last executing test programs: 984.558034ms ago: executing program 3 (id=4): syz_read_part_table(0x618, &(0x7f0000002200)="$eJzs3D+IFGcUAPC3dzc7dwqehUWwiWctBMXSK6LsbQwGZE0IHBb5iwhXXeBgQxY3eEVyheIWYplGApviXKvoFVY5FFIHsTAIW9gETBNiipsws3O3GzgOEjaE4O9XfN/bnTfvzQfTvgn+1yYiKaMsLbY3PtozP5sdxu14r1tbOJtlWfZuRCUuRhJzyYFeRExF9G6NVI2jEbF/pM7tb/ZtfP3rW0n3yYVktH470jiY51YjL1ma2e1R0r99WMZufX5z9urqcv1a/qPe6m+9H3HnRa1x79xapzeZnPkk//9KxMMyf6pYZya27/9wKv5yZQ9fDsPKaP/tl+Py43qrf6v77PjW4frk95dOvTyycf3BiYiVvPL5KF72oeo/P/Oo9fnNrFT0X5m7sdhpnT5299DNk837jxrPJ38vLw9aToynLQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/5L1fFmtxrXm/OXH9Vb/q59+fOfOi1rj3rm1Tu/t6pmnlUHewzJ/qtw/i2Z8HklELMVSfBrLu5d/bSc6sBMtVkb7z2/OXl1drg/6/7Ev4tnxrcP17sylUy8XNq4/OFFkVWI63ybGevRd+rf6K3M3Fjut08fuHrp5snn/UeP55CBvKY2Pi+NGRDr+xwAAAAAAAAAAAAAAAAAAAOAVV1s4e+T8m42DeXxxOiJ++aKYss/Sme+imLwfOFruT9PBKP/t6cG3ALpPLvxW/eCHtZ/Lofh2pNGOiP3fJhHx+k6fK8W6/fWASIaV+S/9GQAA///p7o1q") r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = socket$rds(0x15, 0x5, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x18) getpeername$l2tp(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001d00)={&(0x7f00000017c0)={0x2, 0x0, @private=0xa010101}, 0x10, 0x0, 0x0, &(0x7f0000001c00)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000001a00)=""/116, 0x74}, &(0x7f0000001b40)=[{&(0x7f0000001a80)=""/79, 0x4f}], 0x1}}], 0x48}, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000600)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000002"], 0x110) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x4e20, @empty}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000000)={0x2, {{0x2, 0x4e26, @multicast2}}, {{0x2, 0x2, @dev={0xac, 0x14, 0x14, 0x37}}}}, 0x108) creat(&(0x7f0000000100)='./bus\x00', 0x0) r5 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r5, 0xffffffffffffffff, 0xee00) r6 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r5) r7 = add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000640)="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", 0x164, r6) add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="f9194d26602290eb92764edb4b31", 0xe, r7) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003b000b05d25a806c8c6f94f90224fc600e0005000a000200053582c137153e3704000b80fc0b09000300", 0x33fe0}], 0x1}, 0x0) preadv2(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000001200)=""/4096, 0xfffffdef}], 0x1, 0x0, 0x0, 0x0) 940.125275ms ago: executing program 2 (id=3): r0 = creat(&(0x7f0000000080)='./file0\x00', 0xa) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a000000020000000900000008"], 0x48) r3 = syz_io_uring_setup(0x4cef, &(0x7f0000000000)={0x0, 0x949, 0x100, 0x1, 0x2aa}, &(0x7f00000000c0)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_ACCEPT={0xd, 0x0, 0x5, r3, 0x0, 0x0, 0x0, 0x80800}) io_uring_enter(r3, 0xb516, 0xc2de, 0x8, 0x0, 0x0) io_uring_enter(r3, 0xe2e, 0x78bf, 0x20, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r8 = socket$can_j1939(0x1d, 0x2, 0x7) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$ifreq_SIOCGIFINDEX_wireguard(r8, 0x8933, &(0x7f0000000300)={'wg0\x00', 0x0}) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', r11, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) getrusage(0x1, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10}, 0x10) sendto$inet6(r0, &(0x7f0000000500)="33abfd5937257394ed623a244c6fd9176f7e635acc4f277482dc584971bb7683f83f6423a5b76ff3fa7c486d7cc63d9e152edfb1350fdb28d20e89d158d9c14e5d7be0649c41b56178d67ca0e07ca45c4e9c4150057d421a9cef410df6d6673f1415091647ae67f0658a484b189cff6244e088b5a3da84f8a618e1e0104f1affafd8231df0d2ad5d00e62a544f1aead7c6dc62c8e5f5782c9b3c06e0df1e55f28ec5c0226ade7435a1f8a78313c612912fc0af13328eda5549dd378c634acd3a75eed5bb2f9b", 0xc6, 0x20008091, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0x2c}, 0x3}, 0x1c) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x34, r7, 0x6a98047402e98331, 0x1000000, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x50}, 0x4886) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)=@generic={&(0x7f00000001c0)='./file0\x00', r2}, 0x18) 656.050949ms ago: executing program 0 (id=1): setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x16, &(0x7f0000fcb000)=0xfffffffc, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r2 = gettid() rt_sigtimedwait(&(0x7f0000000240)={[0xffffffffffffffff]}, 0x0, 0x0, 0x8) tkill(r2, 0x12) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x5}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./bus\x00', 0x2000006, &(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',obj_role=,hash,\x00'], 0x25, 0x34f, &(0x7f00000004c0)="$eJzs3T9sG2UUAPDnXhKnESUekCqYDBsSqpogBpgSVUWqyABFFv8WLJryJzaVYmEpDHG8gComEAsSTGwdYOyMGBBiY2ClSKiAWOhWqRGHbJ/tc+xQZ3Boxe83RE/v+9597y6n3CVKvrzeiq1L83H51q2bsbhYiLm1c2txuxClOBFJ9OzFRB8tTM4DAPe422kaf6U9d5/9yVI/8uwHgPtX9/n/5qlhoniE4qsPzKIlAGDGpvz+//mJ2SszawsAmKGx5/9jI8MHfsw/N/idAADg/vXiK68+t74RcbFcXoyof9isNCvxzHB8/XK8HbXYjLOxHPsRvReF3ttC5+OzFzbOny13/FaKSqeiWYmot5qV3pvCetKtL8ZKLEcpq08H9UmnfqVbX46IvVZ3/agXmpX5WMrW/3kpNmM1luOhsfqICxvnV8vZASr1fn0roh2L/ZPo9H8mluPHN+JK1OJSdGqH/e+ulMvn0o2R+ua1YnceAAAAAAAAAAAAAAAAAAAAAADMwpnyQGmw/01abzU/uHhwQmlkf5xKbzjbH6jd2x8oLfZ357maHNwfaHR/nmZlLk78p2cOAAAAAAAAAAAAAAAAAAAA947GzkJUa7XN7cbO+1v5oJXLvPv9V9+ejP7QXFb6TjKsiiw5cpz+xNyRkxgskQ7K02RkThYkEf3Je9Vr1wcd5+cUB2cxVt4JimNDhaynaq126tFfP59U9Xcn2Otmkhi7LKNBIVs/N1R/sJNYjIj9w6oOD1bvMudGmqaHle9+Nl4VhYi5OHIbUwTf3Xzr4Scbp5/qZr7JNn14/Inll258+uUfW9VatHtXplZb2G7sp1McudPr+FCSu38K2XUuTLgTJgftYaa93dipJj/9+fIjH/9wYHIy+f5J85n3Dl/r64OZhV5QiCj1L8K/tTo/4eafHLx2Z3D3Hv0Td/qLter13V9+n7Yq90XCRh0AAAAAAAAAAAAAAAAAAHAscn8rfgRPvzC7jgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg+A3//38uaI9lpgnutGJ8qLi53Th08ZPHeqoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPyP/RMAAP//rShzCQ==") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6d) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r6, 0x0) r7 = syz_clone(0x40200, 0x0, 0x49, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x40000002000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xa2, 0x10000, 0x0, 0x0, 0xfffffffc, 0xfffe, 0x0, 0x0, 0x0, 0xfffc}, r7, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r5, 0x20, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="18027a0000000000000000003b00000095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0x1000, &(0x7f0000001c80)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9, r4, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$nl_route(0x10, 0x3, 0x0) r10 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r10, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) 645.953039ms ago: executing program 3 (id=6): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0xc) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback, 0x7fff}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="1a", 0x34000, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) 595.96357ms ago: executing program 1 (id=2): r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) flock(r1, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x3, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x27, 0x3, 0x1}, 0x6) flock(r0, 0x2) close_range(r0, 0xffffffffffffffff, 0x0) 581.386771ms ago: executing program 4 (id=5): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'veth1_to_bridge\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@newqdisc={0x4c, 0x24, 0xf0b, 0x2000, 0x25dfdbfd, {0x0, 0x0, 0x0, r1, {0x0, 0xc}, {0xffff, 0xfff3}, {0xd, 0x2}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x1c, 0x2, [@TCA_CAKE_ACK_FILTER={0x8}, @TCA_CAKE_NAT={0x8, 0xb, 0x1}, @TCA_CAKE_RAW={0x8, 0xc, 0x1}]}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x44004}, 0x4000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r2}, 0x8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000200), &(0x7f0000000280)=0x4) rt_sigaction(0x19, 0x0, 0x0, 0x8, &(0x7f0000000440)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000005c0)='sched_kthread_work_queue_work\x00', r3, 0x0, 0x1}, 0x2) syz_mount_image$ext4(&(0x7f0000000600)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000008c0)={[{@noload}, {@dioread_lock}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@stripe={'stripe', 0x3d, 0x9}}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@nodioread_nolock}, {@quota}, {@nomblk_io_submit}, {@dax}]}, 0x7, 0x4c6, &(0x7f0000000b00)="$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") r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYRESOCT], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r5, @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') preadv(r7, &(0x7f0000000180)=[{&(0x7f0000000680)=""/197, 0xc5}], 0x1, 0x73, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x8000002}, 0x18) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00'}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r10}, 0x10) r11 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet(r11, &(0x7f0000000340)={&(0x7f0000000100)={0x2, 0x4e1e, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1c0000000000000000000000070000000189", @ANYRES64=r11, @ANYRES32=r4, @ANYRES64], 0x20}, 0x4000) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x103}, 0x0) 546.537821ms ago: executing program 3 (id=7): syz_read_part_table(0x618, &(0x7f0000002200)="$eJzs3D+IFGcUAPC3dzc7dwqehUWwiWctBMXSK6LsbQwGZE0IHBb5iwhXXeBgQxY3eEVyheIWYplGApviXKvoFVY5FFIHsTAIW9gETBNiipsws3O3GzgOEjaE4O9XfN/bnTfvzQfTvgn+1yYiKaMsLbY3PtozP5sdxu14r1tbOJtlWfZuRCUuRhJzyYFeRExF9G6NVI2jEbF/pM7tb/ZtfP3rW0n3yYVktH470jiY51YjL1ma2e1R0r99WMZufX5z9urqcv1a/qPe6m+9H3HnRa1x79xapzeZnPkk//9KxMMyf6pYZya27/9wKv5yZQ9fDsPKaP/tl+Py43qrf6v77PjW4frk95dOvTyycf3BiYiVvPL5KF72oeo/P/Oo9fnNrFT0X5m7sdhpnT5299DNk837jxrPJ38vLw9aToynLQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/5L1fFmtxrXm/OXH9Vb/q59+fOfOi1rj3rm1Tu/t6pmnlUHewzJ/qtw/i2Z8HklELMVSfBrLu5d/bSc6sBMtVkb7z2/OXl1drg/6/7Ev4tnxrcP17sylUy8XNq4/OFFkVWI63ybGevRd+rf6K3M3Fjut08fuHrp5snn/UeP55CBvKY2Pi+NGRDr+xwAAAAAAAAAAAAAAAAAAAOAVV1s4e+T8m42DeXxxOiJ++aKYss/Sme+imLwfOFruT9PBKP/t6cG3ALpPLvxW/eCHtZ/Lofh2pNGOiP3fJhHx+k6fK8W6/fWASIaV+S/9GQAA///p7o1q") r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = socket$rds(0x15, 0x5, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x18) getpeername$l2tp(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001d00)={&(0x7f00000017c0)={0x2, 0x0, @private=0xa010101}, 0x10, 0x0, 0x0, &(0x7f0000001c00)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000001a00)=""/116, 0x74}, &(0x7f0000001b40)=[{&(0x7f0000001a80)=""/79, 0x4f}], 0x1}}], 0x48}, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000600)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000002"], 0x110) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x4e20, @empty}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000000)={0x2, {{0x2, 0x4e26, @multicast2}}, {{0x2, 0x2, @dev={0xac, 0x14, 0x14, 0x37}}}}, 0x108) creat(&(0x7f0000000100)='./bus\x00', 0x0) r5 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r5, 0xffffffffffffffff, 0xee00) r6 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r5) r7 = add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000640)="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", 0x164, r6) add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="f9194d26602290eb92764edb4b31", 0xe, r7) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r8 = open(&(0x7f0000000080)='./bus\x00', 0x147842, 0x49) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003b000b05d25a806c8c6f94f90224fc600e0005000a000200053582c137153e3704000b80fc0b09000300", 0x33fe0}], 0x1}, 0x0) preadv2(r8, &(0x7f0000000040)=[{&(0x7f0000001200)=""/4096, 0xfffffdef}], 0x1, 0x0, 0x0, 0x0) 469.765882ms ago: executing program 1 (id=8): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x700, 0x0, [@sadb_key={0x2, 0x9, 0x18, 0x0, "01d787"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @private}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev}}]}, 0x60}, 0x1, 0x7}, 0x0) open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x14) r4 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x89ff, &(0x7f0000001440)={'veth0_to_bridge\x00', 0x0}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r5) sendmsg$NLBL_MGMT_C_ADDDEF(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[], 0x1c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r8 = open(&(0x7f0000000300)='.\x00', 0x0, 0x101) ioctl$FS_IOC_SETFLAGS(r8, 0x40086602, &(0x7f00000001c0)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000df0000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000090000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000430000009500000000000000"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r9}, 0x10) creat(&(0x7f00000000c0)='./file0\x00', 0x48) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733dea922c26e371134480d5337eb0d4e939bb8ab2b35129f269bf4a7812861cbc66414347cbaee18ecb71fb233562f6453ec124e9834589792c552e0ae55f86423d30769b3f48f8940c5621d76b06e969cad81bc7f186fac4b903d0b0d9b936c998d5af5b303f874edd85b3060f0e854074bd36d57756396433e90dbca7453f21ed3cf50df966980d3bbfbf7938f423273024963fc4e6f23ac5b20b22a74b3df43b01e3923d6eed00ed9630cf43ce83cbc49b462b433ae14b38635c31705e581f462534709e0809acce0b0bea47ddb8da14fe72fda9f4bf96a5a4a5c0e792501f06951b0a009b1a4ff9dc551c9e", @ANYRESHEX]) 269.271075ms ago: executing program 4 (id=9): syz_read_part_table(0x618, &(0x7f0000002200)="$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") r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = socket$rds(0x15, 0x5, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x18) getpeername$l2tp(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bind$rds(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001d00)={&(0x7f00000017c0)={0x2, 0x0, @private=0xa010101}, 0x10, 0x0, 0x0, &(0x7f0000001c00)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000001a00)=""/116, 0x74}, &(0x7f0000001b40)=[{&(0x7f0000001a80)=""/79, 0x4f}], 0x1}}], 0x48}, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000600)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000002"], 0x110) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x4e20, @empty}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000000)={0x2, {{0x2, 0x4e26, @multicast2}}, {{0x2, 0x2, @dev={0xac, 0x14, 0x14, 0x37}}}}, 0x108) creat(&(0x7f0000000100)='./bus\x00', 0x0) r5 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r5, 0xffffffffffffffff, 0xee00) r6 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r5) r7 = add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000640)="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", 0x164, r6) add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="f9194d26602290eb92764edb4b31", 0xe, r7) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r8 = open(&(0x7f0000000080)='./bus\x00', 0x147842, 0x49) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003b000b05d25a806c8c6f94f90224fc600e0005000a000200053582c137153e3704000b80fc0b09000300", 0x33fe0}], 0x1}, 0x0) preadv2(r8, &(0x7f0000000040)=[{&(0x7f0000001200)=""/4096, 0xfffffdef}], 0x1, 0x0, 0x0, 0x0) 220.326626ms ago: executing program 3 (id=10): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvtap0\x00', 0x0}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x1, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10004, 0x0, 0x4, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x2, 0xffffffffffffffff, 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000000c0)={0xfffc, 0x0, 0x0, 0x10}, 0x8) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) sendto$inet6(r2, &(0x7f0000000040)="7303", 0x2, 0x0, &(0x7f0000000280)={0xa, 0xfffc, 0x200000, @loopback, 0x7e}, 0x1c) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x104) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000040)=ANY=[], 0xfe37, 0x0) connect$qrtr(r3, &(0x7f0000000340)={0x2a, 0xffffffffffffffff, 0x1}, 0xc) removexattr(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)=@known='trusted.overlay.upper\x00') sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@delneigh={0x28, 0x1d, 0x1, 0x8a, 0x0, {0x7, 0x0, 0x0, r1, 0x8, 0x12}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000240)={0x4, &(0x7f0000000200)=[{0x8, 0x9, 0x8f, 0x7}, {0xf, 0x9, 0x4, 0xffff}, {0x2, 0xc, 0x61, 0x8}, {0x3, 0xc2, 0x1, 0x101}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) getgid() 0s ago: executing program 4 (id=11): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x182804, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000100)="89e7ee", 0x3}, {&(0x7f0000000480)="9c74dfbf77572856c888a886bb8612", 0xf}], 0x2) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.68' (ED25519) to the list of known hosts. [ 33.859864][ T29] audit: type=1400 audit(1750226123.945:62): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.861015][ T3302] cgroup: Unknown subsys name 'net' [ 33.882611][ T29] audit: type=1400 audit(1750226123.945:63): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.910056][ T29] audit: type=1400 audit(1750226123.975:64): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.023181][ T3302] cgroup: Unknown subsys name 'cpuset' [ 34.029418][ T3302] cgroup: Unknown subsys name 'rlimit' [ 34.200582][ T29] audit: type=1400 audit(1750226124.285:65): avc: denied { setattr } for pid=3302 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 34.223889][ T29] audit: type=1400 audit(1750226124.285:66): avc: denied { create } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.244411][ T29] audit: type=1400 audit(1750226124.285:67): avc: denied { write } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.264848][ T29] audit: type=1400 audit(1750226124.285:68): avc: denied { read } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 34.285149][ T29] audit: type=1400 audit(1750226124.305:69): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 34.294175][ T3306] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 34.309945][ T29] audit: type=1400 audit(1750226124.305:70): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 34.337724][ T3302] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 34.341902][ T29] audit: type=1400 audit(1750226124.415:71): avc: denied { relabelto } for pid=3306 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 36.249330][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 36.325879][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.333240][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.340368][ T3319] bridge_slave_0: entered allmulticast mode [ 36.347034][ T3319] bridge_slave_0: entered promiscuous mode [ 36.367788][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.374910][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.382032][ T3319] bridge_slave_1: entered allmulticast mode [ 36.388698][ T3319] bridge_slave_1: entered promiscuous mode [ 36.418795][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.433152][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.458547][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 36.484351][ T3319] team0: Port device team_slave_0 added [ 36.491550][ T3319] team0: Port device team_slave_1 added [ 36.544864][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.551950][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.577942][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.591551][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.598612][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.624680][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.640067][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 36.667670][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 36.707599][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 36.716486][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.723683][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.730994][ T3316] bridge_slave_0: entered allmulticast mode [ 36.737474][ T3316] bridge_slave_0: entered promiscuous mode [ 36.753418][ T3319] hsr_slave_0: entered promiscuous mode [ 36.759525][ T3319] hsr_slave_1: entered promiscuous mode [ 36.771621][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.778775][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.786002][ T3316] bridge_slave_1: entered allmulticast mode [ 36.792423][ T3316] bridge_slave_1: entered promiscuous mode [ 36.811154][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.818316][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.825475][ T3321] bridge_slave_0: entered allmulticast mode [ 36.832033][ T3321] bridge_slave_0: entered promiscuous mode [ 36.850591][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.857780][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.864960][ T3321] bridge_slave_1: entered allmulticast mode [ 36.871553][ T3321] bridge_slave_1: entered promiscuous mode [ 36.908148][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.920866][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.941036][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.959568][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.968812][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.975927][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.983166][ T3313] bridge_slave_0: entered allmulticast mode [ 36.989593][ T3313] bridge_slave_0: entered promiscuous mode [ 36.998532][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.005774][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.012976][ T3313] bridge_slave_1: entered allmulticast mode [ 37.019538][ T3313] bridge_slave_1: entered promiscuous mode [ 37.051902][ T3321] team0: Port device team_slave_0 added [ 37.057987][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.065165][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.072410][ T3312] bridge_slave_0: entered allmulticast mode [ 37.078935][ T3312] bridge_slave_0: entered promiscuous mode [ 37.087705][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.094808][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.102006][ T3312] bridge_slave_1: entered allmulticast mode [ 37.108475][ T3312] bridge_slave_1: entered promiscuous mode [ 37.125621][ T3321] team0: Port device team_slave_1 added [ 37.148460][ T3316] team0: Port device team_slave_0 added [ 37.155022][ T3316] team0: Port device team_slave_1 added [ 37.161865][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.178346][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.185430][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.211431][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.222898][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.229868][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.255850][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.272788][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.287355][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.294441][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.320402][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.337380][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.363784][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.370805][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.396944][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.411521][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.441751][ T3321] hsr_slave_0: entered promiscuous mode [ 37.447811][ T3321] hsr_slave_1: entered promiscuous mode [ 37.453707][ T3321] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.461281][ T3321] Cannot create hsr debugfs directory [ 37.479168][ T3312] team0: Port device team_slave_0 added [ 37.485758][ T3313] team0: Port device team_slave_0 added [ 37.492925][ T3313] team0: Port device team_slave_1 added [ 37.506655][ T3312] team0: Port device team_slave_1 added [ 37.534822][ T3316] hsr_slave_0: entered promiscuous mode [ 37.540957][ T3316] hsr_slave_1: entered promiscuous mode [ 37.547072][ T3316] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.554677][ T3316] Cannot create hsr debugfs directory [ 37.574756][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.581803][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.607949][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.619339][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.626403][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.652457][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.663821][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.670804][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.697354][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.726040][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.733072][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.759192][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.803680][ T3313] hsr_slave_0: entered promiscuous mode [ 37.809716][ T3313] hsr_slave_1: entered promiscuous mode [ 37.815862][ T3313] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.823498][ T3313] Cannot create hsr debugfs directory [ 37.875125][ T3312] hsr_slave_0: entered promiscuous mode [ 37.881165][ T3312] hsr_slave_1: entered promiscuous mode [ 37.887113][ T3312] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.894847][ T3312] Cannot create hsr debugfs directory [ 37.935143][ T3319] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 37.953510][ T3319] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 37.962094][ T3319] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 37.982403][ T3319] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 38.045832][ T3321] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 38.056841][ T3321] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 38.065805][ T3321] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 38.079080][ T3321] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 38.107007][ T3316] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 38.116306][ T3316] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 38.124884][ T3316] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 38.141986][ T3316] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 38.183350][ T3313] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 38.192663][ T3313] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 38.212579][ T3313] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 38.221337][ T3313] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 38.248115][ T3312] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 38.256991][ T3312] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 38.267213][ T3312] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 38.281797][ T3312] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 38.294867][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.311007][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.336867][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.354142][ T999] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.361239][ T999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.370233][ T999] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.377467][ T999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.387685][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.398012][ T999] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.405138][ T999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.426564][ T999] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.433756][ T999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.447755][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.463425][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.491175][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.503773][ T999] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.511065][ T999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.532689][ T3313] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.543293][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.557551][ T999] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.564648][ T999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.584660][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.616736][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.628585][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.645112][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.652280][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.669952][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.677059][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.708451][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.715607][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.729505][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.736627][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.767482][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.790575][ T3316] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.816575][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.836030][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.904306][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.930270][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.997946][ T3319] veth0_vlan: entered promiscuous mode [ 39.008154][ T3319] veth1_vlan: entered promiscuous mode [ 39.055083][ T3313] veth0_vlan: entered promiscuous mode [ 39.066524][ T3319] veth0_macvtap: entered promiscuous mode [ 39.073153][ T3321] veth0_vlan: entered promiscuous mode [ 39.080018][ T3313] veth1_vlan: entered promiscuous mode [ 39.095378][ T3321] veth1_vlan: entered promiscuous mode [ 39.102463][ T3319] veth1_macvtap: entered promiscuous mode [ 39.130004][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.151600][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.160602][ T3313] veth0_macvtap: entered promiscuous mode [ 39.173138][ T3321] veth0_macvtap: entered promiscuous mode [ 39.180262][ T3319] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.189112][ T3319] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.197899][ T3319] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.206641][ T3319] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.218408][ T3313] veth1_macvtap: entered promiscuous mode [ 39.227341][ T3321] veth1_macvtap: entered promiscuous mode [ 39.244032][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.253915][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.270817][ T3316] veth0_vlan: entered promiscuous mode [ 39.280588][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 39.280603][ T29] audit: type=1400 audit(1750226129.365:81): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/root/syzkaller.3xZ76P/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 39.286907][ T3312] veth0_vlan: entered promiscuous mode [ 39.318173][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.327849][ T3316] veth1_vlan: entered promiscuous mode [ 39.333835][ T29] audit: type=1400 audit(1750226129.415:82): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 39.343146][ T3321] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.355811][ T29] audit: type=1400 audit(1750226129.415:83): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/root/syzkaller.3xZ76P/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 39.364566][ T3321] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.389622][ T29] audit: type=1400 audit(1750226129.415:84): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 39.398310][ T3321] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.420051][ T29] audit: type=1400 audit(1750226129.415:85): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/root/syzkaller.3xZ76P/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 39.428757][ T3321] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.444344][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.455407][ T29] audit: type=1400 audit(1750226129.415:86): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/root/syzkaller.3xZ76P/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4514 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 39.473655][ T3312] veth1_vlan: entered promiscuous mode [ 39.498583][ T29] audit: type=1400 audit(1750226129.415:87): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 39.525006][ T29] audit: type=1400 audit(1750226129.615:88): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 39.540262][ T3313] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.548187][ T29] audit: type=1400 audit(1750226129.615:89): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="gadgetfs" ino=4537 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 39.556959][ T3313] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.556993][ T3313] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.596831][ T3313] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.608915][ T3319] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 39.648164][ T3316] veth0_macvtap: entered promiscuous mode [ 39.655048][ T29] audit: type=1400 audit(1750226129.725:90): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 39.669050][ T3481] loop3: detected capacity change from 0 to 2048 [ 39.700608][ T3312] veth0_macvtap: entered promiscuous mode [ 39.718125][ T3316] veth1_macvtap: entered promiscuous mode [ 39.727424][ T3312] veth1_macvtap: entered promiscuous mode [ 39.735509][ T3481] loop3: p1 < > p4 [ 39.741145][ T3481] loop3: p4 size 8388608 extends beyond EOD, truncated [ 39.754959][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.773158][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.804148][ T3316] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.813038][ T3316] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.821806][ T3316] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.830569][ T3316] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.876700][ T3481] rdma_op ffff88811a100980 conn xmit_rdma 0000000000000000 [ 39.887490][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.905919][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.918243][ T3312] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.927109][ T3312] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.935843][ T3312] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.944708][ T3312] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.089919][ T3492] loop0: detected capacity change from 0 to 256 [ 40.137197][ T3499] loop4: detected capacity change from 0 to 512 [ 40.146779][ T3499] journal_path: Non-blockdev passed as './file0' [ 40.153313][ T3499] EXT4-fs: error: could not find journal device path [ 40.165806][ T3502] loop3: detected capacity change from 0 to 2048 [ 40.177468][ T3492] FAT-fs (loop0): Directory bread(block 64) failed [ 40.201078][ T3492] FAT-fs (loop0): Directory bread(block 65) failed [ 40.225603][ T3492] FAT-fs (loop0): Directory bread(block 66) failed [ 40.241512][ T3499] netlink: 'syz.4.5': attribute type 4 has an invalid length. [ 40.249970][ T3303] loop3: p1 < > p4 [ 40.255786][ T3303] loop3: p4 size 8388608 extends beyond EOD, truncated [ 40.267748][ T3492] FAT-fs (loop0): Directory bread(block 67) failed [ 40.275177][ T3502] loop3: p1 < > p4 [ 40.279902][ T3502] loop3: p4 size 8388608 extends beyond EOD, truncated [ 40.313784][ T3502] rdma_op ffff88811a095180 conn xmit_rdma 0000000000000000 [ 40.325742][ T3492] FAT-fs (loop0): Directory bread(block 68) failed [ 40.347978][ T3509] 9pnet: Could not find request transport: ê’ [ 40.354500][ T3492] FAT-fs (loop0): Directory bread(block 69) failed [ 40.390239][ T3492] FAT-fs (loop0): Directory bread(block 70) failed [ 40.403591][ T3515] loop4: detected capacity change from 0 to 2048 [ 40.434336][ T3492] FAT-fs (loop0): Directory bread(block 71) failed [ 40.454616][ T3507] udevd[3507]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 40.465670][ T3305] udevd[3305]: inotify_add_watch(7, /dev/loop3p1, 10) failed: No such file or directory [ 40.477203][ T3492] FAT-fs (loop0): Directory bread(block 72) failed [ 40.488194][ T3303] loop4: p1 < > p4 [ 40.489186][ T3492] FAT-fs (loop0): Directory bread(block 73) failed [ 40.500140][ T3303] loop4: p4 size 8388608 extends beyond EOD, truncated [ 40.522470][ T3515] loop4: p1 < > p4 [ 40.563041][ T3515] loop4: p4 size 8388608 extends beyond EOD, truncated [ 40.599511][ T3515] rdma_op ffff88811a095d80 conn xmit_rdma 0000000000000000 [ 40.639006][ T3305] ================================================================== [ 40.647157][ T3305] BUG: KCSAN: data-race in find_get_block_common / has_bh_in_lru [ 40.654925][ T3305] [ 40.657268][ T3305] read-write to 0xffff888237d26f10 of 8 bytes by task 3492 on cpu 1: [ 40.665357][ T3305] find_get_block_common+0x4f0/0x960 [ 40.670692][ T3305] bdev_getblk+0x83/0x3d0 [ 40.675069][ T3305] __bread_gfp+0x51/0x250 [ 40.679445][ T3305] fat_get_entry+0x46e/0x5d0 [ 40.684070][ T3305] fat_scan+0x103/0x200 [ 40.688251][ T3305] vfat_add_entry+0x133f/0x1b90 [ 40.693118][ T3305] vfat_create+0xa8/0x190 [ 40.697491][ T3305] path_openat+0x1105/0x2170 [ 40.702102][ T3305] do_filp_open+0x109/0x230 [ 40.706624][ T3305] do_sys_openat2+0xa6/0x110 [ 40.711229][ T3305] __x64_sys_openat+0xf2/0x120 [ 40.716009][ T3305] x64_sys_call+0x1af/0x2fb0 [ 40.720612][ T3305] do_syscall_64+0xd2/0x200 [ 40.725123][ T3305] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 40.731031][ T3305] [ 40.733367][ T3305] read to 0xffff888237d26f10 of 8 bytes by task 3305 on cpu 0: [ 40.740918][ T3305] has_bh_in_lru+0x35/0x1f0 [ 40.745453][ T3305] smp_call_function_many_cond+0x389/0xbf0 [ 40.751273][ T3305] on_each_cpu_cond_mask+0x3c/0x80 [ 40.756398][ T3305] invalidate_bh_lrus+0x2a/0x30 [ 40.761280][ T3305] blkdev_flush_mapping+0x9a/0x1a0 [ 40.766432][ T3305] bdev_release+0x260/0x3d0 [ 40.770949][ T3305] blkdev_release+0x15/0x20 [ 40.775474][ T3305] __fput+0x298/0x650 [ 40.779475][ T3305] fput_close_sync+0x6e/0x120 [ 40.784172][ T3305] __x64_sys_close+0x56/0xf0 [ 40.788783][ T3305] x64_sys_call+0x2747/0x2fb0 [ 40.793476][ T3305] do_syscall_64+0xd2/0x200 [ 40.798074][ T3305] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 40.803979][ T3305] [ 40.806307][ T3305] value changed: 0xffff8881055341a0 -> 0xffff888105534138 [ 40.813421][ T3305] [ 40.815751][ T3305] Reported by Kernel Concurrency Sanitizer on: [ 40.821921][ T3305] CPU: 0 UID: 0 PID: 3305 Comm: udevd Not tainted 6.16.0-rc2-syzkaller-00045-g4663747812d1 #0 PREEMPT(voluntary) [ 40.833910][ T3305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 40.843974][ T3305] ================================================================== [ 40.880038][ T3305] udevd[3305]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 40.884152][ T3303] udevd[3303]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 40.949928][ T3303] udevd[3303]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 40.960496][ T3305] udevd[3305]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 41.201074][ T3313] FAT-fs (loop0): error, corrupted directory (invalid entries) [ 41.208796][ T3313] FAT-fs (loop0): Filesystem has been set read-only [ 43.118406][ T37] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 43.156146][ T37] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 43.181814][ T3313] syz-executor (3313) used greatest stack depth: 10672 bytes left [ 43.218190][ T37] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 43.296868][ T37] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 43.415070][ T37] bridge_slave_1: left allmulticast mode [ 43.420838][ T37] bridge_slave_1: left promiscuous mode [ 43.426536][ T37] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.462774][ T37] bridge_slave_0: left allmulticast mode [ 43.468475][ T37] bridge_slave_0: left promiscuous mode [ 43.474201][ T37] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.574429][ T37] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 43.593572][ T37] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 43.613513][ T37] bond0 (unregistering): Released all slaves [ 43.686569][ T37] hsr_slave_0: left promiscuous mode [ 43.712464][ T37] hsr_slave_1: left promiscuous mode [ 43.718197][ T37] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 43.725707][ T37] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 43.754727][ T37] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 43.762232][ T37] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 43.785623][ T37] veth1_macvtap: left promiscuous mode [ 43.791261][ T37] veth0_macvtap: left promiscuous mode [ 43.822371][ T37] veth1_vlan: left promiscuous mode [ 43.827723][ T37] veth0_vlan: left promiscuous mode [ 43.983870][ T37] team0 (unregistering): Port device team_slave_1 removed [ 44.002990][ T37] team0 (unregistering): Port device team_slave_0 removed