43.127777][ T3839] try_charge_memcg+0x5e6/0x9e0 [ 43.127800][ T3839] obj_cgroup_charge_pages+0xa6/0x150 [ 43.127830][ T3839] __memcg_kmem_charge_page+0x9f/0x170 [ 43.127856][ T3839] __alloc_frozen_pages_noprof+0x188/0x360 [ 43.127887][ T3839] alloc_pages_mpol+0xb3/0x250 [ 43.132280][ T3840] pgfault 21960 [ 43.132288][ T3840] pgmajfault 82 [ 43.137199][ T3839] alloc_pages_noprof+0x90/0x130 [ 43.137236][ T3839] __vmalloc_node_range_noprof+0x6f2/0xe00 [ 43.141994][ T3840] inactive_anon 0 [ 43.142005][ T3840] active_anon 0 [ 43.147443][ T3839] __kvmalloc_node_noprof+0x30f/0x4e0 [ 43.147470][ T3839] ip_set_alloc+0x1f/0x30 [ 43.147489][ T3839] hash_netiface_create+0x282/0x740 [ 43.147505][ T3839] ip_set_create+0x3c9/0x960 [ 43.147522][ T3839] nfnetlink_rcv_msg+0x4c3/0x590 [ 43.152196][ T3840] inactive_file 0 [ 43.156505][ T3839] netlink_rcv_skb+0x123/0x220 [ 43.161074][ T3840] active_file 0 [ 43.165369][ T3839] nfnetlink_rcv+0x16b/0x1690 [ 43.170675][ T3840] unevictable 0 [ 43.175925][ T3839] netlink_unicast+0x5bd/0x690 [ 43.181051][ T3840] hierarchical_memory_limit 314572800 [ 43.186043][ T3839] netlink_sendmsg+0x58b/0x6b0 [ 43.191533][ T3840] hierarchical_memsw_limit 9223372036854771712 [ 43.196259][ T3839] __sock_sendmsg+0x142/0x180 [ 43.201049][ T3840] total_cache 0 [ 43.206286][ T3839] ____sys_sendmsg+0x31e/0x4e0 [ 43.210978][ T3840] total_rss 0 [ 43.215697][ T3839] ___sys_sendmsg+0x17b/0x1d0 [ 43.220369][ T3840] total_shmem 0 [ 43.225184][ T3839] __x64_sys_sendmsg+0xd4/0x160 [ 43.229864][ T3840] total_mapped_file 0 [ 43.234329][ T3839] x64_sys_call+0x191e/0x2ff0 [ 43.240400][ T3840] total_dirty 0 [ 43.246134][ T3839] do_syscall_64+0xd2/0x200 [ 43.252048][ T3840] total_writeback 0 [ 43.256420][ T3839] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.276118][ T3840] total_workingset_refault_anon 223 [ 43.284464][ T3839] [ 43.284471][ T3839] read to 0xffffffff868099c0 of 8 bytes by task 3839 on cpu 0: [ 43.284488][ T3839] mem_cgroup_flush_stats_ratelimited+0x29/0x70 [ 43.292480][ T3840] total_workingset_refault_file 475 [ 43.300416][ T3839] count_shadow_nodes+0x6a/0x230 [ 43.300439][ T3839] do_shrink_slab+0x60/0x680 [ 43.308423][ T3840] total_swap 25550848 [ 43.316364][ T3839] shrink_slab+0x448/0x760 [ 43.324598][ T3840] total_swapcached 0 [ 43.327616][ T3839] shrink_node+0x6c3/0x2120 [ 43.327645][ T3839] do_try_to_free_pages+0x3f6/0xcd0 [ 43.327665][ T3839] try_to_free_mem_cgroup_pages+0x1ab/0x410 [ 43.327688][ T3839] try_charge_memcg+0x358/0x9e0 [ 43.327709][ T3839] charge_memcg+0x51/0xc0 [ 43.327727][ T3839] mem_cgroup_swapin_charge_folio+0xcc/0x150 [ 43.327750][ T3839] __read_swap_cache_async+0x1df/0x350 [ 43.327782][ T3839] swap_cluster_readahead+0x376/0x3e0 [ 43.327815][ T3839] swapin_readahead+0xde/0x6f0 [ 43.327848][ T3839] do_swap_page+0x301/0x2430 [ 43.327869][ T3839] handle_mm_fault+0x9a5/0x2c20 [ 43.327892][ T3839] do_user_addr_fault+0x636/0x1090 [ 43.327927][ T3839] exc_page_fault+0x62/0xa0 [ 43.327960][ T3839] asm_exc_page_fault+0x26/0x30 [ 43.327980][ T3839] [ 43.327984][ T3839] value changed: 0x00000000ffff9b5f -> 0x00000000ffff9b60 [ 43.327996][ T3839] [ 43.328000][ T3839] Reported by Kernel Concurrency Sanitizer on: [ 43.328012][ T3839] CPU: 0 UID: 0 PID: 3839 Comm: syz.2.92 Not tainted syzkaller #0 PREEMPT(voluntary) [ 43.328038][ T3839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 43.328048][ T3839] ================================================================== [ 43.345871][ T3845] syz.0.93 (3845) used greatest stack depth: 10008 bytes left [ 43.351715][ T3840] total_pgpgin 16763 [ 43.861252][ T3840] total_pgpgout 16763 [ 43.865254][ T3840] total_pgfault 21960 [ 43.869269][ T3840] total_pgmajfault 82 [ 43.873265][ T3840] total_inactive_anon 0 [ 43.877462][ T3840] total_active_anon 0 [ 43.881468][ T3840] total_inactive_file 0 [ 43.885682][ T3840] total_active_file 0 [ 43.889693][ T3840] total_unevictable 0 [ 43.893753][ T3840] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.92,pid=3839,uid=0 [ 43.908327][ T3840] Memory cgroup out of memory: Killed process 3839 (syz.2.92) total-vm:100244kB, anon-rss:1008kB, file-rss:26464kB, shmem-rss:128kB, UID:0 pgtables:164kB oom_score_adj:1000 [ 43.926902][ T3304] EXT4-fs (loop4): unmounting filesystem 00000800-0000-0000-0000-000000000000. [ 43.985035][ T3839] syz.2.92 (3839) used greatest stack depth: 9880 bytes left [ 43.992645][ T3842] syz.2.92 (3842) used greatest stack depth: 8984 bytes left [ 44.173894][ T3840] syz.2.92 (3840) used greatest stack depth: 6408 bytes left [ 44.184797][ T2996] loop2: p1 p3 < >