last executing test programs: 10.442958861s ago: executing program 3 (id=25): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) writev(r1, &(0x7f0000000780), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='block_plug\x00', r2}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffe, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r4, 0x0, 0xfffffffffffffffe}, 0x18) syz_mount_image$ext4(&(0x7f0000000d80)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x21881e, &(0x7f00000006c0)={[{@grpid}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@nodiscard}]}, 0xfd, 0x50f, &(0x7f0000000140)="$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") socket$nl_route(0x10, 0x3, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) 9.440740232s ago: executing program 3 (id=31): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1ae96d010301", 0x6) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000000)=ANY=[], 0xffc9) 8.783376426s ago: executing program 3 (id=38): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xa}, 0x18) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x40100, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) 8.715375551s ago: executing program 3 (id=39): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xffff, 0x20000000000008b}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) bind$bt_hci(r1, &(0x7f0000000140)={0x1f, 0xffff, 0x2}, 0x6) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r3, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file2\x00', 0x404, &(0x7f0000000080)={[{@nogrpid}, {@jqfmt_vfsv0}, {@nouid32}, {@debug}, {@nodiscard}, {@quota}]}, 0x1, 0x43d, &(0x7f00000002c0)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000780)='./file1\x00', 0x42, 0x108) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000000)=0x6) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) ptrace(0x10, r5) tkill(r5, 0x3c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r4, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0], 0x0, 0x4f, &(0x7f00000008c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0xcd, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) r7 = dup3(r3, r0, 0x80000) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r8, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x17, 0x11, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x9}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x1, 0x10, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}]}, &(0x7f0000000700)='GPL\x00', 0x11, 0xe, &(0x7f0000000740)=""/14, 0x0, 0x19, '\x00', 0x0, @cgroup_sysctl, r4, 0x8, &(0x7f00000007c0)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, r6, r7, 0x0, &(0x7f0000000b00)=[r4, 0xffffffffffffffff, r4, r9], 0x0, 0x10, 0x3cb2}, 0x94) ptrace$peeksig(0x4209, r5, &(0x7f0000000140), &(0x7f00000001c0)) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, r5, &(0x7f00000000c0), 0x4003) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000040)=0x0) ptrace$ARCH_SHSTK_UNLOCK(0x1e, r10, 0x1, 0x5004) 8.582776652s ago: executing program 3 (id=43): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1}, 0x18) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x200000}, 0x1c) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) sendmmsg(r2, 0x0, 0x0, 0x20044000) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, 0x0, 0x20000000) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000800}, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff2b, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000100000000000000040000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r3}, 0x18) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 8.013082268s ago: executing program 3 (id=54): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000340)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) r1 = socket(0x11, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000240)=0xe9, 0x4) sendmsg$netlink(r1, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)=ANY=[@ANYBLOB="02011400012918000e3580009f000114000000110600ac141430e0000003808a8972bd0b72e41082b1a3d2061fd7fdfe4b88"], 0xdd12}], 0x1}, 0x10) 8.012870848s ago: executing program 32 (id=54): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000340)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) r1 = socket(0x11, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000240)=0xe9, 0x4) sendmsg$netlink(r1, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)=ANY=[@ANYBLOB="02011400012918000e3580009f000114000000110600ac141430e0000003808a8972bd0b72e41082b1a3d2061fd7fdfe4b88"], 0xdd12}], 0x1}, 0x10) 1.834919511s ago: executing program 4 (id=136): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001180)={0x34, r1, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 1.809011143s ago: executing program 1 (id=137): socket(0x400000000010, 0x3, 0x6) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x23, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x69c2, 0x3ff}, 0x0, 0x9, 0x0, 0x1, 0x5, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) sched_setscheduler(0x0, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x19, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r2) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='&'], 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000001280)=[{&(0x7f0000001180)="83", 0x1}], 0x1, 0x0) vmsplice(r4, &(0x7f00000005c0)=[{&(0x7f0000000180)="04", 0x1}], 0x1, 0x6) 1.808642723s ago: executing program 4 (id=138): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r1) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)={0x30, r2, 0x301, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x14}, @val={0x8}, @val={0xc, 0x99, {0x2, 0x4}}}}}, 0x30}}, 0x44) 1.773439625s ago: executing program 4 (id=141): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000300000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0) 1.72224752s ago: executing program 4 (id=144): futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {0xffff, 0xffff}, {0xffff, 0x9}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0xe0000000, 0x5, 0xb7, 0x2, 0x1, 0x1, 0x4, 0x3, 0x1}}}}]}, 0x58}}, 0x4000) r4 = socket(0x10, 0x803, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newtfilter={0xa4, 0x2c, 0xd2b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0xb, 0x3}, {}, {0x1, 0x9}}, [@filter_kind_options=@f_u32={{0x8}, {0x70, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x6, 0x0, 0x9, 0x401, 0x1000, 0x8a3, 0xd5}}, @TCA_U32_ACT={0x58, 0x7, [@m_skbmod={0x54, 0x1, 0x0, 0x0, {{0xb}, {0x28, 0x2, 0x0, 0x1, [@TCA_SKBMOD_PARMS={0x24, 0x2, {{0x4cc0, 0x3, 0x4, 0x7, 0x400000}, 0xc}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x8, 0x7}}]}, 0xa4}, 0x1, 0x0, 0x0, 0x81}, 0x800) alarm(0x80) 1.72115242s ago: executing program 0 (id=145): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000400000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r1}, 0x10) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000002400)=0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x18) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r6, 0x29, 0xce, &(0x7f0000000000)=0x1, 0x4) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000012c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEAUTHENTICATE(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="c50f00000000000000001100000008e63200", @ANYRES32=0x0, @ANYBLOB="08002a0084210000"], 0x24}}, 0x0) io_submit(r3, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2002000000, 0x4, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="0200ffff0000", 0x6, 0x0, 0x0, 0x2}]) 1.697827061s ago: executing program 1 (id=146): r0 = socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000010a850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000100900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000010000000000000000000a28000000000a0101804bc9555e1affd5020000000900010001797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a300000000009000300737975320000000014000000110001"], 0x7c}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r3}, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x24, 0x10, 0x1, 0x0, 0x0, {0x6, 0x0, 0x8100, 0x0, {0xc3}, {}, {0xe, 0xd}}}, 0x24}}, 0x0) 1.631204647s ago: executing program 1 (id=147): r0 = socket$netlink(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x30, r3, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@pci={{0x8}, {0x11}}]}, 0x30}, 0x1, 0x0, 0x0, 0x41}, 0x0) 1.630830487s ago: executing program 2 (id=148): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xa}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x86) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x18) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x40100, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) 1.59523284s ago: executing program 1 (id=149): r0 = socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000010a850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r1}, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x24, 0x10, 0x1, 0x0, 0x0, {0x6, 0x0, 0x8100, 0x0, {0xc3}, {}, {0xe, 0xd}}}, 0x24}}, 0x0) (fail_nth: 1) 1.59494424s ago: executing program 0 (id=150): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0b00000000cf1c7b18"], 0x48) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0x8, &(0x7f0000000100)=0x40046, 0xffffffffffffff11) recvmmsg(r3, &(0x7f0000000480)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/11, 0x17}}], 0x400000000000179, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x6, 0x0, 0x8100, 0x0, {0xc3}, {}, {0xe, 0xd}}, [@TCA_RATE={0x6}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x11, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0xc0a85320, &(0x7f00000003c0)={{0x80}, 'port0\x00', 0x0, 0x100804, 0x0, 0xa, 0x10001, 0x0, 0x4, 0x0, 0x0, 0x4}) socket$nl_generic(0x10, 0x3, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="8000102e7577d401", 0x8}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="380000000000000029000000390000006c04020400000000fc0100000000470400"/56], 0x38}}], 0x1, 0x844) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$int_in(r7, 0x5421, &(0x7f0000000100)=0x100000001) connect$inet(r7, &(0x7f0000000480)={0x2, 0x4e24, @loopback}, 0x10) close(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team_slave_1\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000004c0)={{0x80}, 'port0\x00', 0x0, 0x121428, 0x7fff, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0xe}) 1.573806922s ago: executing program 2 (id=151): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x3, &(0x7f0000000480)=@framed, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\"\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7000000}, [@map_val={0x18, 0x0, 0x2, 0x0, r2}, @ldst={0x3, 0x0, 0x6}]}, &(0x7f0000000180)='syzkaller\x00', 0x3, 0xd2, &(0x7f00000002c0)=""/210}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000ac0)={r0, r1}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x4a, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63, 0x8, 0x0, 0x0}}, 0x10) ioperm(0x2, 0x7ff, 0x5c0c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000867700000000000000000000180100002025702500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000004000000850000000600000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007b00000095"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0xc}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x13, &(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r3, 0x0, 0xfffffffffffffd5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x7, 0x7f, 0xff, 0x4, 0x0, 0x7, 0x1080, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x102400, 0x1, 0x1, 0x6, 0x4, 0x200, 0x6, 0x0, 0x8, 0x0, 0xfffffffffffffeff}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xa) r5 = openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) r6 = syz_io_uring_setup(0xbdc, &(0x7f0000000080)={0x0, 0xec21, 0x80, 0x1, 0x40000333}, &(0x7f0000000340)=0x0, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r5, 0x0, &(0x7f0000000600)=[{&(0x7f0000001800)=""/216, 0xd8}], 0x1}) io_uring_enter(r6, 0x847ba, 0x2000, 0xe, 0x0, 0x0) r9 = perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x80, 0x4, 0xd, 0x3, 0x9, 0x0, 0x4, 0x6080, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x100000, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x109c, 0x1f, 0x4, 0x6, 0xb, 0x4, 0x5, 0x0, 0x5, 0x0, 0x401}, 0xffffffffffffffff, 0x2, r4, 0x4) r10 = socket$inet6(0xa, 0x3, 0x3c) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r11, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000040900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) connect$inet6(r10, &(0x7f0000000000)={0xa, 0x4000, 0x0, @remote, 0x5}, 0x1c) writev(r10, &(0x7f00000000c0)=[{&(0x7f0000000100)=',', 0xffdf}], 0x1) perf_event_open(&(0x7f0000000100)={0x3, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0xc}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3}, 0x0, 0xc, r9, 0x0) unshare(0x26020400) r12 = open(&(0x7f00000001c0)='./file1\x00', 0x14927e, 0x20) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) copy_file_range(r12, 0x0, r12, 0x0, 0x101, 0x0) 1.320245362s ago: executing program 2 (id=152): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002180)='blkio.bfq.io_merged\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000020000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x80, 0x2, 0x8b6}, &(0x7f0000000000)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r2, 0x0, &(0x7f0000000040)='./file0\x00', 0x64, 0x183000, 0x23456}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x42002) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) ftruncate(r0, 0xc178) r5 = fsopen(&(0x7f0000000080)='bpf\x00', 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) semtimedop(0x0, &(0x7f0000000280)=[{0x4}, {0x2, 0x3}], 0x2, &(0x7f0000000380)={r6, r7+60000000}) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r8, &(0x7f0000000140)='./file0\x00') unshare(0x22020400) r9 = fsopen(&(0x7f0000000000)='9p\x00', 0x1) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000000000000000000000000000b2e9682928b0744504555dda4f33d7f344e8ff0e7a5371442eb787447c0ea82f1b6fbd432e9168ace3f40c76dae1a71158e9759147db567c0c77ba468632ec5ed94482e02577cd4f479db41e1bae617491f8e7ecf8bf49db749210ea83fa2c4d984b9e1c8b426dd46ef29203f8656a481c1886", @ANYRES32, @ANYBLOB="1000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) r12 = syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0x0) ioctl$EVIOCGRAB(r12, 0x40044590, &(0x7f0000000200)=0x7dffeffc) fsconfig$FSCONFIG_SET_BINARY(r9, 0x2, &(0x7f0000000140)='/&\x00', &(0x7f0000000180)='[', 0x1) readlinkat(r8, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000010980)=""/204, 0xcc) 1.319792013s ago: executing program 2 (id=153): socket(0x400000000010, 0x3, 0x6) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x23, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x69c2, 0x3ff}, 0x0, 0x9, 0x0, 0x1, 0x5, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x19, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000100)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x22fe0}], 0x1}, 0x0) recvfrom(r3, &(0x7f0000004000)=""/4112, 0xfffffffffffffedc, 0x2080, 0x0, 0x0) 1.302311504s ago: executing program 0 (id=154): r0 = fsopen(0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) r1 = memfd_create(&(0x7f0000002140)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x05FY\x1c\x04\x0f\x00\x00\x00\x00\x00\x00z[\xc4\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xee9\xdd\x87\xf1\xc5\xa81\xd4\xfb\x8a8t\xd0\v\xe6\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\x8fu\x0fjuX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06D\x83\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xe6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\xf8?=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\t\x00\x00\x00\x00\x00\x00\x00\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x02\xeb6\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x1f\x17\x11$\x88g\xb4\xad\xe5\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc0_\xfe7\xd0=5&_\x86m\x8d\x12\x96\xc8\x91\x1dD\x02\x13\xf6r\xa4L\xd3\x93\x8d\x05\x85P\x93\xa9\xc0\xda\x9b\xb9\xafZ\xd7W\xcb\xd7\x1fZq\x86%\x9a\rcb\x96\xfeI\t\x9c\a\xcc+\x9d\n\x18k9\x16y\xf0\xf1\xad\xb4\xdeOR-\x89\xc6%\x06\x05zB\xcc\xe1\xa1\x11P\xd2u\'o\xee\xc3|\xb4\xe3\xc8]\x11\x7f\x17\x8dS\xb4\xd1\x1a\fjF\xab\xcf\"y\f\x85\xb0s\xc8\xec\xa6Y\xe22\x9c_}\aq\xec\xc4\x124\x9e`\xf5\xd1~\xd6x\xa9\x95\v\xac\xea\x0f^\xa3\xc3:\xd6fC\xfc\xf0\xb6\x8c\xf7cF\x9a\x97\x83GMJ\xf2A\x0e\xecrg\xf6\xc039\xb8\b\x85\x9fu\x84Am\xc67\xae\xee\xce-E@4\n\xab9rB\xed\xf7\x86\'\xb3\x04\f\xb5\xc3\x82\xd9WO\xe2\x92\xf9\xb5\x93\xe67\xb1\xc8x\xa3\xf6fs\x88\x81\x80\x1ck\"\xe4\xc3A\xee\xec\x8ea+\xcbFEm\"\xf1\x19/\x1f\x8e\xe2C\xb3\v(\x16\xc8bI\n\x95|\xb8.\x05\x80\xbeu=4\x95\xb9\xa1\x06\x16\xd8.\xd5\xa0\xc5\x7f\x97\xed05\x18\x0f\xf4\f\xcf\x1f\x8b\xa1\xb1<\xe7G\xc6\xb1%\xef\x94\x9e\x1f\x1d\xb4 b\xe8p\xd7c\xb0i\xa0\x19k\xe3\xce\x93\xd9\x03\x95L4\"1\x80\x05\xe3\x03\xfb\x81\xcc\xe6Du\x06\xe6wX0\x16\xc5_=\xe7&\x8eU\xdf\xb0OZ\x02\x19Y\x13\x16:\a\x89PI\x98\xd9\xffxh6\x13\x1co1_F\x02\x9d\xc9\xe4E\xb7\x1a\xa2&H\xef\x06\x89v\x85\xfek*\x91W\x01\x00\x00\x00\x00\x00\x00\x00\x0fX\x139o\x83\xbe\xdb\xa55D\xcbt\xb4y%\xe6j\xeb\xe7H\xe1\xe2\x9c\x7f5a\xb1&\x88\x9c\x98\\{\x8d\xbb\x92\xfa\x96j\xf4T\xd2d-\xf8dIz\x1f\x0eZ\xb5\x120A\xb8\x0f\ne\x19^\xccz\x11\xca\f\xda\x89\x8fuS(G&\xe2\xd0ky\xe7n\xc7\xfcz\x84U\xc1\xf0\xe0\xc5\xbf\xb1\xfa\xd4\xe5)\xad\xcbp\xce\x8b\xddq\xb8E\xe6+\xd2\xea\f\x16\xe1\xc2\xdaN\xce\b\xe21X\xee\x80n\x10\xfd\x03_L=@\xddR\xb5\xa5\"\xcb\xdf\xc5\xd8\n,Go\xa6u\xe0\v\x86\x9da\xda\x11\xd5>\xfea\xa1|\xe5\x7f\xab\x94\xec\x87\x11:$\xf2\x9a\x99', 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2d, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000d9"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r4}, 0x18) modify_ldt$write(0x1, &(0x7f0000000040)={0x806, 0xffffffffffffffff}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f0000005c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000002d000b0029bd700000000000020000000c00b0c1018006004c008848"], 0x20}}, 0x8000) syz_clone(0x26801000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000001440), 0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x100) 1.253086878s ago: executing program 1 (id=155): r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='ufshcd_clk_scaling\x00'}, 0x18) syz_usb_disconnect(r0) 1.252574377s ago: executing program 2 (id=156): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r2}, 0x10) pread64(r1, &(0x7f0000001240)=""/102400, 0x200000, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r3 = socket$rds(0x15, 0x5, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/devices.allow\x00', 0x2, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_type(r5, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r6, &(0x7f0000000280), 0x9) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000efffffff850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) capget(&(0x7f0000000000)={0x19980330}, 0x0) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000580)='./file0\x00', 0x4, &(0x7f0000000980)=ANY=[], 0x1, 0x122d, &(0x7f0000003540)="$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") rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000001300)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB='b ', @ANYRESDEC], 0xc) bind$rds(r3, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)=0x80) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, 0x0, 0x28, &(0x7f0000000680)=[@fadd={0x58, 0x114, 0x6, {{0x1, 0x3}, &(0x7f0000000340)=0x5, 0x0, 0xa, 0xff, 0x0, 0x2, 0x5c, 0x8001}}], 0x58}, 0x20048000) 1.23054513s ago: executing program 0 (id=157): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x400, 0x70bd2c, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0x8000}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000005}, 0x800) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) write$P9_RGETLOCK(r2, &(0x7f0000000640)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x7000000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0xf2de1000) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) 932.665823ms ago: executing program 0 (id=158): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000018c0)={0x114, 0x18, 0x1, 0x4, 0x25dfdbf8, "", [@nested={0x103, 0xf2, 0x0, 0x1, [@typed={0xc, 0x18, 0x0, 0x0, @u64=0xfac08}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2d}}}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126237dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb43d9621dc08c029d1608a46cf26fbe816b89f7cb81bff81a8b9482565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875ec58e9a3ddb9ad02a078cf0d972df9e99f079767734f69ce475f00ac64337803f5eb4e5842f4d98fe3fa370d47eb640dc5061dc35817c8a66c29be", @typed={0x4, 0xe9}]}]}, 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) accept4(r1, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x410, &(0x7f0000000140)=ANY=[@ANYBLOB="696f636861727365743d61736369692c636865636b3d7374726963742c008dc72788a4fd1d7a9e96f5af8b1e45accead19436f26d694969a11ba75120b4d62f34885979931a363c752e585ec3604e30dbe2a796fc821132b494dde1c10c9dd6e964a204d3419f8429a34ad0f9eef6d8e64551e180300000043f138d74174cf31003d8e2e285a38f0c00baa5f773735f6e6eb3d29d249635d3f5317a9cd809294ebc15b04d444ccb0c1a90e8e0587fae4eefddd7e3d5c20a076101fd7f3ee5634000000000000fda9bc4dbfe77e9b101986ec88"], 0xfe, 0x341, &(0x7f0000000bc0)="$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") r2 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = syz_clone3(&(0x7f00000003c0)={0x898000, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180), {0x3d}, &(0x7f0000000200)=""/230, 0xe6, &(0x7f0000000300)=""/113, &(0x7f0000000380)=[0xffffffffffffffff], 0x1}, 0x58) perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, 0x7, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4838}, 0x4000010) sendfile(r0, r4, &(0x7f0000000540)=0xaa5, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40000001, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x20084084) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0x3000010, &(0x7f0000000100)={[{@journal_dev={'journal_dev', 0x3d, 0x2d353}}, {@nobh}]}, 0x1, 0x519, &(0x7f00000009c0)="$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") 889.057877ms ago: executing program 5 (id=159): open(&(0x7f0000000740)='./bus\x00', 0x143c62, 0x0) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)='trans=rdma,') (fail_nth: 5) 564.955693ms ago: executing program 2 (id=160): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000006003051878536f1216d114000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x14020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x1}, 0x100202, 0x0, 0xfffffffb, 0x0, 0x40, 0xfffffffe, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0xfffffffc, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x52}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000006c0f00000a"], 0x48) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00'}, 0x10) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000300020400bf050005001201", 0x2e}], 0x1}, 0x48000) (fail_nth: 6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0}, 0x94) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x20000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r5}, 0x10) r6 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x50, 0x14, 0xf0b, 0xfffffffe, 0x0, {0x2, 0x0, 0x0, 0x0, {0x0, 0xb}, {0xfff1, 0x5}, {0x6, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0x24, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8, 0x7, 0x1ed0}, @TCA_HHF_BACKLOG_LIMIT={0x8, 0x1, 0x1}, @TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x9}, @TCA_HHF_BACKLOG_LIMIT={0x8, 0x1, 0x10000000}]}}]}, 0x50}}, 0x0) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e24, @multicast1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) 564.750663ms ago: executing program 5 (id=161): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xa}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x86) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x40100, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) 464.485852ms ago: executing program 5 (id=162): socket(0x400000000010, 0x3, 0x6) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x23, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x69c2, 0x3ff}, 0x0, 0x9, 0x0, 0x1, 0x5, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x19, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000100)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x22fe0}], 0x1}, 0x0) recvfrom(r3, &(0x7f0000004000)=""/4112, 0xfffffffffffffedc, 0x2080, 0x0, 0x0) 352.975471ms ago: executing program 5 (id=163): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/power/pm_debug_messages', 0x21a02, 0x62) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x800000004, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0xd, @empty, 0x8}, {0xa, 0x4e27, 0xce, @empty, 0x2}, r2, 0xfffffffb}}, 0x48) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[], 0xfe33) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff5000/0x3000)=nil) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r4 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x1, 0x0, 0x0, 0x100, 0xc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYRES16=r3], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a09000000000000000000020000000900020073f97a310000000008000440080000000900010073797a3000000000080003400000000114000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$NFT_MSG_GETOBJ(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="34000000150a03f5"], 0x34}}, 0x0) 213.101032ms ago: executing program 4 (id=164): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002180)='blkio.bfq.io_merged\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000020000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x80, 0x2, 0x8b6}, &(0x7f0000000000)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r2, 0x0, &(0x7f0000000040)='./file0\x00', 0x64, 0x183000, 0x23456}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x42002) io_uring_enter(r2, 0x47f6, 0x0, 0x0, 0x0, 0x0) ftruncate(r0, 0xc178) r5 = fsopen(&(0x7f0000000080)='bpf\x00', 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) semtimedop(0x0, &(0x7f0000000280)=[{0x4}, {0x2, 0x3}], 0x2, &(0x7f0000000380)={r6, r7+60000000}) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) r8 = fsmount(r5, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r8, &(0x7f0000000140)='./file0\x00') unshare(0x22020400) r9 = fsopen(&(0x7f0000000000)='9p\x00', 0x1) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000000000000000000000000000b2e9682928b0744504555dda4f33d7f344e8ff0e7a5371442eb787447c0ea82f1b6fbd432e9168ace3f40c76dae1a71158e9759147db567c0c77ba468632ec5ed94482e02577cd4f479db41e1bae617491f8e7ecf8bf49db749210ea83fa2c4d984b9e1c8b426dd46ef29203f8656a481c1886", @ANYRES32, @ANYBLOB="1000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) r12 = syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0x0) ioctl$EVIOCGRAB(r12, 0x40044590, &(0x7f0000000200)=0x7dffeffc) fsconfig$FSCONFIG_SET_BINARY(r9, 0x2, &(0x7f0000000140)='/&\x00', &(0x7f0000000180)='[', 0x1) readlinkat(r8, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000010980)=""/204, 0xcc) 129.000199ms ago: executing program 1 (id=165): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0b00000000cf1c7b18"], 0x48) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0x8, &(0x7f0000000100)=0x40046, 0xffffffffffffff11) recvmmsg(r3, &(0x7f0000000480)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/11, 0x17}}], 0x400000000000179, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x6, 0x0, 0x8100, 0x0, {0xc3}, {}, {0xe, 0xd}}, [@TCA_RATE={0x6}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x11, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0xc0a85320, &(0x7f00000003c0)={{0x80}, 'port0\x00', 0x0, 0x100804, 0x0, 0xa, 0x10001, 0x0, 0x4, 0x0, 0x0, 0x4}) socket$nl_generic(0x10, 0x3, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="8000102e7577d401", 0x8}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="380000000000000029000000390000006c04020400000000fc0100000000470400"/56], 0x38}}], 0x1, 0x844) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$int_in(r7, 0x5421, &(0x7f0000000100)=0x100000001) connect$inet(r7, &(0x7f0000000480)={0x2, 0x4e24, @loopback}, 0x10) close(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team_slave_1\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f00000004c0)={{0x80}, 'port0\x00', 0x0, 0x121428, 0x7fff, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0xe}) 65.653094ms ago: executing program 5 (id=166): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000005c0), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) sendmsg$can_raw(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000380)={&(0x7f000000a000)=@canfd={{0x5}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000094e2f9663a918fa1efd9b0b"}, 0x38}, 0x2}, 0x24000895) (fail_nth: 3) 55.455925ms ago: executing program 4 (id=167): syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x400) r0 = timerfd_create(0x0, 0x80800) timerfd_settime(r0, 0x3, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xfd, 0x0, 0x7ffc9ffb}]}) clock_adjtime(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f00000001c0)={{}, {0x77359400}}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r3, 0x29, 0x3b, &(0x7f0000000040)=ANY=[], 0x8) getsockopt$inet6_opts(r3, 0x29, 0x36, 0x0, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x42073, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x20000000ec071, 0xffffffffffffffff, 0x0) 1.14769ms ago: executing program 5 (id=168): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'bridge0\x00', @random="01001000"}) 0s ago: executing program 0 (id=169): bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000a0000000400000007000000c1000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x9, 0xb1, &(0x7f0000000400)=""/177, 0x41100, 0xa0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x92}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)=@generic={&(0x7f0000000680)='./file0\x00', 0x0, 0x8}, 0x18) r0 = socket(0x11, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000240)=0xe9, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000003c0)=0x6121, 0x4) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000440)="a25e517a0ba797cd49921a2bf3c4d9fbff027d4d71ae80d99867b3740698be4b94d3b5c1e6", 0x25}], 0x1, 0x0, 0x0, 0x44000}}], 0x1, 0x0) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)=ANY=[@ANYBLOB="02011400012918000e1a80009f0001140000002f0600ac141430e0000003808a8972bd0b72e41082b1a3d206"], 0xdd12}], 0x1, 0x0, 0x0, 0x4000007}, 0x1) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r4 = socket(0x11, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x9c9d}]}) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) bind$packet(r4, &(0x7f00000001c0)={0x11, 0x0, r5, 0x1, 0x2, 0x6, @broadcast}, 0x14) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008188040f80ec59acbc0413010048100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.234' (ED25519) to the list of known hosts. [ 22.961979][ T29] audit: type=1400 audit(1754905532.399:62): avc: denied { mounton } for pid=3289 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.962851][ T3289] cgroup: Unknown subsys name 'net' [ 22.984830][ T29] audit: type=1400 audit(1754905532.399:63): avc: denied { mount } for pid=3289 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.012029][ T29] audit: type=1400 audit(1754905532.429:64): avc: denied { unmount } for pid=3289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.149307][ T3289] cgroup: Unknown subsys name 'cpuset' [ 23.155476][ T3289] cgroup: Unknown subsys name 'rlimit' [ 23.264917][ T29] audit: type=1400 audit(1754905532.699:65): avc: denied { setattr } for pid=3289 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.288995][ T29] audit: type=1400 audit(1754905532.699:66): avc: denied { create } for pid=3289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.309489][ T29] audit: type=1400 audit(1754905532.699:67): avc: denied { write } for pid=3289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.329854][ T29] audit: type=1400 audit(1754905532.699:68): avc: denied { read } for pid=3289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 23.336665][ T3293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.350244][ T29] audit: type=1400 audit(1754905532.709:69): avc: denied { mounton } for pid=3289 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.383489][ T29] audit: type=1400 audit(1754905532.709:70): avc: denied { mount } for pid=3289 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 23.406823][ T29] audit: type=1400 audit(1754905532.799:71): avc: denied { relabelto } for pid=3293 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.434010][ T3289] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 24.618421][ T3302] chnl_net:caif_netlink_parms(): no params data found [ 24.656550][ T3308] chnl_net:caif_netlink_parms(): no params data found [ 24.665448][ T3300] chnl_net:caif_netlink_parms(): no params data found [ 24.710022][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 24.771032][ T3302] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.778086][ T3302] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.785226][ T3302] bridge_slave_0: entered allmulticast mode [ 24.791678][ T3302] bridge_slave_0: entered promiscuous mode [ 24.798119][ T3300] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.805212][ T3300] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.812403][ T3300] bridge_slave_0: entered allmulticast mode [ 24.818909][ T3300] bridge_slave_0: entered promiscuous mode [ 24.837731][ T3302] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.844855][ T3302] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.851960][ T3302] bridge_slave_1: entered allmulticast mode [ 24.858296][ T3302] bridge_slave_1: entered promiscuous mode [ 24.864610][ T3300] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.871676][ T3300] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.878940][ T3300] bridge_slave_1: entered allmulticast mode [ 24.885134][ T3300] bridge_slave_1: entered promiscuous mode [ 24.891304][ T3308] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.898339][ T3308] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.905547][ T3308] bridge_slave_0: entered allmulticast mode [ 24.911807][ T3308] bridge_slave_0: entered promiscuous mode [ 24.918301][ T3308] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.925418][ T3308] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.932633][ T3308] bridge_slave_1: entered allmulticast mode [ 24.938985][ T3308] bridge_slave_1: entered promiscuous mode [ 24.989041][ T3308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.998195][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.005302][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.013180][ T3306] bridge_slave_0: entered allmulticast mode [ 25.019509][ T3306] bridge_slave_0: entered promiscuous mode [ 25.026508][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 25.036643][ T3300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 25.046494][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 25.055620][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 25.067702][ T3308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 25.076856][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.083996][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.091143][ T3306] bridge_slave_1: entered allmulticast mode [ 25.097547][ T3306] bridge_slave_1: entered promiscuous mode [ 25.109210][ T3300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 25.147797][ T3300] team0: Port device team_slave_0 added [ 25.163509][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 25.173208][ T3302] team0: Port device team_slave_0 added [ 25.179774][ T3302] team0: Port device team_slave_1 added [ 25.188048][ T3300] team0: Port device team_slave_1 added [ 25.194241][ T3308] team0: Port device team_slave_0 added [ 25.200686][ T3308] team0: Port device team_slave_1 added [ 25.207126][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 25.255941][ T3306] team0: Port device team_slave_0 added [ 25.261925][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.268931][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.294837][ T3302] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.309967][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.316910][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.342832][ T3300] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.353624][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.360611][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.386620][ T3308] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.398033][ T3306] team0: Port device team_slave_1 added [ 25.403952][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.410918][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.436786][ T3302] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.454334][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.461350][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.487276][ T3300] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.498138][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.505139][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.531067][ T3308] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.551227][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.558175][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.584124][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.594787][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.601958][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.609081][ T3310] bridge_slave_0: entered allmulticast mode [ 25.615357][ T3310] bridge_slave_0: entered promiscuous mode [ 25.624225][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.631295][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.638430][ T3310] bridge_slave_1: entered allmulticast mode [ 25.644883][ T3310] bridge_slave_1: entered promiscuous mode [ 25.663834][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.670871][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.696791][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.728539][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 25.739152][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 25.777046][ T3306] hsr_slave_0: entered promiscuous mode [ 25.783083][ T3306] hsr_slave_1: entered promiscuous mode [ 25.801532][ T3308] hsr_slave_0: entered promiscuous mode [ 25.807546][ T3308] hsr_slave_1: entered promiscuous mode [ 25.813345][ T3308] debugfs: 'hsr0' already exists in 'hsr' [ 25.819084][ T3308] Cannot create hsr debugfs directory [ 25.826516][ T3302] hsr_slave_0: entered promiscuous mode [ 25.832700][ T3302] hsr_slave_1: entered promiscuous mode [ 25.838413][ T3302] debugfs: 'hsr0' already exists in 'hsr' [ 25.844193][ T3302] Cannot create hsr debugfs directory [ 25.856097][ T3300] hsr_slave_0: entered promiscuous mode [ 25.862075][ T3300] hsr_slave_1: entered promiscuous mode [ 25.867803][ T3300] debugfs: 'hsr0' already exists in 'hsr' [ 25.873547][ T3300] Cannot create hsr debugfs directory [ 25.890832][ T3310] team0: Port device team_slave_0 added [ 25.910350][ T3310] team0: Port device team_slave_1 added [ 25.941887][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.948926][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.974833][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.995196][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 26.002177][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 26.028082][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 26.095087][ T3310] hsr_slave_0: entered promiscuous mode [ 26.101178][ T3310] hsr_slave_1: entered promiscuous mode [ 26.106900][ T3310] debugfs: 'hsr0' already exists in 'hsr' [ 26.112630][ T3310] Cannot create hsr debugfs directory [ 26.215080][ T3300] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 26.223752][ T3300] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 26.234198][ T3300] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 26.245160][ T3300] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 26.261727][ T3306] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 26.274757][ T3306] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 26.283566][ T3306] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 26.292184][ T3306] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 26.315902][ T3302] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 26.324543][ T3302] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 26.335741][ T3302] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 26.344907][ T3302] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 26.377764][ T3310] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 26.387079][ T3310] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 26.396020][ T3310] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 26.414152][ T3310] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 26.447048][ T3308] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 26.455670][ T3308] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 26.469793][ T3308] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 26.491326][ T3308] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 26.505998][ T3300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.536202][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.548195][ T3300] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.559557][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.568508][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.583694][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.590785][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.600005][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.607056][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.615521][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.622593][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.637492][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.644546][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.654438][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.673356][ T3302] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.692463][ T1853] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.699584][ T1853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.710734][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.731001][ T3308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.744538][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.751648][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.767941][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.775069][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.784935][ T111] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.792085][ T111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.805178][ T3308] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.830867][ T111] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.837949][ T111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.860057][ T1853] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.867209][ T1853] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.898073][ T3302] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 26.918689][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.928287][ T3300] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.004419][ T3302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.056464][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.070599][ T3308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 27.082566][ T3300] veth0_vlan: entered promiscuous mode [ 27.118584][ T3300] veth1_vlan: entered promiscuous mode [ 27.179831][ T3300] veth0_macvtap: entered promiscuous mode [ 27.195553][ T3310] veth0_vlan: entered promiscuous mode [ 27.207488][ T3302] veth0_vlan: entered promiscuous mode [ 27.228297][ T3310] veth1_vlan: entered promiscuous mode [ 27.235975][ T3300] veth1_macvtap: entered promiscuous mode [ 27.254135][ T3308] veth0_vlan: entered promiscuous mode [ 27.263391][ T3302] veth1_vlan: entered promiscuous mode [ 27.274068][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.283806][ T3308] veth1_vlan: entered promiscuous mode [ 27.300653][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.320403][ T3310] veth0_macvtap: entered promiscuous mode [ 27.328636][ T3310] veth1_macvtap: entered promiscuous mode [ 27.335110][ T41] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.345141][ T41] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.354104][ T3306] veth0_vlan: entered promiscuous mode [ 27.364812][ T3308] veth0_macvtap: entered promiscuous mode [ 27.371537][ T41] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.387577][ T3306] veth1_vlan: entered promiscuous mode [ 27.400386][ T41] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.411145][ T3302] veth0_macvtap: entered promiscuous mode [ 27.418399][ T3300] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 27.430179][ T3302] veth1_macvtap: entered promiscuous mode [ 27.444731][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.455734][ T3308] veth1_macvtap: entered promiscuous mode [ 27.463013][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.472958][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.487895][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.497505][ T3306] veth0_macvtap: entered promiscuous mode [ 27.509537][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.553778][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.562316][ T1853] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.571604][ T3306] veth1_macvtap: entered promiscuous mode [ 27.584608][ T1853] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.593657][ T1853] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.610084][ T1853] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.622456][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.630032][ T1853] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.656838][ T1853] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.668362][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.705914][ T1853] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.731863][ T1853] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.762015][ T1853] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.773894][ T1853] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.783604][ T1853] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.811552][ T1853] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.822571][ T1853] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.835033][ T3422] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.845980][ T3422] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.856822][ T3422] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.875600][ T3395] kernel read not supported for file /vcs (pid: 3395 comm: kworker/1:4) [ 27.955152][ T3506] syz.1.9 uses obsolete (PF_INET,SOCK_PACKET) [ 27.968973][ T29] kauditd_printk_skb: 50 callbacks suppressed [ 27.968985][ T29] audit: type=1400 audit(1754905537.409:122): avc: denied { getopt } for pid=3504 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 27.996190][ T29] audit: type=1400 audit(1754905537.429:123): avc: denied { create } for pid=3504 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 28.015635][ T29] audit: type=1400 audit(1754905537.429:124): avc: denied { setopt } for pid=3504 comm="syz.1.9" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 28.050150][ T29] audit: type=1400 audit(1754905537.439:125): avc: denied { create } for pid=3496 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 28.069478][ T29] audit: type=1400 audit(1754905537.439:126): avc: denied { ioctl } for pid=3496 comm="syz.2.3" path="socket:[5122]" dev="sockfs" ino=5122 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 28.089076][ T3511] loop1: detected capacity change from 0 to 128 [ 28.118366][ T29] audit: type=1400 audit(1754905537.549:127): avc: denied { mount } for pid=3510 comm="syz.1.10" name="/" dev="loop1" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 28.139789][ T3511] FAULT_INJECTION: forcing a failure. [ 28.139789][ T3511] name failslab, interval 1, probability 0, space 0, times 1 [ 28.152742][ T3511] CPU: 1 UID: 0 PID: 3511 Comm: syz.1.10 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 28.152765][ T3511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 28.152774][ T3511] Call Trace: [ 28.152779][ T3511] [ 28.152785][ T3511] __dump_stack+0x1d/0x30 [ 28.152807][ T3511] dump_stack_lvl+0xe8/0x140 [ 28.152822][ T3511] dump_stack+0x15/0x1b [ 28.152834][ T3511] should_fail_ex+0x265/0x280 [ 28.152851][ T3511] should_failslab+0x8c/0xb0 [ 28.152869][ T3511] kmem_cache_alloc_noprof+0x50/0x310 [ 28.152893][ T3511] ? mas_alloc_nodes+0x265/0x520 [ 28.152925][ T3511] mas_alloc_nodes+0x265/0x520 [ 28.152949][ T3511] mas_preallocate+0x33e/0x520 [ 28.152971][ T3511] __split_vma+0x240/0x650 [ 28.152997][ T3511] ? mas_find+0x5d5/0x700 [ 28.153019][ T3511] vms_gather_munmap_vmas+0x2b2/0x7b0 [ 28.153046][ T3511] mmap_region+0x53f/0x1630 [ 28.153068][ T3511] ? mntput_no_expire+0x6f/0x460 [ 28.153098][ T3511] ? spurious_kernel_fault+0xf4/0x4a0 [ 28.153135][ T3511] do_mmap+0x9b3/0xbe0 [ 28.153160][ T3511] vm_mmap_pgoff+0x17a/0x2e0 [ 28.153187][ T3511] ksys_mmap_pgoff+0x268/0x310 [ 28.153215][ T3511] x64_sys_call+0x14a3/0x2ff0 [ 28.153231][ T3511] do_syscall_64+0xd2/0x200 [ 28.153250][ T3511] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 28.153271][ T3511] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 28.153292][ T3511] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 28.153310][ T3511] RIP: 0033:0x7fc3007eebe9 [ 28.153328][ T3511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 28.153342][ T3511] RSP: 002b:00007fc2ff257038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 28.153361][ T3511] RAX: ffffffffffffffda RBX: 00007fc300a15fa0 RCX: 00007fc3007eebe9 [ 28.153371][ T3511] RDX: 000000000100000b RSI: 0000000000004000 RDI: 0000200000000000 [ 28.153381][ T3511] RBP: 00007fc2ff257090 R08: 0000000000000004 R09: 0000000000000000 [ 28.153391][ T3511] R10: 0000000000002013 R11: 0000000000000246 R12: 0000000000000001 [ 28.153403][ T3511] R13: 00007fc300a16038 R14: 00007fc300a15fa0 R15: 00007ffeb21681a8 [ 28.153421][ T3511] [ 28.153943][ T3511] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000100) [ 28.166379][ T29] audit: type=1400 audit(1754905537.569:128): avc: denied { read } for pid=3496 comm="syz.2.3" name="event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 28.174737][ T3511] FAT-fs (loop1): Filesystem has been set read-only [ 28.175413][ T3511] FAT-fs (loop1): error, invalid access to FAT (entry 0x00000100) [ 28.178185][ T29] audit: type=1400 audit(1754905537.569:129): avc: denied { open } for pid=3496 comm="syz.2.3" path="/dev/input/event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 28.181438][ T3511] syz.1.10: attempt to access beyond end of device [ 28.181438][ T3511] loop1: rw=2049, sector=2065, nr_sectors = 8 limit=128 [ 28.185623][ T29] audit: type=1400 audit(1754905537.569:130): avc: denied { write } for pid=3496 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.471467][ T29] audit: type=1400 audit(1754905537.639:131): avc: denied { read } for pid=3496 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.526935][ T3513] netlink: 'syz.1.11': attribute type 13 has an invalid length. [ 28.534768][ T3513] netlink: 'syz.1.11': attribute type 17 has an invalid length. [ 28.548297][ T3515] netlink: 'syz.0.12': attribute type 13 has an invalid length. [ 28.556115][ T3515] netlink: 'syz.0.12': attribute type 17 has an invalid length. [ 28.618074][ T3515] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 28.629429][ T3520] loop3: detected capacity change from 0 to 2048 [ 28.649728][ T3518] netlink: 'syz.4.14': attribute type 13 has an invalid length. [ 28.657394][ T3518] netlink: 'syz.4.14': attribute type 17 has an invalid length. [ 28.679846][ T3520] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 28.716860][ T3528] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 28.736907][ T3528] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 28.744770][ T3513] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 28.787436][ T3531] FAULT_INJECTION: forcing a failure. [ 28.787436][ T3531] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 28.800696][ T3531] CPU: 0 UID: 0 PID: 3531 Comm: syz.2.17 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 28.800724][ T3531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 28.800736][ T3531] Call Trace: [ 28.800742][ T3531] [ 28.800825][ T3531] __dump_stack+0x1d/0x30 [ 28.800843][ T3531] dump_stack_lvl+0xe8/0x140 [ 28.800859][ T3531] dump_stack+0x15/0x1b [ 28.800873][ T3531] should_fail_ex+0x265/0x280 [ 28.800895][ T3531] should_fail+0xb/0x20 [ 28.800909][ T3531] should_fail_usercopy+0x1a/0x20 [ 28.800940][ T3531] _copy_from_user+0x1c/0xb0 [ 28.801075][ T3531] snd_seq_ioctl+0x127/0x2e0 [ 28.801107][ T3531] ? __pfx_snd_seq_ioctl+0x10/0x10 [ 28.801132][ T3531] __se_sys_ioctl+0xcb/0x140 [ 28.801223][ T3531] __x64_sys_ioctl+0x43/0x50 [ 28.801252][ T3531] x64_sys_call+0x1816/0x2ff0 [ 28.801273][ T3531] do_syscall_64+0xd2/0x200 [ 28.801329][ T3531] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 28.801399][ T3531] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 28.801465][ T3531] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 28.801486][ T3531] RIP: 0033:0x7f9ee09eebe9 [ 28.801501][ T3531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 28.801591][ T3531] RSP: 002b:00007f9edf44f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 28.801608][ T3531] RAX: ffffffffffffffda RBX: 00007f9ee0c15fa0 RCX: 00007f9ee09eebe9 [ 28.801621][ T3531] RDX: 0000200000000180 RSI: 000000004058534c RDI: 0000000000000005 [ 28.801634][ T3531] RBP: 00007f9edf44f090 R08: 0000000000000000 R09: 0000000000000000 [ 28.801669][ T3531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 28.801679][ T3531] R13: 00007f9ee0c16038 R14: 00007f9ee0c15fa0 R15: 00007ffee7b04158 [ 28.801695][ T3531] [ 28.989769][ T3518] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 29.059257][ T3302] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 29.168561][ T3554] loop2: detected capacity change from 0 to 128 [ 29.237613][ T3557] tipc: Enabling of bearer rejected, failed to enable media [ 29.306462][ T3555] loop3: detected capacity change from 0 to 512 [ 29.347365][ T3555] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 29.360984][ T3559] loop1: detected capacity change from 0 to 512 [ 29.558050][ T3555] ext4 filesystem being mounted at /3/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 29.636539][ T3559] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 29.785994][ T3559] ext4 filesystem being mounted at /8/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 30.107471][ T3555] kexec: Could not allocate control_code_buffer [ 30.131906][ T3308] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 30.150567][ T3302] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 30.322440][ T3586] SELinux: failed to load policy [ 30.664302][ T36] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.671812][ T36] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.679315][ T36] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.686689][ T36] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.694112][ T36] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.701588][ T36] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.709012][ T36] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.716408][ T36] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.723872][ T36] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.731359][ T36] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 30.739734][ T36] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz1 [ 30.788175][ T3601] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 30.790568][ T3600] loop2: detected capacity change from 0 to 2048 [ 30.795723][ T3601] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 30.815181][ T3601] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 30.822613][ T3601] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 30.849521][ T3600] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 30.876928][ T3602] fido_id[3602]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 30.899925][ T3608] loop3: detected capacity change from 0 to 512 [ 30.908067][ T3608] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 30.921295][ T3608] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 30.942801][ T3608] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a00ee018, mo2=0002] [ 30.951228][ T3608] System zones: 1-12 [ 30.952799][ T3306] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 30.964633][ T3608] EXT4-fs (loop3): 1 truncate cleaned up [ 30.971557][ T3608] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 30.985599][ T3608] EXT4-fs warning (device loop3): ext4_group_extend:1862: can't shrink FS - resize aborted [ 31.010674][ T3302] EXT4-fs error (device loop3): ext4_readdir:264: inode #11: block 54: comm syz-executor: path /6/file2/lost+found: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 31.033339][ T3302] EXT4-fs error (device loop3): ext4_empty_dir:3124: inode #11: block 54: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=5120, inode=0, rec_len=0, size=1024 fake=0 [ 31.054185][ T3302] EXT4-fs error (device loop3): ext4_readdir:264: inode #11: block 54: comm syz-executor: path /6/file2/lost+found: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 31.081765][ T3302] EXT4-fs error (device loop3): ext4_empty_dir:3124: inode #11: block 54: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=5120, inode=0, rec_len=0, size=1024 fake=0 [ 31.106527][ T3302] EXT4-fs error (device loop3): ext4_readdir:264: inode #11: block 54: comm syz-executor: path /6/file2/lost+found: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 31.146691][ T3615] process 'syz.2.41' launched '/dev/fd/4' with NULL argv: empty string added [ 31.156381][ T3302] EXT4-fs error (device loop3): ext4_empty_dir:3124: inode #11: block 54: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=5120, inode=0, rec_len=0, size=1024 fake=0 [ 31.178452][ T3302] EXT4-fs error (device loop3): ext4_readdir:264: inode #11: block 54: comm syz-executor: path /6/file2/lost+found: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 31.203502][ T3302] EXT4-fs error (device loop3): ext4_empty_dir:3124: inode #11: block 54: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=5120, inode=0, rec_len=0, size=1024 fake=0 [ 31.232895][ T3302] EXT4-fs error (device loop3): ext4_readdir:264: inode #11: block 54: comm syz-executor: path /6/file2/lost+found: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 31.260562][ T3302] EXT4-fs error (device loop3): ext4_empty_dir:3124: inode #11: block 54: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=5120, inode=0, rec_len=0, size=1024 fake=0 [ 31.511948][ T3614] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.522528][ T3302] syz-executor (3302) used greatest stack depth: 10776 bytes left [ 31.542929][ T561] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 31.592122][ T561] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 31.691320][ T561] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 31.739076][ T561] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 31.901823][ T561] bridge_slave_1: left allmulticast mode [ 31.907517][ T561] bridge_slave_1: left promiscuous mode [ 31.913329][ T561] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.958036][ T561] bridge_slave_0: left allmulticast mode [ 31.964630][ T561] bridge_slave_0: left promiscuous mode [ 31.970409][ T561] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.011994][ T3661] netlink: 'syz.1.57': attribute type 13 has an invalid length. [ 32.019687][ T3661] netlink: 'syz.1.57': attribute type 17 has an invalid length. [ 32.114190][ T561] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 32.119113][ T3671] FAULT_INJECTION: forcing a failure. [ 32.119113][ T3671] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 32.135988][ T3671] CPU: 0 UID: 0 PID: 3671 Comm: syz.2.60 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 32.136031][ T3671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 32.136106][ T3671] Call Trace: [ 32.136112][ T3671] [ 32.136119][ T3671] __dump_stack+0x1d/0x30 [ 32.136137][ T3671] dump_stack_lvl+0xe8/0x140 [ 32.136154][ T3671] dump_stack+0x15/0x1b [ 32.136171][ T3671] should_fail_ex+0x265/0x280 [ 32.136193][ T3671] should_fail+0xb/0x20 [ 32.136235][ T3671] should_fail_usercopy+0x1a/0x20 [ 32.136254][ T3671] _copy_to_user+0x20/0xa0 [ 32.136282][ T3671] simple_read_from_buffer+0xb5/0x130 [ 32.136304][ T3671] proc_fail_nth_read+0x10e/0x150 [ 32.136412][ T3671] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 32.136437][ T3671] vfs_read+0x1a8/0x770 [ 32.136454][ T3671] ? __rcu_read_unlock+0x4f/0x70 [ 32.136472][ T3671] ? __fget_files+0x184/0x1c0 [ 32.136493][ T3671] ksys_read+0xda/0x1a0 [ 32.136517][ T3671] __x64_sys_read+0x40/0x50 [ 32.136590][ T3671] x64_sys_call+0x27bc/0x2ff0 [ 32.136611][ T3671] do_syscall_64+0xd2/0x200 [ 32.136670][ T3671] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 32.136697][ T3671] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 32.136716][ T3671] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 32.136817][ T3671] RIP: 0033:0x7f9ee09ed5fc [ 32.136832][ T3671] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 32.136849][ T3671] RSP: 002b:00007f9edf44f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 32.136869][ T3671] RAX: ffffffffffffffda RBX: 00007f9ee0c15fa0 RCX: 00007f9ee09ed5fc [ 32.136883][ T3671] RDX: 000000000000000f RSI: 00007f9edf44f0a0 RDI: 0000000000000006 [ 32.136966][ T3671] RBP: 00007f9edf44f090 R08: 0000000000000000 R09: 0000000000000000 [ 32.136989][ T3671] R10: 0000200000000080 R11: 0000000000000246 R12: 0000000000000001 [ 32.137007][ T3671] R13: 00007f9ee0c16038 R14: 00007f9ee0c15fa0 R15: 00007ffee7b04158 [ 32.137027][ T3671] [ 32.189732][ T561] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 32.444734][ T561] bond0 (unregistering): Released all slaves [ 32.471880][ T3661] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 32.490167][ T3646] chnl_net:caif_netlink_parms(): no params data found [ 32.734334][ T561] hsr_slave_0: left promiscuous mode [ 32.740218][ T561] hsr_slave_1: left promiscuous mode [ 32.749832][ T3685] 9pnet_fd: Insufficient options for proto=fd [ 32.762419][ T561] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 32.770647][ T561] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 32.805207][ T561] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 32.812702][ T561] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 32.848949][ T3694] Invalid ELF header magic: != ELF [ 32.888351][ T561] veth1_macvtap: left promiscuous mode [ 32.894784][ T3699] Invalid ELF header magic: != ELF [ 32.904487][ T561] veth0_macvtap: left promiscuous mode [ 32.914851][ T561] veth1_vlan: left promiscuous mode [ 32.921699][ T561] veth0_vlan: left promiscuous mode [ 32.979207][ T29] kauditd_printk_skb: 125 callbacks suppressed [ 32.979222][ T29] audit: type=1400 audit(1754905542.419:257): avc: denied { add_name } for pid=3686 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 33.007933][ T29] audit: type=1400 audit(1754905542.419:258): avc: denied { create } for pid=3686 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 33.082803][ T29] audit: type=1400 audit(1754905542.469:259): avc: denied { write } for pid=3686 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=898 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 33.109115][ T29] audit: type=1400 audit(1754905542.469:260): avc: denied { append } for pid=3686 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=898 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 33.133273][ T29] audit: type=1400 audit(1754905542.489:261): avc: denied { remove_name } for pid=3709 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=898 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 33.156594][ T29] audit: type=1400 audit(1754905542.489:262): avc: denied { unlink } for pid=3709 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=898 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 33.230437][ T561] team0 (unregistering): Port device team_slave_1 removed [ 33.291673][ T561] team0 (unregistering): Port device team_slave_0 removed [ 33.371816][ T3685] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.64'. [ 33.381817][ T29] audit: type=1326 audit(1754905542.819:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3679 comm="syz.2.64" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ee09eebe9 code=0x7ffc0000 [ 33.405114][ T29] audit: type=1326 audit(1754905542.819:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3679 comm="syz.2.64" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ee09eebe9 code=0x7ffc0000 [ 33.450466][ T3646] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.457614][ T3646] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.504496][ T3646] bridge_slave_0: entered allmulticast mode [ 33.521324][ T3646] bridge_slave_0: entered promiscuous mode [ 33.536393][ T3646] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.543516][ T3646] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.551517][ T3646] bridge_slave_1: entered allmulticast mode [ 33.558033][ T3646] bridge_slave_1: entered promiscuous mode [ 33.565613][ T3729] loop2: detected capacity change from 0 to 2048 [ 33.582875][ T3729] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 33.598082][ T3646] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.612672][ T3646] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.616662][ T3729] ext4 filesystem being mounted at /19/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 33.640856][ T3646] team0: Port device team_slave_0 added [ 33.642289][ T3729] netlink: 'syz.2.68': attribute type 4 has an invalid length. [ 33.647380][ T3646] team0: Port device team_slave_1 added [ 33.675062][ T3646] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.682117][ T3646] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.708061][ T3646] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.721167][ T3646] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.728197][ T3646] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.754160][ T3646] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.765664][ T3306] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 33.791006][ T3646] hsr_slave_0: entered promiscuous mode [ 33.814326][ T29] audit: type=1400 audit(1754905543.239:265): avc: denied { unlink } for pid=3310 comm="syz-executor" name="file0" dev="tmpfs" ino=60 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 33.838552][ T3646] hsr_slave_1: entered promiscuous mode [ 33.852517][ T3646] debugfs: 'hsr0' already exists in 'hsr' [ 33.858285][ T3646] Cannot create hsr debugfs directory [ 33.885109][ T3746] loop2: detected capacity change from 0 to 2048 [ 33.926053][ T3762] program syz.1.76 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 33.942909][ T29] audit: type=1400 audit(1754905543.359:266): avc: denied { read write } for pid=3761 comm="syz.1.76" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 33.959308][ T3746] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 33.984689][ T3767] netlink: 'syz.0.74': attribute type 13 has an invalid length. [ 33.992409][ T3767] netlink: 'syz.0.74': attribute type 17 has an invalid length. [ 34.001924][ T3762] netlink: 32 bytes leftover after parsing attributes in process `syz.1.76'. [ 34.059003][ T3767] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 34.095582][ T3306] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.164370][ T3646] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 34.167591][ T3775] netlink: 'syz.1.77': attribute type 13 has an invalid length. [ 34.178834][ T3775] netlink: 'syz.1.77': attribute type 17 has an invalid length. [ 34.201190][ T3646] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 34.331108][ T3775] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 34.367642][ T3646] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 34.401688][ T3646] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 34.463084][ T3778] loop0: detected capacity change from 0 to 1024 [ 34.495407][ T3778] EXT4-fs: Ignoring removed nomblk_io_submit option [ 34.546987][ T3778] EXT4-fs: Mount option(s) incompatible with ext2 [ 34.575705][ T3646] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.586545][ T3646] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.648836][ T1853] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.655941][ T1853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.704027][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.711201][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.824599][ T3828] FAULT_INJECTION: forcing a failure. [ 34.824599][ T3828] name failslab, interval 1, probability 0, space 0, times 0 [ 34.837269][ T3828] CPU: 1 UID: 0 PID: 3828 Comm: syz.4.85 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 34.837306][ T3828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 34.837317][ T3828] Call Trace: [ 34.837322][ T3828] [ 34.837328][ T3828] __dump_stack+0x1d/0x30 [ 34.837348][ T3828] dump_stack_lvl+0xe8/0x140 [ 34.837364][ T3828] dump_stack+0x15/0x1b [ 34.837378][ T3828] should_fail_ex+0x265/0x280 [ 34.837395][ T3828] should_failslab+0x8c/0xb0 [ 34.837415][ T3828] kmem_cache_alloc_noprof+0x50/0x310 [ 34.837465][ T3828] ? mpol_parse_str+0x4b8/0x6b0 [ 34.837484][ T3828] mpol_parse_str+0x4b8/0x6b0 [ 34.837546][ T3828] shmem_parse_one+0x9fa/0xba0 [ 34.837577][ T3828] vfs_parse_fs_param+0x142/0x2a0 [ 34.837664][ T3828] ? __pfx_shmem_next_opt+0x10/0x10 [ 34.837686][ T3828] vfs_parse_monolithic_sep+0x18a/0x200 [ 34.837710][ T3828] shmem_parse_monolithic+0x24/0x30 [ 34.837726][ T3828] parse_monolithic_mount_data+0x43/0x60 [ 34.837746][ T3828] do_new_mount+0x1da/0x5e0 [ 34.837840][ T3828] ? security_capable+0x83/0x90 [ 34.837941][ T3828] path_mount+0x4a4/0xb20 [ 34.838015][ T3828] ? user_path_at+0x109/0x130 [ 34.838044][ T3828] __se_sys_mount+0x28f/0x2e0 [ 34.838125][ T3828] ? fput+0x8f/0xc0 [ 34.838152][ T3828] __x64_sys_mount+0x67/0x80 [ 34.838173][ T3828] x64_sys_call+0x2b4d/0x2ff0 [ 34.838244][ T3828] do_syscall_64+0xd2/0x200 [ 34.838270][ T3828] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 34.838290][ T3828] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 34.838309][ T3828] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 34.838367][ T3828] RIP: 0033:0x7f562d17ebe9 [ 34.838382][ T3828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.838475][ T3828] RSP: 002b:00007f562bbdf038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 34.838491][ T3828] RAX: ffffffffffffffda RBX: 00007f562d3a5fa0 RCX: 00007f562d17ebe9 [ 34.838501][ T3828] RDX: 0000200000000300 RSI: 00002000000002c0 RDI: 0000000000000000 [ 34.838512][ T3828] RBP: 00007f562bbdf090 R08: 00002000000004c0 R09: 0000000000000000 [ 34.838522][ T3828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 34.838532][ T3828] R13: 00007f562d3a6038 R14: 00007f562d3a5fa0 R15: 00007ffdbe5f69b8 [ 34.838583][ T3828] [ 34.838592][ T3828] tmpfs: Bad value for 'mpol' [ 34.858618][ T3646] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.941429][ T3835] loop4: detected capacity change from 0 to 8192 [ 35.108713][ C0] hrtimer: interrupt took 25378 ns [ 35.125774][ T3835] ======================================================= [ 35.125774][ T3835] WARNING: The mand mount option has been deprecated and [ 35.125774][ T3835] and is ignored by this kernel. Remove the mand [ 35.125774][ T3835] option from the mount to silence this warning. [ 35.125774][ T3835] ======================================================= [ 35.177099][ T3842] netlink: 32 bytes leftover after parsing attributes in process `syz.2.89'. [ 35.287982][ T3842] netlink: 4 bytes leftover after parsing attributes in process `syz.2.89'. [ 35.361887][ T3646] veth0_vlan: entered promiscuous mode [ 35.390640][ T3646] veth1_vlan: entered promiscuous mode [ 35.436564][ T3646] veth0_macvtap: entered promiscuous mode [ 35.445508][ T3646] veth1_macvtap: entered promiscuous mode [ 35.494226][ T3646] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.546115][ T3646] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.561853][ T3902] loop4: detected capacity change from 0 to 512 [ 35.570493][ T41] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.584243][ T41] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.605810][ T41] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.623119][ T3902] EXT4-fs: Ignoring removed mblk_io_submit option [ 35.645109][ T41] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.661222][ T3902] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 35.683664][ T3902] EXT4-fs (loop4): 1 truncate cleaned up [ 35.695148][ T3902] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.712547][ T3902] EXT4-fs (loop4): resizing filesystem from 256 to 1 blocks [ 35.720037][ T3902] EXT4-fs warning (device loop4): ext4_resize_fs:2042: can't shrink FS - resize aborted [ 35.744419][ T3310] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.793731][ T3933] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3933 comm=syz.5.55 [ 35.886712][ T3951] bridge_slave_0: left allmulticast mode [ 35.892473][ T3951] bridge_slave_0: left promiscuous mode [ 35.898256][ T3951] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.908058][ T3951] bridge_slave_1: left allmulticast mode [ 35.913893][ T3951] bridge_slave_1: left promiscuous mode [ 35.919605][ T3951] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.929861][ T3951] bond0: (slave bond_slave_0): Releasing backup interface [ 35.939655][ T3951] bond0: (slave bond_slave_1): Releasing backup interface [ 35.951654][ T3951] team0: Port device team_slave_0 removed [ 35.961566][ T3951] team0: Port device team_slave_1 removed [ 36.102191][ T3969] netlink: 32 bytes leftover after parsing attributes in process `syz.4.103'. [ 36.147899][ T3973] netlink: 'syz.4.105': attribute type 1 has an invalid length. [ 36.156052][ T3973] netlink: 16 bytes leftover after parsing attributes in process `syz.4.105'. [ 36.214744][ T3973] Freezing with imperfect legacy cgroup freezer. See cgroup.freeze of cgroup v2 [ 36.465259][ T3993] netlink: 'syz.4.110': attribute type 10 has an invalid length. [ 36.505219][ T3993] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.513447][ T3993] bond0: (slave team0): Enslaving as an active interface with an up link [ 36.532305][ T3995] FAULT_INJECTION: forcing a failure. [ 36.532305][ T3995] name failslab, interval 1, probability 0, space 0, times 0 [ 36.545053][ T3995] CPU: 1 UID: 0 PID: 3995 Comm: syz.2.113 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 36.545077][ T3995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 36.545138][ T3995] Call Trace: [ 36.545144][ T3995] [ 36.545152][ T3995] __dump_stack+0x1d/0x30 [ 36.545172][ T3995] dump_stack_lvl+0xe8/0x140 [ 36.545188][ T3995] dump_stack+0x15/0x1b [ 36.545250][ T3995] should_fail_ex+0x265/0x280 [ 36.545268][ T3995] should_failslab+0x8c/0xb0 [ 36.545368][ T3995] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 36.545471][ T3995] ? sidtab_sid2str_get+0xa0/0x130 [ 36.545495][ T3995] kmemdup_noprof+0x2b/0x70 [ 36.545558][ T3995] sidtab_sid2str_get+0xa0/0x130 [ 36.545584][ T3995] security_sid_to_context_core+0x1eb/0x2e0 [ 36.545606][ T3995] security_sid_to_context+0x27/0x40 [ 36.545666][ T3995] selinux_lsmprop_to_secctx+0x67/0xf0 [ 36.545688][ T3995] security_lsmprop_to_secctx+0x43/0x80 [ 36.545712][ T3995] audit_log_task_context+0x77/0x190 [ 36.545813][ T3995] audit_log_task+0xf4/0x250 [ 36.545841][ T3995] audit_seccomp+0x61/0x100 [ 36.545864][ T3995] ? __seccomp_filter+0x68c/0x10d0 [ 36.545882][ T3995] __seccomp_filter+0x69d/0x10d0 [ 36.545937][ T3995] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 36.545961][ T3995] ? vfs_write+0x7e8/0x960 [ 36.545980][ T3995] ? __rcu_read_unlock+0x4f/0x70 [ 36.545999][ T3995] ? __fget_files+0x184/0x1c0 [ 36.546087][ T3995] __secure_computing+0x82/0x150 [ 36.546104][ T3995] syscall_trace_enter+0xcf/0x1e0 [ 36.546127][ T3995] do_syscall_64+0xac/0x200 [ 36.546150][ T3995] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 36.546170][ T3995] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 36.546333][ T3995] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.546352][ T3995] RIP: 0033:0x7f9ee09eebe9 [ 36.546366][ T3995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 36.546457][ T3995] RSP: 002b:00007f9edf44f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 36.546473][ T3995] RAX: ffffffffffffffda RBX: 00007f9ee0c15fa0 RCX: 00007f9ee09eebe9 [ 36.546484][ T3995] RDX: 0000000000000000 RSI: 0000000040187014 RDI: 0000000000000003 [ 36.546495][ T3995] RBP: 00007f9edf44f090 R08: 0000000000000000 R09: 0000000000000000 [ 36.546505][ T3995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 36.546516][ T3995] R13: 00007f9ee0c16038 R14: 00007f9ee0c15fa0 R15: 00007ffee7b04158 [ 36.546530][ T3995] [ 36.803262][ T3996] netlink: 'syz.0.112': attribute type 13 has an invalid length. [ 36.811068][ T3996] netlink: 'syz.0.112': attribute type 17 has an invalid length. [ 36.848368][ T3996] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 36.867200][ T4000] netlink: 32 bytes leftover after parsing attributes in process `syz.1.114'. [ 36.892076][ T4008] netlink: 'syz.5.115': attribute type 10 has an invalid length. [ 36.904907][ T4008] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.913200][ T4008] bond0: (slave team0): Enslaving as an active interface with an up link [ 37.176942][ T4029] loop0: detected capacity change from 0 to 512 [ 37.196402][ T4029] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -2 [ 37.228352][ T4029] EXT4-fs error (device loop0): ext4_free_branches:1023: inode #13: comm syz.0.124: invalid indirect mapped block 2683928664 (level 1) [ 37.255734][ T4042] loop1: detected capacity change from 0 to 256 [ 37.267951][ T4042] FAT-fs (loop1): Directory bread(block 64) failed [ 37.279212][ T4029] EXT4-fs (loop0): 1 truncate cleaned up [ 37.291723][ T4029] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 37.309825][ T4042] FAT-fs (loop1): Directory bread(block 65) failed [ 37.326511][ T4042] FAT-fs (loop1): Directory bread(block 66) failed [ 37.348504][ T4029] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.375238][ T4042] FAT-fs (loop1): Directory bread(block 67) failed [ 37.383926][ T4042] FAT-fs (loop1): Directory bread(block 68) failed [ 37.391479][ T4042] FAT-fs (loop1): Directory bread(block 69) failed [ 37.398095][ T4042] FAT-fs (loop1): Directory bread(block 70) failed [ 37.405116][ T4042] FAT-fs (loop1): Directory bread(block 71) failed [ 37.414686][ T4042] FAT-fs (loop1): Directory bread(block 72) failed [ 37.421553][ T4042] FAT-fs (loop1): Directory bread(block 73) failed [ 37.488195][ T4049] FAULT_INJECTION: forcing a failure. [ 37.488195][ T4049] name failslab, interval 1, probability 0, space 0, times 0 [ 37.500914][ T4049] CPU: 1 UID: 0 PID: 4049 Comm: syz.2.131 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 37.500941][ T4049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 37.500971][ T4049] Call Trace: [ 37.500976][ T4049] [ 37.500983][ T4049] __dump_stack+0x1d/0x30 [ 37.501005][ T4049] dump_stack_lvl+0xe8/0x140 [ 37.501024][ T4049] dump_stack+0x15/0x1b [ 37.501040][ T4049] should_fail_ex+0x265/0x280 [ 37.501117][ T4049] should_failslab+0x8c/0xb0 [ 37.501203][ T4049] kmem_cache_alloc_noprof+0x50/0x310 [ 37.501226][ T4049] ? getname_flags+0x80/0x3b0 [ 37.501248][ T4049] getname_flags+0x80/0x3b0 [ 37.501273][ T4049] user_path_at+0x28/0x130 [ 37.501355][ T4049] __se_sys_mount+0x25b/0x2e0 [ 37.501373][ T4049] ? fput+0x8f/0xc0 [ 37.501425][ T4049] __x64_sys_mount+0x67/0x80 [ 37.501521][ T4049] x64_sys_call+0x2b4d/0x2ff0 [ 37.501538][ T4049] do_syscall_64+0xd2/0x200 [ 37.501562][ T4049] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 37.501636][ T4049] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 37.501667][ T4049] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.501717][ T4049] RIP: 0033:0x7f9ee09eebe9 [ 37.501731][ T4049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 37.501747][ T4049] RSP: 002b:00007f9edf44f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 37.501832][ T4049] RAX: ffffffffffffffda RBX: 00007f9ee0c15fa0 RCX: 00007f9ee09eebe9 [ 37.501885][ T4049] RDX: 00002000000002c0 RSI: 0000200000000080 RDI: 0000000000000000 [ 37.501895][ T4049] RBP: 00007f9edf44f090 R08: 0000200000000240 R09: 0000000000000000 [ 37.501921][ T4049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.501931][ T4049] R13: 00007f9ee0c16038 R14: 00007f9ee0c15fa0 R15: 00007ffee7b04158 [ 37.501946][ T4049] [ 37.886138][ T4086] netlink: 16 bytes leftover after parsing attributes in process `syz.0.145'. [ 37.902249][ T4082] netlink: 32 bytes leftover after parsing attributes in process `syz.2.143'. [ 37.915837][ T4089] netlink: 4 bytes leftover after parsing attributes in process `syz.1.146'. [ 37.984485][ T4096] FAULT_INJECTION: forcing a failure. [ 37.984485][ T4096] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 37.997726][ T4096] CPU: 0 UID: 0 PID: 4096 Comm: syz.1.149 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 37.997778][ T4096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 37.997788][ T4096] Call Trace: [ 37.997793][ T4096] [ 37.997800][ T4096] __dump_stack+0x1d/0x30 [ 37.997818][ T4096] dump_stack_lvl+0xe8/0x140 [ 37.997834][ T4096] dump_stack+0x15/0x1b [ 37.997914][ T4096] should_fail_ex+0x265/0x280 [ 37.998013][ T4096] should_fail+0xb/0x20 [ 37.998031][ T4096] should_fail_usercopy+0x1a/0x20 [ 37.998119][ T4096] _copy_from_user+0x1c/0xb0 [ 37.998223][ T4096] ___sys_sendmsg+0xc1/0x1d0 [ 37.998258][ T4096] __x64_sys_sendmsg+0xd4/0x160 [ 37.998282][ T4096] x64_sys_call+0x191e/0x2ff0 [ 37.998303][ T4096] do_syscall_64+0xd2/0x200 [ 37.998367][ T4096] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 37.998392][ T4096] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 37.998416][ T4096] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.998495][ T4096] RIP: 0033:0x7fc3007eebe9 [ 37.998511][ T4096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 37.998568][ T4096] RSP: 002b:00007fc2ff257038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 37.998587][ T4096] RAX: ffffffffffffffda RBX: 00007fc300a15fa0 RCX: 00007fc3007eebe9 [ 37.998601][ T4096] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000003 [ 37.998614][ T4096] RBP: 00007fc2ff257090 R08: 0000000000000000 R09: 0000000000000000 [ 37.998626][ T4096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.998639][ T4096] R13: 00007fc300a16038 R14: 00007fc300a15fa0 R15: 00007ffeb21681a8 [ 37.998700][ T4096] [ 38.180766][ T29] kauditd_printk_skb: 399 callbacks suppressed [ 38.180778][ T29] audit: type=1400 audit(1754905547.619:665): avc: denied { connect } for pid=4098 comm="syz.2.151" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 38.216660][ T29] audit: type=1400 audit(1754905547.619:666): avc: denied { write } for pid=4098 comm="syz.2.151" path="socket:[6642]" dev="sockfs" ino=6642 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 38.253796][ T4102] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 38.600700][ T4116] capability: warning: `syz.2.156' uses 32-bit capabilities (legacy support in use) [ 38.638834][ T29] audit: type=1400 audit(1754905548.029:667): avc: denied { create } for pid=4115 comm="syz.2.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 38.667978][ T4124] validate_nla: 3 callbacks suppressed [ 38.668061][ T4124] netlink: 'syz.0.158': attribute type 1 has an invalid length. [ 38.681631][ T4124] __nla_validate_parse: 1 callbacks suppressed [ 38.681715][ T4124] netlink: 224 bytes leftover after parsing attributes in process `syz.0.158'. [ 38.688031][ T4116] loop2: detected capacity change from 0 to 8192 [ 38.688372][ T4116] vfat: Unknown parameter 'mm_page_free' [ 38.705681][ T4126] FAULT_INJECTION: forcing a failure. [ 38.705681][ T4126] name failslab, interval 1, probability 0, space 0, times 0 [ 38.722201][ T4126] CPU: 1 UID: 0 PID: 4126 Comm: syz.5.159 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 38.722285][ T4126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 38.722295][ T4126] Call Trace: [ 38.722301][ T4126] [ 38.722307][ T4126] __dump_stack+0x1d/0x30 [ 38.722325][ T4126] dump_stack_lvl+0xe8/0x140 [ 38.722342][ T4126] dump_stack+0x15/0x1b [ 38.722357][ T4126] should_fail_ex+0x265/0x280 [ 38.722376][ T4126] ? __se_sys_mount+0xef/0x2e0 [ 38.722396][ T4126] should_failslab+0x8c/0xb0 [ 38.722417][ T4126] __kmalloc_cache_noprof+0x4c/0x320 [ 38.722546][ T4126] ? memdup_user+0x99/0xd0 [ 38.722568][ T4126] __se_sys_mount+0xef/0x2e0 [ 38.722666][ T4126] ? __bpf_trace_sys_enter+0x10/0x30 [ 38.722688][ T4126] ? trace_sys_enter+0xd0/0xf0 [ 38.722710][ T4126] __x64_sys_mount+0x67/0x80 [ 38.722806][ T4126] x64_sys_call+0x2b4d/0x2ff0 [ 38.722825][ T4126] do_syscall_64+0xd2/0x200 [ 38.722847][ T4126] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 38.722877][ T4126] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 38.723021][ T4126] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 38.723042][ T4126] RIP: 0033:0x7fc0dd51ebe9 [ 38.723057][ T4126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 38.723073][ T4126] RSP: 002b:00007fc0dbf87038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 38.723143][ T4126] RAX: ffffffffffffffda RBX: 00007fc0dd745fa0 RCX: 00007fc0dd51ebe9 [ 38.723154][ T4126] RDX: 00002000000002c0 RSI: 0000200000000280 RDI: 0000200000000100 [ 38.723165][ T4126] RBP: 00007fc0dbf87090 R08: 0000200000000300 R09: 0000000000000000 [ 38.723176][ T4126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 38.723187][ T4126] R13: 00007fc0dd746038 R14: 00007fc0dd745fa0 R15: 00007ffcd19f5658 [ 38.723255][ T4126] [ 38.913413][ T29] audit: type=1400 audit(1754905548.169:668): avc: denied { accept } for pid=4123 comm="syz.0.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.958801][ T29] audit: type=1400 audit(1754905548.389:669): avc: denied { bind } for pid=4115 comm="syz.2.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 38.992549][ T29] audit: type=1326 audit(1754905548.429:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4127 comm="syz.2.160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ee09eebe9 code=0x7ffc0000 [ 39.015869][ T29] audit: type=1326 audit(1754905548.429:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4127 comm="syz.2.160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ee09eebe9 code=0x7ffc0000 [ 39.045043][ T4130] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 39.052513][ T4130] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 39.073434][ T4130] FAULT_INJECTION: forcing a failure. [ 39.073434][ T4130] name failslab, interval 1, probability 0, space 0, times 0 [ 39.086134][ T4130] CPU: 0 UID: 0 PID: 4130 Comm: syz.2.160 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 39.086163][ T4130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 39.086175][ T4130] Call Trace: [ 39.086181][ T4130] [ 39.086189][ T4130] __dump_stack+0x1d/0x30 [ 39.086283][ T4130] dump_stack_lvl+0xe8/0x140 [ 39.086300][ T4130] dump_stack+0x15/0x1b [ 39.086317][ T4130] should_fail_ex+0x265/0x280 [ 39.086361][ T4130] should_failslab+0x8c/0xb0 [ 39.086429][ T4130] kmem_cache_alloc_node_noprof+0x57/0x320 [ 39.086457][ T4130] ? __alloc_skb+0x101/0x320 [ 39.086482][ T4130] __alloc_skb+0x101/0x320 [ 39.086525][ T4130] arp_create+0xa3/0x3c0 [ 39.086575][ T4130] batadv_bla_send_claim+0x15f/0x670 [ 39.086604][ T4130] ? __schedule+0x6b9/0xb30 [ 39.086704][ T4130] batadv_bla_update_orig_address+0x282/0x320 [ 39.086735][ T4130] batadv_primary_if_update_addr+0x1e9/0x300 [ 39.086761][ T4130] batadv_primary_if_select+0xf1/0x280 [ 39.086793][ T4130] batadv_hardif_disable_interface+0x483/0x990 [ 39.086816][ T4130] ? __pfx_batadv_meshif_destroy_netlink+0x10/0x10 [ 39.086844][ T4130] batadv_meshif_destroy_netlink+0x48/0x2e0 [ 39.086876][ T4130] ? __pfx_batadv_meshif_destroy_netlink+0x10/0x10 [ 39.086902][ T4130] rtnl_dellink+0x3bd/0x550 [ 39.086936][ T4130] ? selinux_capable+0x31/0x40 [ 39.086957][ T4130] ? security_capable+0x83/0x90 [ 39.087051][ T4130] ? ns_capable+0x7d/0xb0 [ 39.087071][ T4130] ? __pfx_rtnl_dellink+0x10/0x10 [ 39.087143][ T4130] rtnetlink_rcv_msg+0x5fb/0x6d0 [ 39.087171][ T4130] netlink_rcv_skb+0x120/0x220 [ 39.087211][ T4130] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 39.087316][ T4130] rtnetlink_rcv+0x1c/0x30 [ 39.087386][ T4130] netlink_unicast+0x5c0/0x690 [ 39.087415][ T4130] netlink_sendmsg+0x58b/0x6b0 [ 39.087438][ T4130] ? __pfx_netlink_sendmsg+0x10/0x10 [ 39.087460][ T4130] __sock_sendmsg+0x145/0x180 [ 39.087510][ T4130] ____sys_sendmsg+0x31e/0x4e0 [ 39.087545][ T4130] ___sys_sendmsg+0x17b/0x1d0 [ 39.087571][ T4130] __x64_sys_sendmsg+0xd4/0x160 [ 39.087596][ T4130] x64_sys_call+0x191e/0x2ff0 [ 39.087649][ T4130] do_syscall_64+0xd2/0x200 [ 39.087669][ T4130] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 39.087689][ T4130] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 39.087708][ T4130] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.087783][ T4130] RIP: 0033:0x7f9ee09eebe9 [ 39.087844][ T4130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.087859][ T4130] RSP: 002b:00007f9edf42e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 39.087930][ T4130] RAX: ffffffffffffffda RBX: 00007f9ee0c16090 RCX: 00007f9ee09eebe9 [ 39.087941][ T4130] RDX: 0000000000048000 RSI: 00002000000002c0 RDI: 0000000000000009 [ 39.087952][ T4130] RBP: 00007f9edf42e090 R08: 0000000000000000 R09: 0000000000000000 [ 39.087963][ T4130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 39.087976][ T4130] R13: 00007f9ee0c16128 R14: 00007f9ee0c16090 R15: 00007ffee7b04158 [ 39.088052][ T4130] [ 39.093554][ T29] audit: type=1326 audit(1754905548.429:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4127 comm="syz.2.160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f9ee09eebe9 code=0x7ffc0000 [ 39.110168][ T4130] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 39.112691][ T29] audit: type=1326 audit(1754905548.479:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4127 comm="syz.2.160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ee09eebe9 code=0x7ffc0000 [ 39.115605][ T4130] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 39.119947][ T29] audit: type=1326 audit(1754905548.479:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4127 comm="syz.2.160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ee09eebe9 code=0x7ffc0000 [ 39.267680][ T4124] loop0: detected capacity change from 0 to 512 [ 39.364586][ T4139] netlink: 32 bytes leftover after parsing attributes in process `syz.5.163'. [ 39.573167][ T4153] netlink: 'syz.1.165': attribute type 13 has an invalid length. [ 39.581044][ T4153] netlink: 'syz.1.165': attribute type 17 has an invalid length. [ 39.598863][ T4130] syz.2.160 (4130) used greatest stack depth: 10312 bytes left [ 39.606510][ T4130] ================================================================== [ 39.614576][ T4130] BUG: KCSAN: data-race in console_flush_all / console_flush_all [ 39.622285][ T4130] [ 39.624589][ T4130] write to 0xffffffff86a20b48 of 8 bytes by task 4153 on cpu 1: [ 39.632202][ T4130] console_flush_all+0x35a/0x730 [ 39.637137][ T4130] console_unlock+0xa1/0x330 [ 39.641720][ T4130] vprintk_emit+0x388/0x650 [ 39.646210][ T4130] vprintk_default+0x26/0x30 [ 39.650797][ T4130] vprintk+0x1d/0x30 [ 39.654694][ T4130] _printk+0x79/0xa0 [ 39.658606][ T4130] chnl_net_open+0x2a9/0x560 [ 39.663199][ T4130] __dev_open+0x2d2/0x530 [ 39.667527][ T4130] __dev_change_flags+0x163/0x400 [ 39.672547][ T4130] netif_change_flags+0x5a/0xd0 [ 39.677391][ T4130] do_setlink+0x9d2/0x2810 [ 39.681806][ T4130] rtnl_newlink+0xd8b/0x12d0 [ 39.686392][ T4130] rtnetlink_rcv_msg+0x5fb/0x6d0 [ 39.691327][ T4130] netlink_rcv_skb+0x120/0x220 [ 39.696080][ T4130] rtnetlink_rcv+0x1c/0x30 [ 39.700489][ T4130] netlink_unicast+0x5c0/0x690 [ 39.705247][ T4130] netlink_sendmsg+0x58b/0x6b0 [ 39.709994][ T4130] __sock_sendmsg+0x145/0x180 [ 39.714658][ T4130] ____sys_sendmsg+0x31e/0x4e0 [ 39.719403][ T4130] ___sys_sendmsg+0x17b/0x1d0 [ 39.724093][ T4130] __x64_sys_sendmsg+0xd4/0x160 [ 39.728929][ T4130] x64_sys_call+0x191e/0x2ff0 [ 39.733592][ T4130] do_syscall_64+0xd2/0x200 [ 39.738081][ T4130] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.743958][ T4130] [ 39.746267][ T4130] read to 0xffffffff86a20b48 of 8 bytes by task 4130 on cpu 0: [ 39.753791][ T4130] console_flush_all+0x563/0x730 [ 39.758717][ T4130] console_unlock+0xa1/0x330 [ 39.763491][ T4130] vprintk_emit+0x388/0x650 [ 39.767973][ T4130] vprintk_default+0x26/0x30 [ 39.772549][ T4130] vprintk+0x1d/0x30 [ 39.776430][ T4130] _printk+0x79/0xa0 [ 39.780315][ T4130] do_exit+0x10c6/0x15c0 [ 39.784564][ T4130] do_group_exit+0xff/0x140 [ 39.789057][ T4130] get_signal+0xe59/0xf70 [ 39.793376][ T4130] arch_do_signal_or_restart+0x96/0x480 [ 39.798910][ T4130] exit_to_user_mode_loop+0x7a/0x100 [ 39.804185][ T4130] do_syscall_64+0x1d6/0x200 [ 39.808768][ T4130] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.814651][ T4130] [ 39.816955][ T4130] value changed: 0x0000000000000901 -> 0x0000000000000902 [ 39.824038][ T4130] [ 39.826343][ T4130] Reported by Kernel Concurrency Sanitizer on: [ 39.832493][ T4130] CPU: 0 UID: 0 PID: 4130 Comm: syz.2.160 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 39.843063][ T4130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 39.853101][ T4130] ================================================================== [ 39.872466][ T4153] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 39.913212][ T4157] netlink: 'syz.0.169': attribute type 10 has an invalid length. [ 39.923606][ T4157] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.931665][ T4157] bond0: (slave team0): Enslaving as an active interface with an up link