last executing test programs: 1m0.159064893s ago: executing program 0 (id=578): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000000206010100000000000000000000000005000100070000000900020073797a300000000014000780050015000000000008001240000000000d000300686173683a6e657400000000050005000a000000050004"], 0x5c}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="28000000030605000000000000000000000000000500010007"], 0x28}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000001000000ff"], 0x48) setreuid(0x0, 0xee00) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1m0.113133724s ago: executing program 0 (id=579): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x62200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 1m0.050954444s ago: executing program 0 (id=581): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) (fail_nth: 14) 1m0.029191144s ago: executing program 0 (id=582): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000410, &(0x7f0000000080), 0x81, 0x7a5, &(0x7f0000000f80)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x143042, 0x0) sendfile(r0, r0, 0x0, 0x7a680000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000180)=0xc, 0x4) getsockopt$inet6_int(r1, 0x29, 0x1, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000000), &(0x7f00000003c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000980)='mm_page_alloc\x00', r4}, 0x18) syz_clone(0x41000000, 0x0, 0x0, 0x0, 0x0, 0x0) truncate(&(0x7f0000000200)='./file2\x00', 0x7) 59.745690195s ago: executing program 0 (id=587): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = syz_open_dev$loop(&(0x7f00000005c0), 0x10000, 0x10d480) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_misc(r2, &(0x7f0000001000), 0xe09) ioctl$LOOP_CONFIGURE(r1, 0x4c0a, &(0x7f00000002c0)={r2, 0x1000, {0x2a00, 0x80010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd64c6a4b4e00d9683dda1af1ea89de2b7fb0a0100000000000000000300", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "90be8b1c559265406c09306003d8002000", [0x0, 0x2]}}) 59.114899399s ago: executing program 0 (id=601): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000002000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x0, @val=@netfilter}, 0x40) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x74, r3}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) r4 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r4, 0x2007ffc) acct(&(0x7f00000017c0)='./file1\x00') acct(0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)=ANY=[@ANYRES64=r3], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000600)=@security={'security\x00', 0x44, 0x4, 0x390, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x2f0, 0x2f0, 0x2f0, 0xffffffff, 0x6, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @empty, [], [], 'nr0\x00', 'nr0\x00'}, 0x203, 0xe0, 0x108, 0x8502, {0x700}, [@common=@unspec=@quota={{0x38}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x3}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x4}}}, {{@ipv6={@local, @mcast1, [], [], 'ip6erspan0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f0) 59.040080559s ago: executing program 32 (id=601): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000002000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r1, r3, 0x25, 0x0, @val=@netfilter}, 0x40) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x74, r3}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) r4 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r4, 0x2007ffc) acct(&(0x7f00000017c0)='./file1\x00') acct(0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)=ANY=[@ANYRES64=r3], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000600)=@security={'security\x00', 0x44, 0x4, 0x390, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x2f0, 0x2f0, 0x2f0, 0xffffffff, 0x6, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @empty, [], [], 'nr0\x00', 'nr0\x00'}, 0x203, 0xe0, 0x108, 0x8502, {0x700}, [@common=@unspec=@quota={{0x38}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x3}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x4}}}, {{@ipv6={@local, @mcast1, [], [], 'ip6erspan0\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3f0) 50.475762341s ago: executing program 4 (id=817): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x60}, {0x6}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000040002850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000040)=0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000002780)='\x87&/\x16\xe7') bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000340)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x6, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 50.441913311s ago: executing program 4 (id=819): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 50.287141092s ago: executing program 4 (id=823): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000000800000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006, 0x0, 0x6, 0x3ff}]}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x14, 0x2, 0x8, 0x201, 0x0, 0x0, {0x0, 0x0, 0x5}}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4800) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="13270000000000f29c03212ffef921de184d0900", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r5, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x0, 0x0, 0x130, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'veth0_to_bridge\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000000a00)=@newtaction={0x894, 0x30, 0x12f, 0x4000, 0x0, {}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x7c3, 0x2, 0x3, 0xffffff81, 0x10, 0xc, 0x2, 0x3, 0x40, 0x200, 0x8, 0x9, 0x6, 0x1, 0xaa21, 0x8, 0xa, 0x6, 0x200, 0x1, 0x4, 0xcc37, 0x5, 0xb5, 0x649f, 0x4, 0x0, 0x4, 0xfb1, 0x72a4, 0xd, 0x7fff, 0x5, 0x3, 0x8, 0x3, 0x7, 0x28d, 0x4, 0xc, 0x0, 0xaf, 0x1, 0x6, 0x5, 0xfffffffd, 0x5, 0x80, 0xe, 0x2, 0x7, 0x6, 0x7, 0x1991, 0x8, 0xfffffe29, 0x5, 0x3, 0x101, 0xfff, 0x4, 0x5, 0x8000, 0x4, 0x7, 0x3, 0x0, 0xfffffff3, 0x1, 0x4, 0x80000001, 0x2, 0x3, 0x5, 0x101, 0x1, 0xfffffffc, 0x6, 0xfffffffb, 0x200, 0x1, 0x7329, 0x6, 0x3, 0x100, 0x2, 0x3, 0x6d3, 0x224, 0x7ff, 0x0, 0x6, 0x8, 0xfffff001, 0x6, 0x7eda, 0x3, 0xffff, 0x0, 0x7, 0x249, 0x5, 0x2fbf, 0x2, 0x8000, 0x7, 0x25fe9fd5, 0x1, 0x9, 0x1, 0xe, 0x9, 0x0, 0x3, 0x4f, 0xffffffff, 0x8, 0x1, 0x119203c5, 0xd0, 0x7, 0x80000001, 0x3226, 0x8, 0x3, 0xd72, 0xc64f, 0xffffff6d, 0x5, 0x6, 0x6, 0xfffffff7, 0x6, 0x7, 0x5, 0xc, 0xc, 0x7, 0x200, 0x60459141, 0x1, 0x5, 0x6, 0x84, 0x0, 0x1, 0x5, 0x6, 0x29dc, 0x0, 0x2d5, 0x7, 0xfffffffa, 0x1000, 0x6, 0x94, 0x15a, 0x4, 0x6, 0x2, 0x2, 0x2, 0x4, 0xfff, 0x5, 0x1, 0x3, 0x3, 0x80, 0x7a5b054a, 0x8, 0xffffff80, 0x4b1, 0xfff, 0x3, 0xb, 0x8, 0x3, 0x3, 0x2, 0x6, 0xf, 0x2, 0x7, 0x1, 0x77, 0x9, 0x274d, 0x6, 0x40, 0xfffffffe, 0xb, 0x7, 0x1, 0x9ab, 0x7, 0xffffffc0, 0x200, 0x8, 0x3c, 0x2c7, 0x7, 0x8, 0x4, 0x0, 0x99f, 0x4, 0x800, 0x6, 0x31e1, 0x4, 0x4, 0xb, 0x7ff, 0x1e, 0x3, 0xe49, 0x56, 0x9, 0x1, 0x6, 0x2, 0x6a1c, 0x9, 0x8, 0x4dbda2da, 0x7fff, 0x5, 0x5, 0x0, 0x7, 0x8, 0x7fff, 0xed, 0x7fff, 0x1000, 0xcbe, 0x7ff, 0x6, 0x8, 0xb, 0xff, 0x5, 0x0, 0x7, 0x9, 0x0, 0x8, 0x5, 0x4, 0xfffffffd, 0x2, 0xeffe, 0xef4, 0xfffffff6]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0xffffbff1}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x6, 0x5, 0x9, 0x6, 0x4, 0x7ffe, 0x7fffffff, 0x2, 0x1, 0x7fff, 0x86, 0x10000, 0x2, 0x40, 0x2, 0x99d, 0x6, 0xffffff92, 0xe9c, 0x3ff, 0x3, 0x10001, 0xa, 0xfffff000, 0x7f, 0x5, 0x0, 0x81, 0x6f0, 0x18e, 0x8, 0x4, 0x3, 0x4, 0x2, 0xffffffff, 0x0, 0x80000000, 0x3, 0x9, 0x10000, 0x2, 0xd, 0x3, 0x5, 0x1, 0x4, 0x8, 0x7, 0x2, 0xd92b, 0x7fffffff, 0x3, 0x90, 0xc0, 0x5b, 0x1, 0x48000, 0x40, 0x5, 0x1000, 0x3, 0x10, 0x0, 0x5, 0x4, 0x6, 0x100, 0xe, 0x1, 0xa92, 0x0, 0x6, 0x7, 0x0, 0x8, 0x8, 0x10000, 0x3, 0x3, 0x0, 0xa, 0x5, 0x1, 0xee7e, 0x800, 0xd1, 0x7fff, 0x1, 0x4, 0x5, 0x4, 0xffffff89, 0x8, 0xfffffff3, 0x2, 0x2, 0x9, 0x5, 0x2, 0x101, 0x7fffffff, 0xfffff001, 0x64, 0x4, 0xffffffff, 0x5, 0x9, 0x1, 0x0, 0xb3e, 0x8, 0x3, 0x401, 0x401, 0xb, 0x8, 0x2, 0xb, 0xffffffff, 0x0, 0x9, 0xffffffff, 0x25f, 0x7, 0x5, 0x0, 0x9, 0xfffffff9, 0x3, 0xe2, 0x8, 0x1, 0x8, 0x9, 0x0, 0x9, 0x2, 0x1, 0x9, 0x80, 0x5, 0xd3c3, 0x5, 0x2, 0x1, 0x472a8800, 0xc, 0xfffffff0, 0xfffffff8, 0x9, 0x8, 0xfffffffc, 0x9, 0x5, 0x9, 0x5, 0x6, 0x6, 0x7, 0x87f, 0x59, 0x4fedcacd, 0x1, 0x4, 0x7f, 0x2, 0x7, 0x5, 0xfff, 0x3828, 0x0, 0x1, 0x7, 0x401, 0x7f, 0x4, 0x7, 0x2120, 0xfffffffb, 0x80, 0x3, 0xdbff, 0x52b6, 0xfffffffa, 0x49, 0x70, 0x0, 0xe1, 0x401, 0x631, 0x101, 0x3ff, 0x101, 0x0, 0x7fff, 0x80000000, 0x3, 0xfffffff7, 0x3, 0x1, 0x7514, 0x7, 0x3, 0x1, 0x4, 0x2, 0x5, 0x4, 0x10000, 0x3ff, 0x0, 0x100, 0x7ef2, 0x0, 0x1, 0xe, 0xd, 0x4, 0x6, 0x8, 0x4, 0x10001, 0x6, 0x400, 0x436, 0x3, 0x1ff, 0x0, 0xffff76a6, 0x0, 0xbc, 0xa5, 0x0, 0x6, 0x7, 0x1, 0x81, 0x3, 0x2, 0x3, 0x4, 0x6, 0x2445c87b, 0x6, 0xd, 0x9, 0x2, 0x10, 0x4, 0x7, 0x57, 0x5, 0xd, 0x1000, 0x3]}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x400, 0x8, 0x3, 0x7b2, 0x400, {0x1, 0x2, 0x8, 0x624, 0x0, 0xfffffff8}, {0x9, 0x2, 0x7, 0x7ff, 0xff01, 0x4}, 0x6, 0x4, 0x923}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x894}}, 0x20000800) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sys_enter\x00', r8}, 0x10) ioperm(0x8, 0x9, 0x5a) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010200000000000000020000000900010073797a300000000040000000030a01010000000000000000020000000900010073797a30000000000900030073797a3200000000140004800800014000000000080002400000"], 0xb4}}, 0x0) 50.213638642s ago: executing program 4 (id=824): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000280), 0x1, 0x3dd, &(0x7f00000008c0)="$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") (async) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000200)={[{@quota}, {@oldalloc}, {@barrier_val={'barrier', 0x3d, 0x3}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@block_validity}, {@jqfmt_vfsv1}]}, 0x3, 0x434, &(0x7f0000000940)="$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") r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r0) ptrace(0x4207, r0) (async) ptrace$setregs(0xd, r0, 0x2, 0xfffffffffffffffd) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) sched_setscheduler(r0, 0x3, &(0x7f0000000580)=0x5) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioprio_set$pid(0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r3}, 0x10) (async) r4 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000045c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xfffffed3) (async) sendfile(r4, r4, 0x0, 0x800000009) (async) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) (async) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000140)={0x1f, 0xffff, 0x2}, 0x6) (async) syz_clone3(&(0x7f00000003c0)={0x40800000, &(0x7f00000001c0), &(0x7f00000002c0), &(0x7f0000000300)=0x0, {0x32}, &(0x7f0000000d80)=""/4096, 0x1000, &(0x7f0000000340)=""/13, &(0x7f0000000380)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x8, {r5}}, 0x58) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x100000, 0x5dd8, 0x3, 0x0, 0x0, 0x8, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000004c0)={r5, 0x1000, 0x81, 0x8}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r7, r8, 0x0, 0x16, &(0x7f0000000500)='debug_want_extra_isize'}, 0x30) (async) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) (async) open_by_handle_at(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="02"], 0xfe) 50.071287843s ago: executing program 4 (id=826): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'team_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x25dfdbfd, 0x2ffffffff}, 0xc) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000300)) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="cc000000", @ANYRES16=r3, @ANYBLOB="0100ffffffff000000000100000008000100", @ANYBLOB="b00002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1], 0xcc}, 0x1, 0xf000}, 0x0) 49.546724755s ago: executing program 4 (id=837): lstat(&(0x7f0000000280)='./cgroup.cpu/cgroup.procs\x00', &(0x7f00000002c0)) lstat(&(0x7f0000000280)='./cgroup.cpu/cgroup.procs\x00', &(0x7f00000002c0)) (async) 49.546245975s ago: executing program 33 (id=837): lstat(&(0x7f0000000280)='./cgroup.cpu/cgroup.procs\x00', &(0x7f00000002c0)) lstat(&(0x7f0000000280)='./cgroup.cpu/cgroup.procs\x00', &(0x7f00000002c0)) (async) 1.245212073s ago: executing program 6 (id=2090): socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) prlimit64(0x0, 0x8, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x5, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$bt_hci(r3, &(0x7f0000000000)={0x27}, 0x74) sendmmsg$unix(r3, &(0x7f0000000b00)=[{{&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x60, 0x0}}, {{&(0x7f0000000e80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000740)=[{&(0x7f0000001dc0)="bb", 0xfdef}, {0x0}], 0x2}}, {{&(0x7f0000000580)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000600)='z', 0xfdef}], 0x1}}], 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r4 = io_uring_setup(0xa5f, &(0x7f0000000100)={0x0, 0x80000000, 0x40, 0x2, 0xd4}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x28ce80, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) read(r6, &(0x7f00000022c0)=""/4096, 0x1000) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7}, 0x0, &(0x7f00000002c0)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r9, &(0x7f0000000200)="03", 0x1, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) close_range(r4, 0xffffffffffffffff, 0x0) 1.106941384s ago: executing program 3 (id=2093): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=@newqdisc={0x50, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x20, 0x2, {{}, [@TCA_NETEM_LOSS={0x4, 0xd}]}}}]}, 0x50}}, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0xa00000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'lo\x00'}) (async) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=@newqdisc={0x50, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x20, 0x2, {{}, [@TCA_NETEM_LOSS={0x4, 0xd}]}}}]}, 0x50}}, 0x0) (async) mremap(&(0x7f0000000000/0x9000)=nil, 0xa00000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) (async) 1.087443444s ago: executing program 6 (id=2094): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f0000000100)={0x0, 0x4100, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r5, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000640)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmsg$AUDIT_GET(r6, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x10, 0x3e8, 0x20, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x4000) r7 = getpgid(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) r8 = getpid() r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r10}, 0x57) sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x6) r11 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r11}, &(0x7f0000bbdffc)) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x118, r5, 0x200, 0x70bd29, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r11}}]}, 0x118}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0/../file0\x00', &(0x7f0000000100)='devpts\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0/../file0/../file0\x00', 0x9) 1.017437985s ago: executing program 5 (id=2095): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000080)=0x8, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kfree\x00', r1}, 0x18) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0), r2) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="4c000001", @ANYRES16=r3, @ANYBLOB="010200000000000000000300260008000400ac1414aa14000600736974300000000000000000000000001400070000000000000000000000ffff7f0000010800050000000000"], 0x4c}, 0x8, 0x3000000000002}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = gettid() r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0500000004000000e47f000001"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000000400000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000009c0)='kfree\x00', r10}, 0x10) fallocate(r10, 0x66, 0x4, 0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f0000000440), 0x6, 0x56a, &(0x7f00000015c0)="$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") setxattr$trusted_overlay_upper(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000001c0), &(0x7f0000001400)=ANY=[], 0x835, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0), &(0x7f0000001400)=ANY=[], 0x835, 0x0) tkill(0x0, 0x40003a) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) r12 = syz_open_dev$vcsa(&(0x7f0000000380), 0x7b95b611, 0x802) r13 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000002100), 0x20101, 0x0) ioctl$TIOCSETD(r13, 0x5423, &(0x7f0000002140)=0x19) ioctl$TCGETA(r13, 0x40085500, 0x0) writev(r12, &(0x7f0000000240)=[{&(0x7f0000000840)="97", 0x1}], 0x1) kcmp$KCMP_EPOLL_TFD(r8, r11, 0x7, r4, &(0x7f0000000000)={r12, r0, 0x9556}) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x16, &(0x7f0000000040)={&(0x7f0000000b00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000020900010073797a30000000002c000000030a010200000000030000000100ffff0900010073797a30000000000900030073797a3100000000d4040000060a010400000000000000000100000008000b4000000000ac0404802c000180080001006c6f6700200002800900024073797a300000000008000340000000060800034000000002380401800c000100626974776973650028040280080003400000000808000240000000140800064000000002080006400000000064020580bb0001001d92704a203d5ecc985c4e4280e5378a36a2856959ffa601c237cc270251cf18420d11613ec98e629c7d84c655efcb2b5ecd71666675bf512cadfe09e4d05a4f60f60e007ca1cf70a5185f973cec0f1ab052acf1acf6a2df83dd88facc62c6e94a1b6368d6bda68abcaed2ee48c3d589bf2a814b728efb93401dfa1d1063200c10e56294dba0e7b780ce0f6090bd0de9f5e000c98c4b97cd985c91284c2bca23e4757407bb41fd8de797502a72e122032d4ef3160f9f7b00fd000100854e3cb6d05d310db3d528811da7f7450ebb2d62cddc6981343570b9f4ab17d75de9411dea482f508c0dce42c25c4778ebc56bb303f9f51c489eedffcb1490560ab26ab7507ec029cca3ddfe7c4f4f6d91db07cbc008636bc7bea7f96954d31da9d8a9ca043df7b409ca2864d56fc6b2a70fcc2f1a3579737bf47542dae337d5203869caff9ab95a317c25521ebf848fad8ceb87f4655ace0701dbe961e9dcaeffa37bfa2e9d127d61b8d6edc1437b46f54c061e1c9d68120ac8300e91d19c708aa9589c37de59a9f8df5546855e934599a2f31b6cb847347fc02231fec395b906e60300340d60ebe7a3f23e1aa6eec9e0150a9d16b3c25e590000002400028008000340fffffff8080003400000000908000340684dbc5808000180ffffffff6200010091de8d9ca3503f5a0a8259007bc5088ccfe97cfebb5ebb90e05d4e8a63fcbee6f14ab7eff7469cf243a6ef6e528b811dfd72af1e7e08de8fbdd4849367ea82016412fab2ccc0fb94fa63fac7fd0c6ea48c0e9ac7d1a30ecf3e70e44ed5ff00001c0002800800034080000000080003400000000308000180fffffffc080001400000000d600004804000028008000180fffffffb0d00020073797a3000000000080001802b30a3bc08000180000000000900020073797a31000000002900020073797a31000000001c0002800900020073797a31000000000900020073797a3200000000080002400000000a30010480380002800900020073797a3200000000080003400000000908000180fffffffc0800018000000007080003408000000108000340000000050b0001000bca99f460f4b0002800028008000180fffffffb0900020073797a3000000000080003400000000308000340000001ff04000100bc000100e27404a10a99dbcc4575917adc29373e2cc46e5e8f99d7a36b7c42c92713cce62084d863a11eb9c2e19fde212924e527db981a9be0c2c15f6a04a67e9e20f86e4bebd07665e2d01da200712427a5525403c1c75468f31b91a60def25f7757c9921d08b9a5b0bc6f8953efbd0416091bf2b30d9a37e789198313dd07b7b70cebff25c562434b67e9a6b70708dd84c86135ab9b0ffda2c4b2fb4a139220c101f4c0a3d58eb124346005c82dea6f0f36444b28300758475eb3d34000180090001006d65746100000000240002800800024000000002080003400000000d08000340000000090800034000000001100001800a0001006c696d69740000000900010073797a30"], 0x548}}, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'wg2\x00'}) 897.838835ms ago: executing program 3 (id=2097): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 64) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) (async) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r3, &(0x7f0000005b40)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="3400000000000000000000000700000044249401ffffffff0000000400000000000000000000000000000000ac1e010100000006000000001c"], 0x58}}], 0x1, 0xc080) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) (async, rerun: 32) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) (async, rerun: 32) mount$tmpfs(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000680), 0x2004880, &(0x7f0000008940)=ANY=[@ANYBLOB='nr_']) 874.643065ms ago: executing program 5 (id=2098): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0xe6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000980)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000300000002000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000002000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x210) close_range(r2, 0xffffffffffffffff, 0x0) 770.844986ms ago: executing program 2 (id=2101): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) mkdir(&(0x7f0000000580)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 770.317736ms ago: executing program 5 (id=2102): ioperm(0x0, 0x444, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x3) syz_open_dev$tty1(0xc, 0x4, 0x3) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f0000000380)={[{@nodiscard}, {@resgid={'resgid', 0x3d, 0xee00}}, {@init_itable}, {@norecovery}, {@minixdf}, {@usrjquota}]}, 0xfe, 0x43e, &(0x7f00000004c0)="$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") syz_emit_ethernet(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x100000, 0x5dd8, 0x3, 0x0, 0x0, 0x8, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) epoll_create(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000008822cb7f04432e3b00000002000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = syz_io_uring_setup(0x6440, &(0x7f0000000240)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_MKDIRAT={0x25, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 769.015346ms ago: executing program 3 (id=2103): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x4c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACSEC_VALIDATION={0x5}, @IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}, @IFLA_LINK={0x8}]}, 0x4c}}, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = socket(0x10, 0x3, 0x0) connect$netlink(r3, &(0x7f0000000280)=@proc={0x10, 0x0, 0x1}, 0xc) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001500)=@newtaction={0x18, 0x31, 0x829, 0x0, 0x0, {0x0, 0x0, 0x2}, [{0x4}]}, 0x18}}, 0x0) 753.651686ms ago: executing program 2 (id=2104): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000001c6a000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x480081, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000280)=[{&(0x7f0000000040)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010006080800418e00002104fcff", 0x58}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r2}, 0x10) r4 = epoll_create1(0x0) r5 = eventfd2(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000b80)) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x2}}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2, 0x0, 0x3}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @xfrm={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_XFRM_DIR={0x5, 0x3, 0x2}, @NFTA_XFRM_DREG={0x8}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x1}]}}}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x84}}, 0x4000044) 701.193046ms ago: executing program 2 (id=2105): r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x2200054, &(0x7f0000000180), 0x4, 0x244, &(0x7f0000000480)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r1, &(0x7f0000000140)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x1}}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r2, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1200, 0x0, 0x3) r3 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000700)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a8, 0xd0, 0x2c8, 0x1f8, 0x1f8, 0x2c8, 0x4d8, 0x4d8, 0x4d8, 0x4d8, 0x4d8, 0x6, &(0x7f0000000280), {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@srh={{0x30}, {0x21, 0x4, 0x3, 0xff, 0x10, 0x4100, 0x81}}, @inet=@rpfilter={{0x28}, {0xa}}]}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@private0={0xfc, 0x0, '\x00', 0x1}, @mcast1, [0xff, 0x0, 0xffffffff], [0xff000000, 0xffffff00, 0xffffff00, 0xffffff00], 'pimreg0\x00', 'netpci0\x00', {}, {}, 0x5c, 0x20, 0x2, 0x58}, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x2, 0x1, 0x4}, {0xffffffffffffffff, 0x3, 0x2}}}}, {{@ipv6={@mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [0xffffffff, 0xffffffff, 0xff000000, 0xff], [0x0, 0xff, 0xff, 0xffffff00], 'wg1\x00', 'xfrm0\x00', {}, {0xff}, 0x32, 0x2, 0x0, 0x5d}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1, @ipv6=@empty, 0x2c, 0x2f, 0x2}}}, {{@ipv6={@private1, @mcast1, [0xffffff00, 0xff000000, 0x0, 0xff], [0xff000000, 0xff, 0xff000000, 0xff], 'pim6reg1\x00', 'geneve1\x00', {}, {0xff}, 0x4, 0x3, 0x1, 0x5}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xa}}, @common=@eui64={{0x28}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x3, 0x18}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x608) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)=')\x00', 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000100)) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000540)="580000001400192340834b80040d8c560a067f020258000b4824ea945f64009400ff0325010ebc000000000000008029c25599f4dbf7dad95b6bc2e51ca701a90713f3d96655fba94c3a48b5a53311afac8fdbd73e899875d40db6ef04e0f77b5afab682697b5ca03e169594958e27008457b227ce700ce41534292c4e868f9c61b84f015dbbd8ac4fb0dd3c897781", 0x8f}], 0x1) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)=ANY=[@ANYRES64=r0]) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) 694.762176ms ago: executing program 3 (id=2106): r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x35, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) gettid() r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) close(r1) sendmsg$inet(r2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f00000005c0)={[{@resgid}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@jqfmt_vfsv0}, {@grpid}, {@init_itable_val={'init_itable', 0x3d, 0x6}}]}, 0x3, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") lsetxattr$trusted_overlay_upper(0x0, &(0x7f00000000c0), &(0x7f0000000040)=ANY=[], 0xfe37, 0x0) unlink(&(0x7f0000000180)='./file1\x00') 653.308006ms ago: executing program 1 (id=2107): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mounts\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, 0x59, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000480)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000014000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/11, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="feffffff00"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x14, &(0x7f0000000140)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x17}}, @call={0x85, 0x0, 0x0, 0x23}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{0x1, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000600)}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0500"/20, @ANYRES32, @ANYBLOB="0600"/20, @ANYRESHEX, @ANYRES32, @ANYBLOB="05000000020000000200"/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x1e, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000400000000000000020000008500000069000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff0700008500000006000000850000004c0000008500000023000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000004000000850000000600000018010000646c6c250000000000202020c31c6ea18644bbbebfa100000000000007010000f8ffffffb702000008000000b70300000600000085000000060000009500000000000000", @ANYRES16], &(0x7f0000000300)='syzkaller\x00', 0x3, 0x19, &(0x7f0000000680)=""/25, 0x41100, 0xc9, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000004c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xa, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000700)=[r2, r3, r4, 0xffffffffffffffff, 0xffffffffffffffff, r5, r6, r0], &(0x7f0000000740), 0x10, 0x26b8, @void, @value}, 0x94) r7 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) readv(r7, &(0x7f00000015c0)=[{&(0x7f0000000040)=""/20, 0x14}], 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bind$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs={0x1}, 0x6e) listen(0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xc, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x100000, 0x5dd8, 0x3, 0x0, 0x0, 0x8, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000008c0)={0x0, 0x6, 0x1ff}, 0x8) r9 = syz_clone(0x20940200, 0x0, 0x9, 0x0, 0x0, 0x0) tgkill(r9, r9, 0x11) r10 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="440000001300290a000000000000000007000000", @ANYRES32=r8, @ANYBLOB="00000000000000001c001a800800028008000200080000003e120000080002001040e5"], 0x44}}, 0x0) 652.705636ms ago: executing program 5 (id=2108): r0 = perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x10220}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mm_page_alloc\x00', r2}, 0x10) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x200000000000000, 0x11, r0, 0x0) 552.274897ms ago: executing program 5 (id=2109): r0 = socket$kcm(0x10, 0x2, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x801, 0x0) ioctl$VT_ACTIVATE(r3, 0x5606, 0x2000) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x46, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x4b0}, 0x1, 0x0, 0x0, 0x44}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90124fc600c05000f90c60100053582c137153e370a48018004f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5}, 0x0) 551.415817ms ago: executing program 6 (id=2110): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) lgetxattr(&(0x7f0000000e80)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0/../file0\x00', &(0x7f0000000280)=@random={'btrfs.', '\\\x00'}, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = syz_open_dev$usbfs(0x0, 0x206, 0x8401) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x2, 0x1, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r5}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r4}, 0x20) ioctl$USBDEVFS_FORBID_SUSPEND(r2, 0x5521) socket$inet6_mptcp(0xa, 0x1, 0x106) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_REMOVE(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000", @ANYRES16=r7, @ANYBLOB="010000000000000000000400000078969faffc07540e3ab5963725757f17144fc63b6ce5e18a265bb15a346a46b2271a92c88da77b1e63bdc7a16bb2980c74a9ff00e64a19147776ac38cf6c8ad1bd6e202c3461eea51a6cf9e0668e234ef7db5499f353092fdea7f751a48f1c441668c7c5b15ac8c9001364df088a3b359a55015371b5196628fbb896562e61042cd491851f649e8e89a70bc535b5112d2a281bbc282198c42363bdbed12e55f512bc3b5bac8ee0b93b62c5624d4427768aaf9ff852dd4bc66c4f5d7081500caf2d13c27cfb98226871083acdf25c8eb9a07f100686c74f79e2"], 0x14}, 0x1, 0xfcffffff00000000}, 0x0) 550.569307ms ago: executing program 1 (id=2111): r0 = open(&(0x7f0000000140)='./file0\x00', 0x149442, 0x0) ftruncate(r0, 0x200002) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r2, &(0x7f00000002c0)=[{&(0x7f0000000000)='9', 0x1}, {&(0x7f00000019c0)="b0", 0x1}], 0x2) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x2e, &(0x7f0000000200)={0x10003, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0xfffe, 0x0, @remote}}}, 0x108) r7 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r7, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r8, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000080)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffc89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x11, {{0x2, 0x4e22, @empty}}}, 0x88) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) connect$pppl2tp(r3, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r7, 0x4, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32) sendfile(r3, r1, 0x0, 0x80001d00c0d0) 525.806977ms ago: executing program 5 (id=2112): pipe2(&(0x7f00000000c0), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x3938700}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="b6ee9a9b611d4041000000000080"], 0x48) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setrlimit(0x7, &(0x7f00000004c0)={0x9, 0x9}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r1, &(0x7f000001a240)=""/102400, 0x19000, 0x80000000000000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000b80000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x20, r3, 0x301, 0x0, 0x0, {{0x32}, {@void, @val={0xc, 0x142}}}}, 0x20}}, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r7, 0x26, &(0x7f0000000380)={0x1}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r8, 0x26, &(0x7f0000000380)={0x0, 0x0, 0x103ff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r9, 0x7, &(0x7f00000006c0)) 525.175457ms ago: executing program 2 (id=2113): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) mkdir(&(0x7f0000000580)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') (fail_nth: 3) 524.894447ms ago: executing program 3 (id=2114): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0xe6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000980)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000300000002000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000002000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x210) close_range(r2, 0xffffffffffffffff, 0x0) 489.215167ms ago: executing program 3 (id=2115): prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0xf9, 0x7ffc0001}]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socket(0x2, 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x3000056, &(0x7f0000000240)={[{@orlov}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@noblock_validity}, {@init_itable_val={'init_itable', 0x3d, 0x4004f8}}, {@data_err_ignore}, {@debug}, {@max_batch_time={'max_batch_time', 0x3d, 0x2}}, {@grpjquota}, {@bh}, {@dioread_nolock}]}, 0x1, 0x55f, &(0x7f0000001380)="$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") r2 = open(&(0x7f0000000080)='./file1\x00', 0x40001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) pwrite64(r3, &(0x7f0000000140)='2', 0xfdef, 0xfecc) fallocate(r2, 0x8, 0x0, 0x10000) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[], 0x28}}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x1, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x1) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="000000000000001c00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000001823", @ANYRES32=r4, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000005e00250e000000000300000008007700", @ANYRES32=0x0, @ANYBLOB="0c00ea800800020004000000c5aac4d5b9d1a1a6ac12db430769e9a14c7075584ead5bcf9cc0b40b86265fa02e1d9356d6095d5f2ee8ef95628dd0b1d0081b0ebf534478af1374be8b47ea04936bce0eff184919d70fed8cf50ee7c94e965d1646328137"], 0x24}], 0x1}, 0x0) r6 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$USBDEVFS_SUBMITURB(r7, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x0, 0xb, 0x0, 0x0, 0x7995}, 0xfcb5, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) 488.795447ms ago: executing program 6 (id=2116): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000081, &(0x7f0000000080)=ANY=[@ANYRES8=0x0, @ANYRES8, @ANYRES64, @ANYRES64=0x0], 0x0, 0x23e, &(0x7f0000000bc0)="$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") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x0, 0x0, 0x130, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'veth0_to_bridge\x00'}, 0xc0, 0x130, 0x0, {0x0, 0xffffff7f}}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 452.602417ms ago: executing program 1 (id=2117): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r0}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) 277.146988ms ago: executing program 1 (id=2118): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=@newlink={0x4c, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACSEC_VALIDATION={0x5}, @IFLA_MACSEC_REPLAY_PROTECT={0x5}]}}}, @IFLA_LINK={0x8}]}, 0x4c}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = socket(0x10, 0x3, 0x0) connect$netlink(r3, &(0x7f0000000280)=@proc={0x10, 0x0, 0x1}, 0xc) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001500)=@newtaction={0x18, 0x31, 0x829, 0x0, 0x0, {0x0, 0x0, 0x2}, [{0x4}]}, 0x18}}, 0x0) 224.259549ms ago: executing program 1 (id=2119): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f0000000080)={[{@sb={'sb', 0x3d, 0x1}}, {@nodioread_nolock}]}, 0x4, 0x4f3, &(0x7f00000012c0)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc4042, 0x1ff) sendfile(r3, r3, 0x0, 0xfffe80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) connect$llc(r4, &(0x7f0000000340)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="48bd00"}, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="008fa43e9d0000000000000000000000000000000000000000000000b1251ba1204d2ba719aa0940b4a219c3edd49fe8144f290b27167fa7563fb84a7397f7b31dda1d2abeb7566debe1d91ef82b9705ca6d1e895e3f8ab3b3d898813be82ab8b1404eb6c43e48328c0273d816a3e7bb1ef2dc5b5b5c06e622c333d1885e3b7532000b08dd6ae7bf5fdf56319da1c375cf6bb2e12738ede082"], 0x48) getresuid(&(0x7f0000000300), &(0x7f0000000580), 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000001c0)='kmem_cache_free\x00', r6}, 0x18) r7 = socket$kcm(0x2, 0x3, 0x84) setsockopt$MRT_ADD_VIF(r3, 0x0, 0xca, &(0x7f0000000240)={0x1, 0x4, 0x5, 0x39, @vifc_lcl_ifindex, @remote}, 0x10) sendmsg$inet(r7, &(0x7f00000009c0)={&(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000880)=[{&(0x7f0000000280)="823be7271019b3fe048765ad73", 0xd}], 0x1, &(0x7f0000000940)=ANY=[@ANYBLOB="3c000000000000000000000007000000441454010000000000000000ac1414bb00000000004414000100000000000000000000000000000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac141427"], 0x60}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) write$binfmt_script(r8, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000001, 0x28011, r8, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000400)='tegra_dma_isr\x00', r8, 0x0, 0x8002}, 0x38) r9 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r9, 0x107, 0x12, &(0x7f0000000000)={0x0, 0xb007}, 0x4) r10 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r10, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000300)={'ip6_vti0\x00', 0x0}) sendto$packet(r10, &(0x7f0000000180)="10030600e0ff020004004788aa96a13bb100001100007fca1a00", 0x10608, 0x0, &(0x7f0000000140)={0x11, 0x0, r12}, 0x14) rename(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0) 223.841219ms ago: executing program 2 (id=2120): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff", @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000fd43c3b000001000000000000"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 223.281999ms ago: executing program 6 (id=2121): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mounts\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, 0x59, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000480)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000014000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/11, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="feffffff00"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x14, &(0x7f0000000140)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x17}}, @call={0x85, 0x0, 0x0, 0x23}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{0x1, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000600)}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0500"/20, @ANYRES32, @ANYBLOB="0600"/20, @ANYRESHEX, @ANYRES32, @ANYBLOB="05000000020000000200"/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x1e, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000400000000000000020000008500000069000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff0700008500000006000000850000004c0000008500000023000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000004000000850000000600000018010000646c6c250000000000202020c31c6ea18644bbbebfa100000000000007010000f8ffffffb702000008000000b70300000600000085000000060000009500000000000000", @ANYRES16], &(0x7f0000000300)='syzkaller\x00', 0x3, 0x19, &(0x7f0000000680)=""/25, 0x41100, 0xc9, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000004c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xa, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000700)=[r2, r3, r4, 0xffffffffffffffff, 0xffffffffffffffff, r5, r6, r0], &(0x7f0000000740), 0x10, 0x26b8, @void, @value}, 0x94) r7 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) readv(r7, &(0x7f00000015c0)=[{&(0x7f0000000040)=""/20, 0x14}], 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bind$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs={0x1}, 0x6e) listen(0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xc, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x100000, 0x5dd8, 0x3, 0x0, 0x0, 0x8, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000008c0)={0x0, 0x6, 0x1ff}, 0x8) r9 = syz_clone(0x20940200, 0x0, 0x9, 0x0, 0x0, 0x0) tgkill(r9, r9, 0x11) r10 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="440000001300290a000000000000000007000000", @ANYRES32=r8, @ANYBLOB="00000000000000001c001a800800028008000200080000003e120000080002001040e5"], 0x44}}, 0x0) 214.875858ms ago: executing program 6 (id=2122): r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000100), 0x2, 0x500, &(0x7f0000000500)="$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") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0xa, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{r2}, &(0x7f0000000840), &(0x7f0000000600)='%ps \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x34, 0x18, 0x1, 0x0, 0x4, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x6}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @LWT_BPF_IN={0xc, 0x1, 0x0, 0x1, @LWT_BPF_PROG_NAME={0x7, 0x2, '%%\x00'}}}]}, 0x34}}, 0x0) recvfrom$inet(r0, &(0x7f0000000240)=""/238, 0xee, 0x2, &(0x7f0000000140)={0x2, 0x4e22, @empty}, 0x10) r4 = socket(0x2, 0x3, 0x7f) sendmsg$NL80211_CMD_FRAME(r4, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x4000010) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x62181) syz_emit_ethernet(0x45, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}, @time_exceeded={0xb, 0x3, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, @broadcast=0xac14140a, @multicast1}, "ffff0000000000"}}}}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000f40), r7) sendmsg$IEEE802154_ADD_IFACE(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x34, r8, 0x1, 0x800000, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_TYPE={0x5}]}, 0x34}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r10, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@getchain={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r11}}, 0x24}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 257.6µs ago: executing program 2 (id=2123): r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000300)={0x0, "eee32168441e148d1d5abf08342d1b466136a26ec618804e146111f9bc880bd9350e0a544c37d7e8f3133e6f402e2029b96e833b7a50c5d45835b5204aac9679", 0x38}, 0x48, r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3, 0x0, 0x9}, 0x18) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000380)=@keyring={'key_or_keyring:', r1}) (fail_nth: 6) 0s ago: executing program 1 (id=2124): syz_open_dev$ptys(0xc, 0x3, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r0, 0x5606, 0x4) kernel console output (not intermixed with test programs): ack+0x15/0x20 [ 104.583097][ T8941] should_fail_ex+0x223/0x230 [ 104.587870][ T8941] should_failslab+0x8f/0xb0 [ 104.592461][ T8941] kmem_cache_alloc_noprof+0x52/0x320 [ 104.597839][ T8941] ? dst_alloc+0xc0/0x100 [ 104.602173][ T8941] dst_alloc+0xc0/0x100 [ 104.606335][ T8941] xfrm_lookup_with_ifid+0x729/0x12f0 [ 104.611717][ T8941] xfrm_lookup_route+0x3b/0x110 [ 104.616706][ T8941] ip6_dst_lookup_flow+0x98/0xc0 [ 104.621667][ T8941] tcp_v6_send_response+0xab9/0x1020 [ 104.626955][ T8941] ? find_match+0x776/0x7e0 [ 104.631456][ T8941] ? bpf_trace_run3+0x12b/0x1d0 [ 104.636303][ T8941] tcp_v6_send_reset+0x7b1/0x9f0 [ 104.641296][ T8941] ? tcp_v6_fill_cb+0x176/0x190 [ 104.646222][ T8941] tcp_v6_rcv+0x14f2/0x1ca0 [ 104.650728][ T8941] ? __pfx_tcp_v6_rcv+0x10/0x10 [ 104.655577][ T8941] ip6_protocol_deliver_rcu+0x9f5/0x1060 [ 104.661218][ T8941] ip6_input+0xbf/0x1c0 [ 104.665364][ T8941] ? __pfx_ip6_input_finish+0x10/0x10 [ 104.670734][ T8941] ? __pfx_ip6_input+0x10/0x10 [ 104.675490][ T8941] ip6_rcv_finish+0x1fa/0x330 [ 104.680181][ T8941] ipv6_rcv+0x74/0x150 [ 104.684243][ T8941] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 104.689435][ T8941] __netif_receive_skb+0xa2/0x280 [ 104.694456][ T8941] netif_receive_skb+0x4a/0x320 [ 104.699391][ T8941] ? tun_rx_batched+0xba/0x410 [ 104.704166][ T8941] tun_rx_batched+0xf0/0x410 [ 104.708757][ T8941] tun_get_user+0x1f3d/0x25b0 [ 104.713434][ T8941] ? _parse_integer+0x27/0x30 [ 104.718107][ T8941] ? ref_tracker_alloc+0x1f5/0x2f0 [ 104.723247][ T8941] tun_chr_write_iter+0x188/0x240 [ 104.728341][ T8941] vfs_write+0x77f/0x920 [ 104.732595][ T8941] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 104.738224][ T8941] ksys_write+0xe8/0x1b0 [ 104.742575][ T8941] __x64_sys_write+0x42/0x50 [ 104.747255][ T8941] x64_sys_call+0x287e/0x2dc0 [ 104.751974][ T8941] do_syscall_64+0xc9/0x1c0 [ 104.756467][ T8941] ? clear_bhb_loop+0x55/0xb0 [ 104.761137][ T8941] ? clear_bhb_loop+0x55/0xb0 [ 104.765833][ T8941] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 104.771795][ T8941] RIP: 0033:0x7f16deddf2bf [ 104.776200][ T8941] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 8e 02 00 48 [ 104.795798][ T8941] RSP: 002b:00007f16dd457020 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 104.804272][ T8941] RAX: ffffffffffffffda RBX: 00007f16defa5fa0 RCX: 00007f16deddf2bf [ 104.812235][ T8941] RDX: 000000000000004a RSI: 0000000020000200 RDI: 00000000000000c8 [ 104.820205][ T8941] RBP: 00007f16dd4570a0 R08: 0000000000000000 R09: 0000000000000000 [ 104.828214][ T8941] R10: 000000000000004a R11: 0000000000000293 R12: 0000000000000001 [ 104.836195][ T8941] R13: 0000000000000000 R14: 00007f16defa5fa0 R15: 00007ffc4ee40358 [ 104.844177][ T8941] [ 105.094751][ T8970] loop3: detected capacity change from 0 to 2048 [ 105.119602][ T5311] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 105.133936][ T8970] loop3: p1 p2 p3 < > [ 105.138086][ T8970] loop3: partition table partially beyond EOD, truncated [ 105.148303][ T8970] loop3: p1 size 33024 extends beyond EOD, truncated [ 105.171486][ T8970] loop3: p2 start 16908292 is beyond EOD, truncated [ 105.178164][ T8970] loop3: p3 start 4284289 is beyond EOD, truncated [ 105.188792][ T8980] syz.5.1845[8980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.273198][ T8986] netlink: 'syz.5.1848': attribute type 10 has an invalid length. [ 105.302712][ T8997] loop2: detected capacity change from 0 to 1024 [ 105.310497][ T8996] loop3: detected capacity change from 0 to 1024 [ 105.317092][ T8996] EXT4-fs: Ignoring removed orlov option [ 105.322894][ T8996] EXT4-fs: Ignoring removed bh option [ 105.328642][ T8997] EXT4-fs: Ignoring removed orlov option [ 105.336124][ T9002] xt_TPROXY: Can be used only with -p tcp or -p udp [ 105.342906][ T8997] EXT4-fs: Ignoring removed bh option [ 105.351194][ T8986] bond0: (slave netdevsim1): Enslaving as an active interface with an up link [ 105.361400][ T8996] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=8842c018, mo2=0002] [ 105.371751][ T8997] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=8842c018, mo2=0002] [ 105.380738][ T9002] netdevsim netdevsim5 : renamed from netdevsim1 (while UP) [ 105.386234][ T8996] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 105.396082][ T8997] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 105.748485][ T9036] loop5: detected capacity change from 0 to 128 [ 105.803404][ T9041] loop5: detected capacity change from 0 to 128 [ 105.831309][ T9041] bio_check_eod: 8 callbacks suppressed [ 105.831359][ T9041] syz.5.1867: attempt to access beyond end of device [ 105.831359][ T9041] loop5: rw=2049, sector=145, nr_sectors = 896 limit=128 [ 105.858093][ T9041] syz.5.1867: attempt to access beyond end of device [ 105.858093][ T9041] loop5: rw=524288, sector=145, nr_sectors = 224 limit=128 [ 105.872337][ T9041] syz.5.1867: attempt to access beyond end of device [ 105.872337][ T9041] loop5: rw=0, sector=145, nr_sectors = 8 limit=128 [ 105.885666][ T9041] syz.5.1867: attempt to access beyond end of device [ 105.885666][ T9041] loop5: rw=0, sector=145, nr_sectors = 8 limit=128 [ 105.899050][ T9041] syz.5.1867: attempt to access beyond end of device [ 105.899050][ T9041] loop5: rw=0, sector=145, nr_sectors = 8 limit=128 [ 105.912356][ T9041] syz.5.1867: attempt to access beyond end of device [ 105.912356][ T9041] loop5: rw=0, sector=145, nr_sectors = 8 limit=128 [ 106.070188][ T3322] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 106.085231][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 106.156690][ T9055] netlink: 'syz.2.1874': attribute type 29 has an invalid length. [ 106.164737][ T9055] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1874'. [ 106.255697][ T9063] loop6: detected capacity change from 0 to 1024 [ 106.268816][ T9063] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 106.290305][ T9075] loop3: detected capacity change from 0 to 128 [ 106.310818][ T9075] syz.3.1881: attempt to access beyond end of device [ 106.310818][ T9075] loop3: rw=2049, sector=145, nr_sectors = 896 limit=128 [ 106.329706][ T9075] syz.3.1881: attempt to access beyond end of device [ 106.329706][ T9075] loop3: rw=524288, sector=145, nr_sectors = 224 limit=128 [ 106.344520][ T9075] syz.3.1881: attempt to access beyond end of device [ 106.344520][ T9075] loop3: rw=0, sector=145, nr_sectors = 8 limit=128 [ 106.357916][ T9075] syz.3.1881: attempt to access beyond end of device [ 106.357916][ T9075] loop3: rw=0, sector=145, nr_sectors = 8 limit=128 [ 106.372251][ T6123] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 106.425165][ T9080] loop3: detected capacity change from 0 to 128 [ 106.697413][ T9098] loop3: detected capacity change from 0 to 128 [ 107.154588][ T9124] loop3: detected capacity change from 0 to 128 [ 107.230025][ T9133] netlink: 'syz.2.1904': attribute type 29 has an invalid length. [ 107.237942][ T9133] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1904'. [ 107.268278][ T9137] SELinux: policydb magic number 0xf97cff8e does not match expected magic number 0xf97cff8c [ 107.283702][ T9137] SELinux: failed to load policy [ 107.292088][ T9137] IPv4: Oversized IP packet from 127.202.26.0 [ 107.464433][ T9164] loop3: detected capacity change from 0 to 1024 [ 107.465571][ T9165] loop5: detected capacity change from 0 to 1024 [ 107.478967][ T9164] EXT4-fs: Ignoring removed orlov option [ 107.478975][ T9165] EXT4-fs: Ignoring removed orlov option [ 107.479138][ T9165] EXT4-fs: Ignoring removed bh option [ 107.496758][ T9164] EXT4-fs: Ignoring removed bh option [ 107.514809][ T9165] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=8842c018, mo2=0002] [ 107.527174][ T9164] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=8842c018, mo2=0002] [ 107.535806][ T9164] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 107.548669][ T9165] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 107.571863][ T9175] mmap: syz.1.1919 (9175) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 107.572114][ T9158] loop6: detected capacity change from 0 to 1024 [ 107.600389][ T9158] EXT4-fs (loop6): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 107.611933][ T9158] EXT4-fs (loop6): revision level too high, forcing read-only mode [ 107.620256][ T9158] EXT4-fs (loop6): orphan cleanup on readonly fs [ 107.627674][ T9158] EXT4-fs error (device loop6) in ext4_reserve_inode_write:5837: Corrupt filesystem [ 107.638442][ T9158] EXT4-fs (loop6): Remounting filesystem read-only [ 107.645322][ T9158] EXT4-fs (loop6): 1 orphan inode deleted [ 107.651537][ T9158] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 107.663847][ T9158] SELinux: (dev loop6, type ext4) getxattr errno 5 [ 107.670757][ T9158] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 108.255851][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 108.275390][ T5311] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 108.561012][ T29] kauditd_printk_skb: 301 callbacks suppressed [ 108.561026][ T29] audit: type=1400 audit(1732727931.192:6407): avc: denied { write } for pid=9239 comm="syz.5.1947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 108.587715][ T29] audit: type=1400 audit(1732727931.192:6408): avc: denied { nlmsg_read } for pid=9239 comm="syz.5.1947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 108.609480][ T29] audit: type=1400 audit(1732727931.232:6409): avc: denied { watch_reads } for pid=9234 comm="syz.2.1944" path="/329" dev="tmpfs" ino=1778 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 108.778541][ T9259] loop5: detected capacity change from 0 to 1024 [ 108.806364][ T9259] EXT4-fs (loop5): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 108.830249][ T9259] EXT4-fs (loop5): revision level too high, forcing read-only mode [ 108.835878][ T9235] loop2: detected capacity change from 0 to 512 [ 108.849042][ T9259] EXT4-fs (loop5): orphan cleanup on readonly fs [ 108.866878][ T9259] EXT4-fs error (device loop5) in ext4_reserve_inode_write:5837: Corrupt filesystem [ 108.930871][ T9259] EXT4-fs (loop5): Remounting filesystem read-only [ 108.940378][ T9259] Quota error (device loop5): write_blk: dquota write failed [ 108.944151][ T9270] FAULT_INJECTION: forcing a failure. [ 108.944151][ T9270] name failslab, interval 1, probability 0, space 0, times 0 [ 108.947844][ T9259] Quota error (device loop5): write_blk: dquota write failed [ 108.960404][ T9270] CPU: 0 UID: 0 PID: 9270 Comm: syz.6.1958 Not tainted 6.12.0-syzkaller-10296-gaaf20f870da0 #0 [ 108.967753][ T9259] Quota error (device loop5): qtree_write_dquot: Error -28 occurred while creating quota [ 108.978031][ T9270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 108.978044][ T9270] Call Trace: [ 108.978051][ T9270] [ 109.004189][ T9270] dump_stack_lvl+0xf2/0x150 [ 109.008778][ T9270] dump_stack+0x15/0x20 [ 109.012948][ T9270] should_fail_ex+0x223/0x230 [ 109.017634][ T9270] should_failslab+0x8f/0xb0 [ 109.022222][ T9270] __kmalloc_cache_node_noprof+0x56/0x320 [ 109.028019][ T9270] ? __get_vm_area_node+0xfb/0x1c0 [ 109.033133][ T9270] __get_vm_area_node+0xfb/0x1c0 [ 109.038094][ T9270] __vmalloc_node_range_noprof+0x280/0xe80 [ 109.043898][ T9270] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 109.049446][ T9270] ? mntput_no_expire+0x70/0x3c0 [ 109.054452][ T9270] ? avc_has_perm_noaudit+0x1cc/0x210 [ 109.059816][ T9270] ? selinux_capable+0x1f2/0x260 [ 109.064820][ T9270] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 109.070386][ T9270] __vmalloc_noprof+0x5e/0x70 [ 109.075082][ T9270] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 109.080768][ T9270] bpf_prog_alloc_no_stats+0x49/0x380 [ 109.086210][ T9270] ? bpf_prog_alloc+0x28/0x150 [ 109.090970][ T9270] bpf_prog_alloc+0x3a/0x150 [ 109.095557][ T9270] bpf_prog_load+0x4d1/0x1070 [ 109.100230][ T9270] ? __rcu_read_unlock+0x4e/0x70 [ 109.105166][ T9270] __sys_bpf+0x463/0x7a0 [ 109.109491][ T9270] __x64_sys_bpf+0x43/0x50 [ 109.114020][ T9270] x64_sys_call+0x2914/0x2dc0 [ 109.118697][ T9270] do_syscall_64+0xc9/0x1c0 [ 109.123252][ T9270] ? clear_bhb_loop+0x55/0xb0 [ 109.127917][ T9270] ? clear_bhb_loop+0x55/0xb0 [ 109.132583][ T9270] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 109.138552][ T9270] RIP: 0033:0x7f16dede0809 [ 109.142955][ T9270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.162558][ T9270] RSP: 002b:00007f16dd457058 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 109.170969][ T9270] RAX: ffffffffffffffda RBX: 00007f16defa5fa0 RCX: 00007f16dede0809 [ 109.179008][ T9270] RDX: 0000000000000094 RSI: 0000000020000400 RDI: 0000000000000005 [ 109.187006][ T9270] RBP: 00007f16dd4570a0 R08: 0000000000000000 R09: 0000000000000000 [ 109.194972][ T9270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.202954][ T9270] R13: 0000000000000000 R14: 00007f16defa5fa0 R15: 00007ffc4ee40358 [ 109.210925][ T9270] [ 109.214268][ T9270] syz.6.1958: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0 [ 109.230486][ T9270] CPU: 0 UID: 0 PID: 9270 Comm: syz.6.1958 Not tainted 6.12.0-syzkaller-10296-gaaf20f870da0 #0 [ 109.240823][ T9270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 109.250909][ T9270] Call Trace: [ 109.253142][ T9259] Quota error (device loop5): v2_write_file_info: Can't write info structure [ 109.254183][ T9270] [ 109.254191][ T9270] dump_stack_lvl+0xf2/0x150 [ 109.254214][ T9270] dump_stack+0x15/0x20 [ 109.254230][ T9270] warn_alloc+0x145/0x1b0 [ 109.263322][ T9259] EXT4-fs (loop5): 1 orphan inode deleted [ 109.265883][ T9270] __vmalloc_node_range_noprof+0x2a5/0xe80 [ 109.265908][ T9270] ? mntput_no_expire+0x70/0x3c0 [ 109.295375][ T9270] ? avc_has_perm_noaudit+0x1cc/0x210 [ 109.300747][ T9270] ? selinux_capable+0x1f2/0x260 [ 109.305695][ T9270] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 109.311348][ T9270] __vmalloc_noprof+0x5e/0x70 [ 109.316056][ T9270] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 109.321595][ T9270] bpf_prog_alloc_no_stats+0x49/0x380 [ 109.327028][ T9270] ? bpf_prog_alloc+0x28/0x150 [ 109.331873][ T9270] bpf_prog_alloc+0x3a/0x150 [ 109.336458][ T9270] bpf_prog_load+0x4d1/0x1070 [ 109.341223][ T9270] ? __rcu_read_unlock+0x4e/0x70 [ 109.346160][ T9270] __sys_bpf+0x463/0x7a0 [ 109.350403][ T9270] __x64_sys_bpf+0x43/0x50 [ 109.354901][ T9270] x64_sys_call+0x2914/0x2dc0 [ 109.359572][ T9270] do_syscall_64+0xc9/0x1c0 [ 109.364113][ T9270] ? clear_bhb_loop+0x55/0xb0 [ 109.368833][ T9270] ? clear_bhb_loop+0x55/0xb0 [ 109.373508][ T9270] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 109.379518][ T9270] RIP: 0033:0x7f16dede0809 [ 109.384001][ T9270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.403610][ T9270] RSP: 002b:00007f16dd457058 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 109.412041][ T9270] RAX: ffffffffffffffda RBX: 00007f16defa5fa0 RCX: 00007f16dede0809 [ 109.420074][ T9270] RDX: 0000000000000094 RSI: 0000000020000400 RDI: 0000000000000005 [ 109.428040][ T9270] RBP: 00007f16dd4570a0 R08: 0000000000000000 R09: 0000000000000000 [ 109.436009][ T9270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.444037][ T9270] R13: 0000000000000000 R14: 00007f16defa5fa0 R15: 00007ffc4ee40358 [ 109.452051][ T9270] [ 109.455278][ T9270] Mem-Info: [ 109.458495][ T9270] active_anon:5090 inactive_anon:12 isolated_anon:0 [ 109.458495][ T9270] active_file:7073 inactive_file:16687 isolated_file:0 [ 109.458495][ T9270] unevictable:0 dirty:919 writeback:0 [ 109.458495][ T9270] slab_reclaimable:2998 slab_unreclaimable:15728 [ 109.458495][ T9270] mapped:29549 shmem:768 pagetables:924 [ 109.458495][ T9270] sec_pagetables:0 bounce:0 [ 109.458495][ T9270] kernel_misc_reclaimable:0 [ 109.458495][ T9270] free:1869955 free_pcp:11443 free_cma:0 [ 109.503437][ T9270] Node 0 active_anon:20360kB inactive_anon:48kB active_file:28292kB inactive_file:66748kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:118196kB dirty:3676kB writeback:0kB shmem:3072kB writeback_tmp:0kB kernel_stack:3344kB pagetables:3696kB sec_pagetables:0kB all_unreclaimable? no [ 109.531919][ T9270] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 109.558926][ T9270] lowmem_reserve[]: 0 2866 7844 0 [ 109.564125][ T9270] Node 0 DMA32 free:2950416kB boost:0kB min:4136kB low:7068kB high:10000kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2953948kB mlocked:0kB bounce:0kB free_pcp:3532kB local_pcp:3532kB free_cma:0kB [ 109.592770][ T9270] lowmem_reserve[]: 0 0 4978 0 [ 109.597771][ T9270] Node 0 Normal free:4513980kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB active_anon:20520kB inactive_anon:48kB active_file:28292kB inactive_file:66776kB unevictable:0kB writepending:3672kB present:5242880kB managed:5098208kB mlocked:0kB bounce:0kB free_pcp:41908kB local_pcp:17192kB free_cma:0kB [ 109.628301][ T9270] lowmem_reserve[]: 0 0 0 0 [ 109.632846][ T9270] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 109.645632][ T9270] Node 0 DMA32: 4*4kB (M) 2*8kB (M) 3*16kB (M) 2*32kB (M) 4*64kB (M) 3*128kB (M) 2*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 718*4096kB (M) = 2950416kB [ 109.661786][ T9270] Node 0 Normal: 15*4kB (ME) 2*8kB (ME) 1*16kB (U) 11*32kB (UME) 150*64kB (UME) 85*128kB (UM) 39*256kB (UME) 32*512kB (UME) 26*1024kB (UME) 28*2048kB (UME) 1070*4096kB (UM) = 4513980kB [ 109.675614][ T29] audit: type=1400 audit(1732727932.302:6410): avc: denied { append } for pid=9281 comm="syz.2.1962" name="pfkey" dev="proc" ino=4026532962 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 109.680211][ T9270] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 109.712405][ T9270] 24533 total pagecache pages [ 109.717111][ T9270] 16 pages in swap cache [ 109.721343][ T9270] Free swap = 124232kB [ 109.725526][ T9270] Total swap = 124996kB [ 109.729669][ T9270] 2097051 pages RAM [ 109.733475][ T9270] 0 pages HighMem/MovableOnly [ 109.738188][ T9270] 80172 pages reserved [ 109.745013][ T9259] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 109.757416][ T9259] SELinux: (dev loop5, type ext4) getxattr errno 5 [ 109.764221][ T9284] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1962'. [ 109.764902][ T9259] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 109.822432][ T9293] loop2: detected capacity change from 0 to 1024 [ 109.903190][ T29] audit: type=1400 audit(1732727932.532:6411): avc: denied { getopt } for pid=9302 comm="syz.6.1970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 109.903828][ T9293] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 109.922700][ T29] audit: type=1400 audit(1732727932.532:6412): avc: denied { ioctl } for pid=9302 comm="syz.6.1970" path="socket:[23558]" dev="sockfs" ino=23558 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 109.981637][ T9293] FAULT_INJECTION: forcing a failure. [ 109.981637][ T9293] name failslab, interval 1, probability 0, space 0, times 0 [ 109.994348][ T9293] CPU: 1 UID: 0 PID: 9293 Comm: syz.2.1965 Not tainted 6.12.0-syzkaller-10296-gaaf20f870da0 #0 [ 110.004733][ T9293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 110.014817][ T9293] Call Trace: [ 110.018098][ T9293] [ 110.021024][ T9293] dump_stack_lvl+0xf2/0x150 [ 110.025697][ T9293] dump_stack+0x15/0x20 [ 110.029853][ T9293] should_fail_ex+0x223/0x230 [ 110.034590][ T9293] should_failslab+0x8f/0xb0 [ 110.039192][ T9293] __kmalloc_noprof+0xab/0x3f0 [ 110.044020][ T9293] ? ext4_find_extent+0x172/0x7c0 [ 110.049063][ T9293] ? ext4_ext_map_blocks+0x2a74/0x35c0 [ 110.050801][ T9312] sg_write: data in/out 231/14 bytes for SCSI command 0x0-- guessing data in; [ 110.050801][ T9312] program +}[@ not setting count and/or reply_len properly [ 110.054566][ T9293] ext4_find_extent+0x172/0x7c0 [ 110.054596][ T9293] ? ext4_ext_map_blocks+0x2af9/0x35c0 [ 110.081148][ T9293] ext4_ext_map_blocks+0x11f/0x35c0 [ 110.086404][ T9293] ? bdev_getblk+0x5d/0x3b0 [ 110.091016][ T9293] ? ext4_map_query_blocks+0x10e/0x180 [ 110.096496][ T9293] ext4_map_blocks+0x5aa/0xd20 [ 110.101278][ T9293] ? __ext4_mark_inode_dirty+0x32a/0x440 [ 110.107008][ T9293] ext4_xattr_inode_lookup_create+0x888/0xf70 [ 110.113130][ T9293] ext4_xattr_ibody_set+0x131/0x3b0 [ 110.118384][ T9293] ext4_xattr_set_handle+0x7ea/0xbf0 [ 110.123678][ T9293] ext4_xattr_set+0x197/0x250 [ 110.128434][ T9293] ext4_xattr_trusted_set+0x3c/0x50 [ 110.133763][ T9293] ? __pfx_ext4_xattr_trusted_set+0x10/0x10 [ 110.139658][ T9293] __vfs_setxattr+0x2e5/0x310 [ 110.144332][ T9293] __vfs_setxattr_noperm+0xed/0x420 [ 110.149524][ T9293] __vfs_setxattr_locked+0x1af/0x1d0 [ 110.154858][ T9293] vfs_setxattr+0x140/0x290 [ 110.159367][ T9293] filename_setxattr+0x198/0x2a0 [ 110.164298][ T9293] path_setxattrat+0x284/0x310 [ 110.169076][ T9293] __x64_sys_lsetxattr+0x71/0x90 [ 110.174094][ T9293] x64_sys_call+0x29c8/0x2dc0 [ 110.178840][ T9293] do_syscall_64+0xc9/0x1c0 [ 110.183335][ T9293] ? clear_bhb_loop+0x55/0xb0 [ 110.188105][ T9293] ? clear_bhb_loop+0x55/0xb0 [ 110.192811][ T9293] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.198710][ T9293] RIP: 0033:0x7fb109480809 [ 110.203117][ T9293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.222718][ T9293] RSP: 002b:00007fb107af7058 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 110.231181][ T9293] RAX: ffffffffffffffda RBX: 00007fb109645fa0 RCX: 00007fb109480809 [ 110.239144][ T9293] RDX: 0000000020002700 RSI: 00000000200001c0 RDI: 0000000020000180 [ 110.247176][ T9293] RBP: 00007fb107af70a0 R08: 0000000000000000 R09: 0000000000000000 [ 110.255172][ T9293] R10: 0000000000000e01 R11: 0000000000000246 R12: 0000000000000002 [ 110.263248][ T9293] R13: 0000000000000000 R14: 00007fb109645fa0 R15: 00007ffef47038e8 [ 110.271218][ T9293] [ 110.294617][ T3322] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 110.576975][ T9347] loop3: detected capacity change from 0 to 1024 [ 110.601247][ T9347] EXT4-fs: Ignoring removed orlov option [ 110.639950][ T9349] loop6: detected capacity change from 0 to 128 [ 110.781145][ T9347] EXT4-fs: Ignoring removed bh option [ 110.835108][ T9349] bio_check_eod: 15 callbacks suppressed [ 110.835120][ T9349] syz.6.1989: attempt to access beyond end of device [ 110.835120][ T9349] loop6: rw=524288, sector=145, nr_sectors = 224 limit=128 [ 111.150405][ T9349] syz.6.1989: attempt to access beyond end of device [ 111.150405][ T9349] loop6: rw=0, sector=145, nr_sectors = 8 limit=128 [ 111.165714][ T9349] syz.6.1989: attempt to access beyond end of device [ 111.165714][ T9349] loop6: rw=0, sector=145, nr_sectors = 8 limit=128 [ 111.190710][ T9360] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1992'. [ 111.201000][ T9347] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=8842c018, mo2=0002] [ 111.234023][ T9347] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 111.254520][ T9349] syz.6.1989: attempt to access beyond end of device [ 111.254520][ T9349] loop6: rw=0, sector=145, nr_sectors = 8 limit=128 [ 111.305882][ T9349] syz.6.1989: attempt to access beyond end of device [ 111.305882][ T9349] loop6: rw=0, sector=145, nr_sectors = 8 limit=128 [ 111.358421][ T9369] loop2: detected capacity change from 0 to 1024 [ 111.398106][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 111.411374][ T9371] netlink: 664 bytes leftover after parsing attributes in process `syz.1.1997'. [ 111.425185][ T9369] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 111.534135][ T9381] loop3: detected capacity change from 0 to 128 [ 111.635872][ T3322] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 111.671349][ T9406] loop2: detected capacity change from 0 to 512 [ 111.689150][ T9406] EXT4-fs: Mount option(s) incompatible with ext2 [ 111.696782][ T9407] loop6: detected capacity change from 0 to 1024 [ 111.703418][ T9407] EXT4-fs: Ignoring removed orlov option [ 111.723629][ T9407] EXT4-fs: Ignoring removed bh option [ 111.726408][ T9412] FAULT_INJECTION: forcing a failure. [ 111.726408][ T9412] name failslab, interval 1, probability 0, space 0, times 0 [ 111.741682][ T9412] CPU: 1 UID: 0 PID: 9412 Comm: syz.3.2011 Not tainted 6.12.0-syzkaller-10296-gaaf20f870da0 #0 [ 111.752087][ T9412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 111.762220][ T9412] Call Trace: [ 111.765550][ T9412] [ 111.768578][ T9412] dump_stack_lvl+0xf2/0x150 [ 111.773249][ T9412] dump_stack+0x15/0x20 [ 111.777141][ T9407] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=8842c018, mo2=0002] [ 111.777417][ T9412] should_fail_ex+0x223/0x230 [ 111.786491][ T9407] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 111.790115][ T9412] should_failslab+0x8f/0xb0 [ 111.806676][ T9412] kmem_cache_alloc_node_noprof+0x59/0x320 [ 111.812558][ T9412] ? __alloc_skb+0x10b/0x310 [ 111.817202][ T9412] __alloc_skb+0x10b/0x310 [ 111.821652][ T9412] netlink_alloc_large_skb+0xad/0xe0 [ 111.826960][ T9412] netlink_sendmsg+0x3b4/0x6e0 [ 111.831839][ T9412] ? __pfx_netlink_sendmsg+0x10/0x10 [ 111.837133][ T9412] __sock_sendmsg+0x140/0x180 [ 111.841800][ T9412] ____sys_sendmsg+0x312/0x410 [ 111.846576][ T9412] __sys_sendmsg+0x19d/0x230 [ 111.851155][ T9412] __x64_sys_sendmsg+0x46/0x50 [ 111.855908][ T9412] x64_sys_call+0x2734/0x2dc0 [ 111.860643][ T9412] do_syscall_64+0xc9/0x1c0 [ 111.865128][ T9412] ? clear_bhb_loop+0x55/0xb0 [ 111.869796][ T9412] ? clear_bhb_loop+0x55/0xb0 [ 111.874531][ T9412] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 111.880417][ T9412] RIP: 0033:0x7fad0e390809 [ 111.884814][ T9412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 111.904492][ T9412] RSP: 002b:00007fad0c9e6058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 111.912904][ T9412] RAX: ffffffffffffffda RBX: 00007fad0e556080 RCX: 00007fad0e390809 [ 111.920859][ T9412] RDX: 0000000000000000 RSI: 0000000020001100 RDI: 0000000000000005 [ 111.928816][ T9412] RBP: 00007fad0c9e60a0 R08: 0000000000000000 R09: 0000000000000000 [ 111.936774][ T9412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.944728][ T9412] R13: 0000000000000000 R14: 00007fad0e556080 R15: 00007ffef66dd8f8 [ 111.952689][ T9412] [ 111.960458][ T9410] netlink: 14866 bytes leftover after parsing attributes in process `syz.5.2013'. [ 112.062024][ T9425] netlink: 54 bytes leftover after parsing attributes in process `syz.1.2018'. [ 112.095087][ T9434] netlink: 54 bytes leftover after parsing attributes in process `syz.3.2020'. [ 112.096297][ T9438] loop5: detected capacity change from 0 to 128 [ 112.167071][ T9446] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32794 sclass=netlink_route_socket pid=9446 comm=syz.1.2025 [ 112.266742][ T9458] loop2: detected capacity change from 0 to 512 [ 112.278445][ T9458] EXT4-fs: Mount option(s) incompatible with ext2 [ 112.362897][ T9474] loop2: detected capacity change from 0 to 128 [ 112.363692][ T9472] loop5: detected capacity change from 0 to 2048 [ 112.381522][ T9472] EXT4-fs: Ignoring removed orlov option [ 112.397002][ T9479] loop3: detected capacity change from 0 to 1024 [ 112.403821][ T9479] EXT4-fs: Ignoring removed orlov option [ 112.409568][ T9479] EXT4-fs: Ignoring removed bh option [ 112.410339][ T9472] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 112.444665][ T6260] EXT4-fs error (device loop5): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 112.463391][ T9479] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=8842c018, mo2=0002] [ 112.471566][ T6260] EXT4-fs (loop5): Remounting filesystem read-only [ 112.474511][ T9479] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 112.479472][ T5311] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 112.501182][ T6123] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 112.502165][ T9487] macvtap0: entered promiscuous mode [ 112.516226][ T9487] macvtap0: left promiscuous mode [ 112.620680][ T9506] loop2: detected capacity change from 0 to 1024 [ 112.627300][ T9506] ext4: Bad value for 'min_batch_time' [ 112.696870][ T9518] loop5: detected capacity change from 0 to 512 [ 112.707607][ T9518] EXT4-fs: Mount option(s) incompatible with ext2 [ 113.230801][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 113.398516][ T9549] loop3: detected capacity change from 0 to 512 [ 113.406650][ T9549] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz.3.2063: bg 0: block 393: padding at end of block bitmap is not set [ 113.421291][ T9549] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 113.430309][ T9549] EXT4-fs (loop3): 2 truncates cleaned up [ 113.436741][ T9549] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 113.457918][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 113.644590][ T29] kauditd_printk_skb: 183 callbacks suppressed [ 113.644604][ T29] audit: type=1326 audit(1732727936.292:6596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9561 comm="syz.1.2068" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f151f510809 code=0x7ffc0000 [ 113.697649][ T29] audit: type=1326 audit(1732727936.292:6597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9561 comm="syz.1.2068" exe="/root/syz-executor" sig=0 arch=c000003e syscall=213 compat=0 ip=0x7f151f510809 code=0x7ffc0000 [ 113.721146][ T29] audit: type=1326 audit(1732727936.292:6598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9561 comm="syz.1.2068" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f151f510809 code=0x7ffc0000 [ 113.744931][ T29] audit: type=1326 audit(1732727936.292:6599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9561 comm="syz.1.2068" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f151f510809 code=0x7ffc0000 [ 113.750223][ T9569] loop2: detected capacity change from 0 to 1024 [ 113.768358][ T29] audit: type=1326 audit(1732727936.292:6600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9561 comm="syz.1.2068" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f151f510809 code=0x7ffc0000 [ 113.776594][ T9569] EXT4-fs: Ignoring removed orlov option [ 113.798305][ T29] audit: type=1326 audit(1732727936.292:6601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9561 comm="syz.1.2068" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f151f510809 code=0x7ffc0000 [ 113.798333][ T29] audit: type=1326 audit(1732727936.292:6602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9561 comm="syz.1.2068" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f151f510809 code=0x7ffc0000 [ 113.827567][ T9569] EXT4-fs: Ignoring removed bh option [ 113.850792][ T29] audit: type=1326 audit(1732727936.292:6603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9561 comm="syz.1.2068" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f151f510809 code=0x7ffc0000 [ 113.850821][ T29] audit: type=1326 audit(1732727936.292:6604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9561 comm="syz.1.2068" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f151f510809 code=0x7ffc0000 [ 113.903104][ T29] audit: type=1326 audit(1732727936.292:6605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9561 comm="syz.1.2068" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f151f510809 code=0x7ffc0000 [ 113.931141][ T9577] IPv6: NLM_F_CREATE should be specified when creating new route [ 113.932253][ T9569] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=8842c018, mo2=0002] [ 113.942913][ T9577] netlink: 277 bytes leftover after parsing attributes in process `syz.5.2073'. [ 113.965426][ T9569] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 114.023221][ T9589] loop6: detected capacity change from 0 to 256 [ 114.043986][ T9589] FAT-fs (loop6): Directory bread(block 1285) failed [ 114.057530][ T9589] netlink: 596 bytes leftover after parsing attributes in process `syz.6.2077'. [ 114.070859][ T9592] netlink: 'syz.5.2078': attribute type 10 has an invalid length. [ 114.071976][ T9589] FAT-fs (loop6): Directory bread(block 1285) failed [ 114.078817][ T9592] netlink: 40 bytes leftover after parsing attributes in process `syz.5.2078'. [ 114.085670][ T9589] FAT-fs (loop6): Directory bread(block 1285) failed [ 114.099714][ T9592] A link change request failed with some changes committed already. Interface ipvlan0 may have been left with an inconsistent configuration, please check. [ 114.101210][ T9589] FAT-fs (loop6): Directory bread(block 1285) failed [ 114.160416][ T9598] netlink: 21 bytes leftover after parsing attributes in process `syz.5.2080'. [ 114.222117][ T9607] serio: Serial port pts0 [ 114.263874][ T9619] syz.6.2089: attempt to access beyond end of device [ 114.263874][ T9619] md34: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 114.281027][ T9619] netlink: 8 bytes leftover after parsing attributes in process `syz.6.2089'. [ 114.336631][ T9623] syzkaller0: entered promiscuous mode [ 114.342261][ T9623] syzkaller0: entered allmulticast mode [ 114.400478][ T9633] bpf_get_probe_write_proto: 23 callbacks suppressed [ 114.400574][ T9633] syz.3.2093[9633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.407523][ T9633] syz.3.2093[9633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.419079][ T9633] syz.3.2093[9633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.475517][ T9636] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 114.541157][ T9636] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 114.552977][ T3322] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 114.588386][ T9646] loop2: detected capacity change from 0 to 164 [ 114.591694][ T9644] loop5: detected capacity change from 0 to 1024 [ 114.606167][ T9636] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 114.635704][ T9644] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 114.671478][ T5311] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 114.702364][ T9636] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 114.749312][ T9661] syz.2.2101[9661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.749446][ T9661] syz.2.2101[9661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.762457][ T9661] syz.2.2101[9661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.780442][ T9636] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.802618][ T9663] loop5: detected capacity change from 0 to 512 [ 114.817791][ T9663] EXT4-fs: Mount option(s) incompatible with ext2 [ 114.819155][ T9636] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.842599][ T9636] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.869094][ T9670] loop2: detected capacity change from 0 to 128 [ 114.874504][ T9673] syz.3.2106[9673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.875399][ T9673] syz.3.2106[9673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.884579][ T9636] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.892951][ T9673] syz.3.2106[9673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.913476][ T9670] ext4 filesystem being mounted at /355/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 114.922004][ T9673] loop3: detected capacity change from 0 to 512 [ 114.948505][ T9673] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 114.971791][ T9673] EXT4-fs (loop3): 1 truncate cleaned up [ 114.997091][ T9670] program syz.2.2105 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 115.056390][ T9694] FAULT_INJECTION: forcing a failure. [ 115.056390][ T9694] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 115.069541][ T9694] CPU: 1 UID: 0 PID: 9694 Comm: syz.2.2113 Not tainted 6.12.0-syzkaller-10296-gaaf20f870da0 #0 [ 115.079974][ T9694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 115.090102][ T9694] Call Trace: [ 115.093452][ T9694] [ 115.096390][ T9694] dump_stack_lvl+0xf2/0x150 [ 115.100994][ T9694] dump_stack+0x15/0x20 [ 115.105246][ T9694] should_fail_ex+0x223/0x230 [ 115.109985][ T9694] should_fail+0xb/0x10 [ 115.114191][ T9694] should_fail_usercopy+0x1a/0x20 [ 115.119258][ T9694] strncpy_from_user+0x25/0x210 [ 115.124229][ T9694] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 115.129864][ T9694] ? getname_flags+0x81/0x3b0 [ 115.134545][ T9694] getname_flags+0xb0/0x3b0 [ 115.139047][ T9694] getname+0x17/0x20 [ 115.143076][ T9694] path_removexattrat+0xf0/0x4b0 [ 115.148014][ T9694] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 115.153713][ T9694] __x64_sys_removexattr+0x38/0x50 [ 115.158820][ T9694] x64_sys_call+0x3ea/0x2dc0 [ 115.163459][ T9694] do_syscall_64+0xc9/0x1c0 [ 115.167956][ T9694] ? clear_bhb_loop+0x55/0xb0 [ 115.172623][ T9694] ? clear_bhb_loop+0x55/0xb0 [ 115.177299][ T9694] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.183263][ T9694] RIP: 0033:0x7fb109480809 [ 115.187745][ T9694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.207349][ T9694] RSP: 002b:00007fb107af7058 EFLAGS: 00000246 ORIG_RAX: 00000000000000c5 [ 115.215794][ T9694] RAX: ffffffffffffffda RBX: 00007fb109645fa0 RCX: 00007fb109480809 [ 115.223755][ T9694] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000020000040 [ 115.231781][ T9694] RBP: 00007fb107af70a0 R08: 0000000000000000 R09: 0000000000000000 [ 115.239743][ T9694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.247730][ T9694] R13: 0000000000000000 R14: 00007fb109645fa0 R15: 00007ffef47038e8 [ 115.255742][ T9694] [ 115.336306][ T9715] FAULT_INJECTION: forcing a failure. [ 115.336306][ T9715] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 115.349499][ T9715] CPU: 1 UID: 0 PID: 9715 Comm: syz.2.2123 Not tainted 6.12.0-syzkaller-10296-gaaf20f870da0 #0 [ 115.359834][ T9715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 115.369895][ T9715] Call Trace: [ 115.373195][ T9715] [ 115.376129][ T9715] dump_stack_lvl+0xf2/0x150 [ 115.380721][ T9715] dump_stack+0x15/0x20 [ 115.384880][ T9715] should_fail_ex+0x223/0x230 [ 115.389576][ T9715] should_fail+0xb/0x10 [ 115.393749][ T9715] should_fail_usercopy+0x1a/0x20 [ 115.398778][ T9715] _copy_to_user+0x20/0xa0 [ 115.403200][ T9715] simple_read_from_buffer+0xa0/0x110 [ 115.408677][ T9715] proc_fail_nth_read+0xf9/0x140 [ 115.413659][ T9715] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 115.419266][ T9715] vfs_read+0x1a2/0x700 [ 115.423478][ T9715] ? __rcu_read_unlock+0x4e/0x70 [ 115.428422][ T9715] ? __fget_files+0x17c/0x1c0 [ 115.433173][ T9715] ksys_read+0xe8/0x1b0 [ 115.437335][ T9715] __x64_sys_read+0x42/0x50 [ 115.441913][ T9715] x64_sys_call+0x2874/0x2dc0 [ 115.446656][ T9715] do_syscall_64+0xc9/0x1c0 [ 115.451163][ T9715] ? clear_bhb_loop+0x55/0xb0 [ 115.455901][ T9715] ? clear_bhb_loop+0x55/0xb0 [ 115.460581][ T9715] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.466480][ T9715] RIP: 0033:0x7fb10947f21c [ 115.470893][ T9715] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 8e 02 00 48 [ 115.490538][ T9715] RSP: 002b:00007fb107af7050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 115.498965][ T9715] RAX: ffffffffffffffda RBX: 00007fb109645fa0 RCX: 00007fb10947f21c [ 115.507095][ T9715] RDX: 000000000000000f RSI: 00007fb107af70b0 RDI: 0000000000000003 [ 115.515078][ T9715] RBP: 00007fb107af70a0 R08: 0000000000000000 R09: 0000000000000000 [ 115.523062][ T9715] R10: 0000000020000380 R11: 0000000000000246 R12: 0000000000000001 [ 115.531031][ T9715] R13: 0000000000000000 R14: 00007fb109645fa0 R15: 00007ffef47038e8 [ 115.539005][ T9715] Nov 27 17:18:58 syzkaller kern.notice kernel: [ 115.336306][ T9715] FAULT_INJECTION: forcing a failure. Nov 27 17:18:58 syzkaller kern.notice kernel: [ 115.336306][ T9715] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.349499][ T9715] CPU: 1 UID: 0 PID: 9715 Comm: syz.2.2123 Not tainted 6.12.0-syzkaller-10296-gaaf20f870da0 #0 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.359834][ T9715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.369895][ T9715] Call Trace: Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.373195][ T9715] Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.376129][ T9715] dump_stack_lvl+0xf2/0x150 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.380721][ T9715] dump_stack+0x15/0x20 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.384880][ T9715] should_fail_ex+0x223/0x230 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.389576][ T9715] should_fail+0xb/0x10 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.393749][ T9715] should_fail_usercopy+0x1a/0x20 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.398778][ T9715] _copy_to_user+0x20/0xa0 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.403200][ T9715] simple_read_from_buffer+0xa0/0x110 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.408677][ T9715] proc_fail_nth_read+0xf9/0x140 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.413659][ T9715] ? __pfx_proc_fail_nth_read+0x10/0x10 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.419266][ T9715] vfs_read+0x1a2/0x700 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.423478][ T9715] ? __rcu_read_unlock+0x4e/0x70 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.428422][ T9715] ? __fget_files+0x17c/0x1c0 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.433173][ T9715] ksys_read+0xe8/0x1b0 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.437335][ T9715] __x64_sys_read+0x42/0x50 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.441913][ T9715] x64_sys_call+0x2874/0x2dc0 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.446656][ T9715] do_syscall_64+0xc9/0x1c0 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.451163][ T9715] ? clear_bhb_loop+0x55/0xb0 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.455901][ T9715] ? clear_bhb_loop+0x55/0xb0 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.460581][ T9715] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.466480][ T9715] RIP: 0033:0x7fb10947f21c Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.470893][ T9715] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 8e 02 00 48 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.490538][ T9715] RSP: 002b:00007fb107af7050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.498965][ T9715] RAX: ffffffffffffffda RBX: 00007fb109645fa0 RCX: 00007fb10947f21c Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.507095][ T9715] RDX: 000000000000000f RSI: 00007fb107af70b0 RDI: 0000000000000003 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.515078][ T9715] RBP: 00007fb107af70a0 R08: 0000000000000000 R09: 0000000000000000 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.523062][ T9715] R10: 0000000020000380 R11: 0000000000000246 R12: 0000000000000001 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.531031][ T9715] R13: 0000000000000000 R14: 00007fb109645fa0 R15: 00007ffef47038e8 Nov 27 17:18:58 syzkaller kern.warn kernel: [ 115.539005][ T9715] [ 118.663877][ T29] kauditd_printk_skb: 418 callbacks suppressed [ 118.663891][ T29] audit: type=1400 audit(1732727941.312:7024): avc: denied { recv } for pid=6260 comm="kworker/u8:17" saddr=10.128.0.163 src=30030 daddr=10.128.1.138 dest=60304 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 Nov 27 17:19:01 [ 118.696237][ T29] audit: type=1400 audit(1732727941.342:7025): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 118.719517][ T29] audit: type=1400 audit(1732727941.342:7026): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 118.743005][ T29] audit: type=1400 audit(1732727941.382:7027): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 18.663877][ T2[ 118.766507][ T29] audit: type=1400 audit(1732727941.412:7028): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 118.789575][ T29] audit: type=1400 audit(1732727941.432:7029): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 418 callb[ 118.813181][ T29] audit: type=1400 audit(1732727941.452:7030): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 acks suppressed[ 118.836842][ T29] audit: type=1400 audit(1732727941.482:7031): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 27 17:19:01[ 118.859530][ T29] audit: type=1400 audit(1732727941.482:7032): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.[ 118.883725][ T29] audit: type=1400 audit(1732727941.532:7033): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 notice kernel: [ 118.663891][ T29] audit: type=1400 audit(1732727941.312:7024): avc: denied { recv } for pid=6260 comm="kworker/u8:17" saddr=10.128.0.163 src=30030 daddr=10.128.1.138 dest=60304 netif=eth0 scontext=root:sysadm_r:sysadm_t Nov 27 17:19:01 syzkaller kern.notice kernel: [ 118.696237][ T29] audit: type=1400 audit(1732727941.342:7025): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:01 syzkaller kern.notice kernel: [ 118.719517][ T29] audit: type=1400 audit(1732727941.342:7026): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:01 syzkaller kern.notice kernel: [ 118.743005][ T29] audit: type=1400 audit(1732727941.382:7027): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:01 syzkaller kern.notice kernel: [ 118.766507][ T29] audit: type=1400 audit(1732727941.412:7028): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:01 syzkaller kern.notice kernel: [ 118.789575][ T29] audit: type=1400 audit(1732727941.432:7029): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:01 syzkaller kern.notice kernel: [ 118.813181][ T29] audit: type=1400 audit(1732727941.452:7030): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:01 syzkaller kern.notice kernel: [ 118.836842][ T29] audit: type=1400 audit(1732727941.482:7031): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:01 syzkaller kern.notice kernel: [ 118.859530][ T29] audit: type=1400 audit(1732727941.482:7032): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:01 syzkaller kern.notice kernel: [ 118.883725][ T29] audit: type=1400 audit(1732727941.532:7033): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:03 syzkaller daemon.err dhcpcd[9720]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 27 17:19:03 syzkaller daemon.err dhcpcd[9720]: ps_root_recvmsg: Invalid argument Nov 27 17:19:03 syzkaller daemon.err dhcpcd[9721]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 27 17:19:03 syzkaller daemon.err dhcpcd[9721]: ps_root_recvmsg: Invalid argument Nov 27 17:19:04 syzkaller daemon.err dhcpcd[9722]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 27 17:19:04 syzkaller daemon.err dhcpcd[9722]: ps_root_recvmsg: Invalid argument Nov 27 17:19:05 syzkaller daemon.err dhcpcd[9723]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 27 17:19:05 syzkaller daemon.err dhcpcd[9723]: ps_root_recvmsg: Invalid argument [ 128.862371][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 128.862382][ T29] audit: type=1400 audit(1732727951.502:7046): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.1.138 dest=60304 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 128.893559][ T29] audit: type=1400 audit(1732727951.512:7047): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 27 17:19:11 [ 128.916861][ T29] audit: type=1400 audit(1732727951.562:7048): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 128.939286][ T29] audit: type=1400 audit(1732727951.562:7049): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 128.962591][ T29] audit: type=1400 audit(1732727951.582:7050): avc: denied { recv } for pid=6260 comm="kworker/u8:17" saddr=10.128.0.163 src=30030 daddr=10.128.1.138 dest=60304 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 28.862371][ T2[ 128.989509][ T29] audit: type=1400 audit(1732727951.602:7051): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 129.013011][ T29] audit: type=1400 audit(1732727951.652:7052): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 12 callba[ 129.036472][ T29] audit: type=1400 audit(1732727951.682:7053): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 cks suppressed [ 129.059462][ T29] audit: type=1400 audit(1732727951.682:7054): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 27 17:19:11 [ 129.083549][ T29] audit: type=1400 audit(1732727951.722:7055): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 128.862382][ T29] audit: type=1400 audit(1732727951.502:7046): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.1.138 dest=60304 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontex Nov 27 17:19:11 syzkaller kern.notice kernel: [ 128.893559][ T29] audit: type=1400 audit(1732727951.512:7047): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:11 syzkaller kern.notice kernel: [ 128.916861][ T29] audit: type=1400 audit(1732727951.562:7048): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:11 syzkaller kern.notice kernel: [ 128.939286][ T29] audit: type=1400 audit(1732727951.562:7049): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:11 syzkaller kern.notice kernel: [ 128.962591][ T29] audit: type=1400 audit(1732727951.582:7050): avc: denied { recv } for pid=6260 comm="kworker/u8:17" saddr=10.128.0.163 src=30030 daddr=10.128.1.138 dest=60304 netif=eth0 scontext=root:sysadm_r:sysadm_t Nov 27 17:19:11 syzkaller kern.notice kernel: [ 128.989509][ T29] audit: type=1400 audit(1732727951.602:7051): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:11 syzkaller daemon.err dhcpcd[3061]: ps_sendpsmmsg: Connection refused Nov 27 17:19:11 syzkaller daemon.err dhcpcd[3061]: ps_root_recvmsgcb: failed to send message to pid 6049: Connection refused Nov 27 17:19:11 syzkaller kern.notice kernel: [ 129.013011][ T29] audit: type=1400 audit(1732727951.652:7052): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:11 syzkaller kern.notice kernel: [ 129.036472][ T29] audit: type=1400 audit(1732727951.682:7053): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:11 syzkaller kern.notice kernel: [ 129.059462][ T29] audit: type=1400 audit(1732727951.682:7054): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:11 syzkaller kern.notice kernel: [ 129.083549][ T29] audit: type=1400 audit(1732727951.722:7055): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:12 syzkaller daemon.err dhcpcd[3061]: ps_sendpsmmsg: Connection refused Nov 27 17:19:12 syzkaller daemon.err dhcpcd[3061]: ps_root_recvmsgcb: failed to send message to pid 6107: Connection refused Nov 27 17:19:13 syzkaller daemon.err dhcpcd[3061]: ps_sendpsmmsg: Connection refused Nov 27 17:19:13 syzkaller daemon.err dhcpcd[3061]: ps_root_recvmsgcb: failed to send message to pid 6174: Connection refused Nov 27 17:19:15 syzkaller daemon.err dhcpcd[3061]: ps_sendpsmmsg: Connection refused Nov 27 17:19:15 syzkaller daemon.err dhcpcd[3061]: ps_root_recvmsgcb: failed to send message to pid 6246: Connection refused [ 141.704456][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 141.704471][ T29] audit: type=1400 audit(1732727964.352:7069): avc: denied { egress } for pid=3400 comm="kworker/1:3" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Nov 27 17:19:24 [ 141.734696][ T29] audit: type=1400 audit(1732727964.382:7070): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 141.758283][ T29] audit: type=1400 audit(1732727964.402:7071): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 141.781471][ T29] audit: type=1400 audit(1732727964.422:7072): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 41.704456][ T2[ 141.805291][ T29] audit: type=1400 audit(1732727964.452:7073): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 141.828153][ T29] audit: type=1400 audit(1732727964.452:7074): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 13 callba[ 141.851775][ T29] audit: type=1400 audit(1732727964.492:7075): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 cks suppressed [ 141.875019][ T29] audit: type=1400 audit(1732727964.492:7076): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 27 17:19:24 [ 141.898558][ T29] audit: type=1400 audit(1732727964.542:7077): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.n[ 141.922135][ T29] audit: type=1400 audit(1732727964.562:7078): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 otice kernel: [ 141.704471][ T29] audit: type=1400 audit(1732727964.352:7069): avc: denied { egress } for pid=3400 comm="kworker/1:3" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:ob Nov 27 17:19:24 syzkaller kern.notice kernel: [ 141.734696][ T29] audit: type=1400 audit(1732727964.382:7070): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:24 syzkaller kern.notice kernel: [ 141.758283][ T29] audit: type=1400 audit(1732727964.402:7071): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:24 syzkaller kern.notice kernel: [ 141.781471][ T29] audit: type=1400 audit(1732727964.422:7072): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:24 syzkaller kern.notice kernel: [ 141.805291][ T29] audit: type=1400 audit(1732727964.452:7073): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:24 syzkaller kern.notice kernel: [ 141.828153][ T29] audit: type=1400 audit(1732727964.452:7074): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:24 syzkaller kern.notice kernel: [ 141.851775][ T29] audit: type=1400 audit(1732727964.492:7075): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:24 syzkaller kern.notice kernel: [ 141.875019][ T29] audit: type=1400 audit(1732727964.492:7076): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:24 syzkaller kern.notice kernel: [ 141.898558][ T29] audit: type=1400 audit(1732727964.542:7077): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:24 syzkaller kern.notice kernel: [ 141.922135][ T29] audit: type=1400 audit(1732727964.562:7078): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 162.185224][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 162.185240][ T29] audit: type=1400 audit(1732727984.832:7083): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Nov 27 17:19:44 [ 162.215342][ T29] audit: type=1400 audit(1732727984.862:7084): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 162.238971][ T29] audit: type=1400 audit(1732727984.882:7085): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 162.262485][ T29] audit: type=1400 audit(1732727984.902:7086): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 62.185224][ T2[ 162.285292][ T29] audit: type=1400 audit(1732727984.902:7087): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 162.285347][ T29] audit: type=1400 audit(1732727984.902:7088): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 4 callbac[ 162.332607][ T29] audit: type=1400 audit(1732727984.972:7089): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed N[ 162.355392][ T29] audit: type=1400 audit(1732727984.972:7090): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ov 27 17:19:44 s[ 162.379240][ T29] audit: type=1400 audit(1732727985.022:7091): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 162.402477][ T29] audit: type=1400 audit(1732727985.042:7092): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 162.185240][ T29] audit: type=1400 audit(1732727984.832:7083): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Nov 27 17:19:44 syzkaller kern.notice kernel: [ 162.215342][ T29] audit: type=1400 audit(1732727984.862:7084): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:44 syzkaller kern.notice kernel: [ 162.238971][ T29] audit: type=1400 audit(1732727984.882:7085): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:44 syzkaller kern.notice kernel: [ 162.262485][ T29] audit: type=1400 audit(1732727984.902:7086): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:44 syzkaller kern.notice kernel: [ 162.285292][ T29] audit: type=1400 audit(1732727984.902:7087): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:44 syzkaller kern.notice kernel: [ 162.285347][ T29] audit: type=1400 audit(1732727984.902:7088): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:45 syzkaller kern.notice kernel: [ 162.332607][ T29] audit: type=1400 audit(1732727984.972:7089): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:45 syzkaller kern.notice kernel: [ 162.355392][ T29] audit: type=1400 audit(1732727984.972:7090): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:45 syzkaller kern.notice kernel: [ 162.379240][ T29] audit: type=1400 audit(1732727985.022:7091): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:45 syzkaller kern.notice kernel: [ 162.402477][ T29] audit: type=1400 audit(1732727985.042:7092): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 170.334479][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 170.334489][ T29] audit: type=1400 audit(1732727992.982:7095): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.1.138 dest=60304 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 170.366206][ T29] audit: type=1400 audit(1732727993.012:7096): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 27 17:19:53 [ 170.389140][ T29] audit: type=1400 audit(1732727993.032:7097): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 170.412267][ T29] audit: type=1400 audit(1732727993.052:7098): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 170.435064][ T29] audit: type=1400 audit(1732727993.052:7099): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 70.334479][ T2[ 170.458581][ T29] audit: type=1400 audit(1732727993.102:7100): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 170.482470][ T29] audit: type=1400 audit(1732727993.122:7101): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 2 callbacks suppressed N[ 170.507295][ T29] audit: type=1400 audit(1732727993.132:7102): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ov 27 17:19:53 s[ 170.529728][ T29] audit: type=1400 audit(1732727993.152:7103): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 170.553059][ T29] audit: type=1400 audit(1732727993.152:7104): avc: denied { recv } for pid=3398 comm="kworker/0:5" saddr=10.128.0.163 src=30030 daddr=10.128.1.138 dest=60304 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 tice kernel: [ 170.334489][ T29] audit: type=1400 audit(1732727992.982:7095): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.1.138 dest=60304 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontex Nov 27 17:19:53 syzkaller kern.notice kernel: [ 170.366206][ T29] audit: type=1400 audit(1732727993.012:7096): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:53 syzkaller kern.notice kernel: [ 170.389140][ T29] audit: type=1400 audit(1732727993.032:7097): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:53 syzkaller kern.notice kernel: [ 170.412267][ T29] audit: type=1400 audit(1732727993.052:7098): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:53 syzkaller kern.notice kernel: [ 170.435064][ T29] audit: type=1400 audit(1732727993.052:7099): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:53 syzkaller kern.notice kernel: [ 170.458581][ T29] audit: type=1400 audit(1732727993.102:7100): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:53 syzkaller kern.notice kernel: [ 170.482470][ T29] audit: type=1400 audit(1732727993.122:7101): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:53 syzkaller kern.notice kernel: [ 170.507295][ T29] audit: type=1400 audit(1732727993.132:7102): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:53 syzkaller kern.notice kernel: [ 170.529728][ T29] audit: type=1400 audit(1732727993.152:7103): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:19:53 syzkaller kern.notice kernel: [ 170.553059][ T29] audit: type=1400 audit(1732727993.152:7104): avc: denied { recv } for pid=3398 comm="kworker/0:5" saddr=10.128.0.163 src=30030 daddr=10.128.1.138 dest=60304 netif=eth0 scontext=root:sysadm_r:sysadm_t tc [ 184.584172][ T29] kauditd_printk_skb: 3 callbacks suppressed Nov 27 17:20:07 [ 184.584186][ T29] audit: type=1400 audit(1732728007.232:7108): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemon[ 184.613937][ T29] audit: type=1400 audit(1732728007.262:7109): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[3061[ 184.636935][ T29] audit: type=1400 audit(1732728007.262:7110): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_sendpsmmsg[ 184.636961][ T29] audit: type=1400 audit(1732728007.262:7111): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : Connection ref[ 184.684495][ T29] audit: type=1400 audit(1732728007.332:7112): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 used Nov 27 17:[ 184.706956][ T29] audit: type=1400 audit(1732728007.332:7113): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 20:07 syzkaller [ 184.730293][ T29] audit: type=1400 audit(1732728007.332:7114): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 daemon.err dhcpc[ 184.753681][ T29] audit: type=1400 audit(1732728007.372:7115): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d[3061]: ps_root[ 184.777626][ T29] audit: type=1400 audit(1732728007.422:7116): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _recvmsgcb: fail[ 184.800418][ T29] audit: type=1400 audit(1732728007.422:7117): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ed to send message to pid 9722: Connection refused Nov 27 17:20:07 syzkaller kern.warn kernel: [ 184.584172][ T29] kauditd_printk_skb: 3 callbacks suppressed Nov 27 17:20:07 syzkaller kern.notice kernel: [ 184.584186][ T29] audit: type=1400 audit(1732728007.232:7108): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:07 syzkaller kern.notice kernel: [ 184.613937][ T29] audit: type=1400 audit(1732728007.262:7109): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:07 syzkaller kern.notice kernel: [ 184.636935][ T29] audit: type=1400 audit(1732728007.262:7110): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:07 syzkaller kern.notice kernel: [ 184.636961][ T29] audit: type=1400 audit(1732728007.262:7111): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:07 syzkaller kern.notice kernel: [ 184.684495][ T29] audit: type=1400 audit(1732728007.332:7112): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:07 syzkaller kern.notice kernel: [ 184.706956][ T29] audit: type=1400 audit(1732728007.332:7113): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:07 syzkaller kern.notice kernel: [ 184.730293][ T29] audit: type=1400 audit(1732728007.332:7114): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:07 syzkaller kern.notice kernel: [ 184.753681][ T29] audit: type=1400 audit(1732728007.372:7115): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:07 syzkaller kern.notice kernel: [ 184.777626][ T29] audit: type=1400 audit(1732728007.422:7116): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:07 syzkaller kern.notice kernel: [ 184.800418][ T29] audit: type=1400 audit(1732728007.422:7117): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:07 syzkaller daemon.err dhcpcd[3061]: ps_sendpsmmsg: Connection refused Nov 27 17:20:07 syzkaller daemon.err dhcpcd[3061]: ps_root_recvmsgcb: failed to send message to pid 9720: Connection refused Nov 27 17:20:08 syzkaller daemon.err dhcpcd[3061]: ps_sendpsmmsg: Connection refused Nov 27 17:20:08 syzkaller daemon.err dhcpcd[3061]: ps_root_recvmsgcb: failed to send message to pid 9721: Connection refused Nov 27 17:20:09 syzkaller daemon.err dhcpcd[3061]: ps_sendpsmmsg: Connection refused Nov 27 17:20:09 syzkaller daemon.err dhcpcd[3061]: ps_root_recvmsgcb: failed to send message to pid 9723: Connection refused [ 192.904877][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 192.904893][ T29] audit: type=1400 audit(1732728015.552:7127): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 192.934382][ T29] audit: type=1400 audit(1732728015.552:7128): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Nov 27 17:20:15 [ 192.958177][ T29] audit: type=1400 audit(1732728015.582:7129): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 192.981558][ T29] audit: type=1400 audit(1732728015.602:7130): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 193.005073][ T29] audit: type=1400 audit(1732728015.652:7131): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 92.904877][ T2[ 193.028131][ T29] audit: type=1400 audit(1732728015.652:7132): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 193.052039][ T29] audit: type=1400 audit(1732728015.692:7133): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 9 callbac[ 193.074832][ T29] audit: type=1400 audit(1732728015.692:7134): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed N[ 193.098189][ T29] audit: type=1400 audit(1732728015.692:7135): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ov 27 17:20:15 s[ 193.121529][ T29] audit: type=1400 audit(1732728015.742:7136): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 192.904893][ T29] audit: type=1400 audit(1732728015.552:7127): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Nov 27 17:20:15 syzkaller kern.notice kernel: [ 192.934382][ T29] audit: type=1400 audit(1732728015.552:7128): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Nov 27 17:20:15 syzkaller kern.notice kernel: [ 192.958177][ T29] audit: type=1400 audit(1732728015.582:7129): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:15 syzkaller kern.notice kernel: [ 192.981558][ T29] audit: type=1400 audit(1732728015.602:7130): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:15 syzkaller kern.notice kernel: [ 193.005073][ T29] audit: type=1400 audit(1732728015.652:7131): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:15 syzkaller kern.notice kernel: [ 193.028131][ T29] audit: type=1400 audit(1732728015.652:7132): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:15 syzkaller kern.notice kernel: [ 193.052039][ T29] audit: type=1400 audit(1732728015.692:7133): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:15 syzkaller kern.notice kernel: [ 193.074832][ T29] audit: type=1400 audit(1732728015.692:7134): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:15 syzkaller kern.notice kernel: [ 193.098189][ T29] audit: type=1400 audit(1732728015.692:7135): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:15 syzkaller kern.notice kernel: [ 193.121529][ T29] audit: type=1400 audit(1732728015.742:7136): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:15 syzkaller daemon.err dhcpcd[9724]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 27 17:20:15 syzkaller daemon.err dhcpcd[9724]: ps_root_recvmsg: Invalid argument Nov 27 17:20:16 syzkaller daemon.err dhcpcd[9725]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 27 17:20:16 syzkaller daemon.err dhcpcd[9725]: ps_root_recvmsg: Invalid argument Nov 27 17:20:16 syzkaller daemon.err dhcpcd[9726]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 27 17:20:16 syzkaller daemon.err dhcpcd[9726]: ps_root_recvmsg: Invalid argument Nov 27 17:20:19 syzkaller daemon.err dhcpcd[9727]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 27 17:20:19 syzkaller daemon.err dhcpcd[9727]: ps_root_recvmsg: Invalid argument [ 225.621539][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 225.621549][ T29] audit: type=1400 audit(1732728048.262:7148): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.1.138 dest=60304 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 Nov 27 17:20:48 [ 225.652715][ T29] audit: type=1400 audit(1732728048.272:7149): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 225.676301][ T29] audit: type=1400 audit(1732728048.292:7150): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 2[ 225.699847][ T29] audit: type=1400 audit(1732728048.342:7151): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 25.621539][ T2[ 225.723284][ T29] audit: type=1400 audit(1732728048.372:7152): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 225.746308][ T29] audit: type=1400 audit(1732728048.372:7153): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 11 callba[ 225.770180][ T29] audit: type=1400 audit(1732728048.412:7154): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 cks suppressed [ 225.792989][ T29] audit: type=1400 audit(1732728048.412:7155): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 27 17:20:48 [ 225.816334][ T29] audit: type=1400 audit(1732728048.432:7156): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.n[ 225.840137][ T29] audit: type=1400 audit(1732728048.482:7157): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 otice kernel: [ 225.621549][ T29] audit: type=1400 audit(1732728048.262:7148): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.1.138 dest=60304 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontex Nov 27 17:20:48 syzkaller kern.notice kernel: [ 225.652715][ T29] audit: type=1400 audit(1732728048.272:7149): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:48 syzkaller kern.notice kernel: [ 225.676301][ T29] audit: type=1400 audit(1732728048.292:7150): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:48 syzkaller kern.notice kernel: [ 225.699847][ T29] audit: type=1400 audit(1732728048.342:7151): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:48 syzkaller kern.notice kernel: [ 225.723284][ T29] audit: type=1400 audit(1732728048.372:7152): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:48 syzkaller kern.notice kernel: [ 225.746308][ T29] audit: type=1400 audit(1732728048.372:7153): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:48 syzkaller kern.notice kernel: [ 225.770180][ T29] audit: type=1400 audit(1732728048.412:7154): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:48 syzkaller kern.notice kernel: [ 225.792989][ T29] audit: type=1400 audit(1732728048.412:7155): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:48 syzkaller kern.notice kernel: [ 225.816334][ T29] audit: type=1400 audit(1732728048.432:7156): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:20:48 syzkaller kern.notice kernel: [ 225.840137][ T29] audit: type=1400 audit(1732728048.482:7157): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:11 [ 248.709395][ T29] kauditd_printk_skb: 3 callbacks suppressed syzkaller daemon[ 248.709408][ T29] audit: type=1400 audit(1732728071.352:7161): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[9728[ 248.740023][ T29] audit: type=1400 audit(1732728071.352:7162): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_bpf_start_[ 248.740052][ T29] audit: type=1400 audit(1732728071.362:7163): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 bpf: bpf_open: I[ 248.786894][ T29] audit: type=1400 audit(1732728071.432:7164): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 nvalid argument[ 248.810467][ T29] audit: type=1400 audit(1732728071.432:7165): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 27 17:21:11[ 248.833367][ T29] audit: type=1400 audit(1732728071.452:7166): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemo[ 248.833450][ T29] audit: type=1400 audit(1732728071.452:7167): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 n.err dhcpcd[972[ 248.880285][ T29] audit: type=1400 audit(1732728071.522:7168): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 8]: ps_root_recv[ 248.903535][ T29] audit: type=1400 audit(1732728071.522:7169): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 msg: Invalid arg[ 248.927247][ T29] audit: type=1400 audit(1732728071.572:7170): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ument Nov 27 17:21:11 syzkaller kern.warn kernel: [ 248.709395][ T29] kauditd_printk_skb: 3 callbacks suppressed Nov 27 17:21:11 syzkaller kern.notice kernel: [ 248.709408][ T29] audit: type=1400 audit(1732728071.352:7161): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:11 syzkaller kern.notice kernel: [ 248.740023][ T29] audit: type=1400 audit(1732728071.352:7162): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:11 syzkaller kern.notice kernel: [ 248.740052][ T29] audit: type=1400 audit(1732728071.362:7163): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:11 syzkaller kern.notice kernel: [ 248.786894][ T29] audit: type=1400 audit(1732728071.432:7164): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:11 syzkaller kern.notice kernel: [ 248.810467][ T29] audit: type=1400 audit(1732728071.432:7165): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:11 syzkaller kern.notice kernel: [ 248.833367][ T29] audit: type=1400 audit(1732728071.452:7166): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:11 syzkaller kern.notice kernel: [ 248.833450][ T29] audit: type=1400 audit(1732728071.452:7167): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:11 syzkaller kern.notice kernel: [ 248.880285][ T29] audit: type=1400 audit(1732728071.522:7168): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:11 syzkaller kern.notice kernel: [ 248.903535][ T29] audit: type=1400 audit(1732728071.522:7169): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:11 syzkaller kern.notice kernel: [ 248.927247][ T29] audit: type=1400 audit(1732728071.572:7170): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:11 syzkaller daemon.err dhcpcd[9729]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 27 17:21:11 syzkaller daemon.err dhcpcd[9729]: ps_root_recvmsg: Invalid argument Nov 27 17:21:12 syzkaller daemon.err dhcpcd[9730]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 27 17:21:12 syzkaller daemon.err dhcpcd[9730]: ps_root_recvmsg: Invalid argument Nov 27 17:21:14 syzkaller daemon.err dhcpcd[9731]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 27 17:21:14 syzkaller daemon.err dhcpcd[9731]: ps_root_recvmsg: Invalid argument [ 256.364043][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 256.364055][ T29] audit: type=1400 audit(1732728079.012:7180): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 27 17:21:19 [ 256.392940][ T29] audit: type=1400 audit(1732728079.032:7181): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemon[ 256.415639][ T29] audit: type=1400 audit(1732728079.032:7182): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[3061[ 256.439016][ T29] audit: type=1400 audit(1732728079.032:7183): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_sendpsmmsg[ 256.462448][ T29] audit: type=1400 audit(1732728079.082:7184): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : Connection ref[ 256.485600][ T29] audit: type=1400 audit(1732728079.102:7185): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 used Nov 27 17:[ 256.510008][ T29] audit: type=1400 audit(1732728079.152:7186): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 21:19 syzkaller [ 256.532529][ T29] audit: type=1400 audit(1732728079.172:7187): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 daemon.err dhcpc[ 256.556051][ T29] audit: type=1400 audit(1732728079.202:7188): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d[3061]: ps_root[ 256.579049][ T29] audit: type=1400 audit(1732728079.202:7189): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _recvmsgcb: failed to send message to pid 9724: Connection refused Nov 27 17:21:19 syzkaller kern.warn kernel: [ 256.364043][ T29] kauditd_printk_skb: 9 callbacks suppressed Nov 27 17:21:19 syzkaller kern.notice kernel: [ 256.364055][ T29] audit: type=1400 audit(1732728079.012:7180): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:19 syzkaller kern.notice kernel: [ 256.392940][ T29] audit: type=1400 audit(1732728079.032:7181): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:19 syzkaller kern.notice kernel: [ 256.415639][ T29] audit: type=1400 audit(1732728079.032:7182): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:19 syzkaller kern.notice kernel: [ 256.439016][ T29] audit: type=1400 audit(1732728079.032:7183): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:19 syzkaller kern.notice kernel: [ 256.462448][ T29] audit: type=1400 audit(1732728079.082:7184): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:19 syzkaller kern.notice kernel: [ 256.485600][ T29] audit: type=1400 audit(1732728079.102:7185): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:19 syzkaller kern.notice kernel: [ 256.510008][ T29] audit: type=1400 audit(1732728079.152:7186): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:19 syzkaller kern.notice kernel: [ 256.532529][ T29] audit: type=1400 audit(1732728079.172:7187): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:19 syzkaller kern.notice kernel: [ 256.556051][ T29] audit: type=1400 audit(1732728079.202:7188): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:19 syzkaller kern.notice kernel: [ 256.579049][ T29] audit: type=1400 audit(1732728079.202:7189): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:20 syzkaller daemon.err dhcpcd[3061]: ps_sendpsmmsg: Connection refused Nov 27 17:21:20 syzkaller daemon.err dhcpcd[3061]: ps_root_recvmsgcb: failed to send message to pid 9725: Connection refused Nov 27 17:21:20 syzkaller daemon.err dhcpcd[3061]: ps_sendpsmmsg: Connection refused Nov 27 17:21:20 syzkaller daemon.err dhcpcd[3061]: ps_root_recvmsgcb: failed to send message to pid 9726: Connection refused Nov 27 17:21:22 syzkaller daemon.err dhcpcd[3061]: ps_sendpsmmsg: Connection refused Nov 27 17:21:22 syzkaller daemon.err dhcpcd[3061]: ps_root_recvmsgcb: failed to send message to pid 9727: Connection refused [ 295.306042][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 295.306057][ T29] audit: type=1400 audit(1732728117.952:7200): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Nov 27 17:21:57 [ 295.336328][ T29] audit: type=1400 audit(1732728117.982:7201): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 295.360255][ T29] audit: type=1400 audit(1732728118.002:7202): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 2[ 295.383479][ T29] audit: type=1400 audit(1732728118.022:7203): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 95.306042][ T2[ 295.406668][ T29] audit: type=1400 audit(1732728118.022:7204): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 295.430014][ T29] audit: type=1400 audit(1732728118.072:7205): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 10 callba[ 295.453085][ T29] audit: type=1400 audit(1732728118.072:7206): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 cks suppressed [ 295.476980][ T29] audit: type=1400 audit(1732728118.122:7207): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 27 17:21:57 [ 295.499734][ T29] audit: type=1400 audit(1732728118.122:7208): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.n[ 295.523831][ T29] audit: type=1400 audit(1732728118.172:7209): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 otice kernel: [ 295.306057][ T29] audit: type=1400 audit(1732728117.952:7200): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Nov 27 17:21:58 syzkaller kern.notice kernel: [ 295.336328][ T29] audit: type=1400 audit(1732728117.982:7201): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:58 syzkaller kern.notice kernel: [ 295.360255][ T29] audit: type=1400 audit(1732728118.002:7202): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:58 syzkaller kern.notice kernel: [ 295.383479][ T29] audit: type=1400 audit(1732728118.022:7203): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:58 syzkaller kern.notice kernel: [ 295.406668][ T29] audit: type=1400 audit(1732728118.022:7204): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:58 syzkaller kern.notice kernel: [ 295.430014][ T29] audit: type=1400 audit(1732728118.072:7205): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:58 syzkaller kern.notice kernel: [ 295.453085][ T29] audit: type=1400 audit(1732728118.072:7206): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:58 syzkaller kern.notice kernel: [ 295.476980][ T29] audit: type=1400 audit(1732728118.122:7207): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:58 syzkaller kern.notice kernel: [ 295.499734][ T29] audit: type=1400 audit(1732728118.122:7208): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:21:58 syzkaller kern.notice kernel: [ 295.523831][ T29] audit: type=1400 audit(1732728118.172:7209): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:15 [ 313.024129][ T29] kauditd_printk_skb: 2 callbacks suppressed syzkaller daemon[ 313.024343][ T29] audit: type=1400 audit(1732728135.672:7212): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[3061[ 313.055303][ T29] audit: type=1400 audit(1732728135.672:7213): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_sendpsmmsg[ 313.078866][ T29] audit: type=1400 audit(1732728135.722:7214): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : Connection ref[ 313.101782][ T29] audit: type=1400 audit(1732728135.722:7215): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 used Nov 27 17:[ 313.125074][ T29] audit: type=1400 audit(1732728135.742:7216): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 22:15 syzkaller [ 313.148401][ T29] audit: type=1400 audit(1732728135.772:7217): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 daemon.err dhcpc[ 313.171720][ T29] audit: type=1400 audit(1732728135.792:7218): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d[3061]: ps_root[ 313.195494][ T29] audit: type=1400 audit(1732728135.842:7219): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _recvmsgcb: fail[ 313.218456][ T29] audit: type=1400 audit(1732728135.842:7220): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ed to send messa[ 313.241750][ T29] audit: type=1400 audit(1732728135.842:7221): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ge to pid 9730: Connection refused Nov 27 17:22:15 syzkaller kern.warn kernel: [ 313.024129][ T29] kauditd_printk_skb: 2 callbacks suppressed Nov 27 17:22:15 syzkaller kern.notice kernel: [ 313.024343][ T29] audit: type=1400 audit(1732728135.672:7212): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:15 syzkaller kern.notice kernel: [ 313.055303][ T29] audit: type=1400 audit(1732728135.672:7213): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:15 syzkaller kern.notice kernel: [ 313.078866][ T29] audit: type=1400 audit(1732728135.722:7214): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:15 syzkaller kern.notice kernel: [ 313.101782][ T29] audit: type=1400 audit(1732728135.722:7215): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:15 syzkaller kern.notice kernel: [ 313.125074][ T29] audit: type=1400 audit(1732728135.742:7216): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:15 syzkaller kern.notice kernel: [ 313.148401][ T29] audit: type=1400 audit(1732728135.772:7217): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:15 syzkaller kern.notice kernel: [ 313.171720][ T29] audit: type=1400 audit(1732728135.792:7218): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:15 syzkaller kern.notice kernel: [ 313.195494][ T29] audit: type=1400 audit(1732728135.842:7219): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:15 syzkaller kern.notice kernel: [ 313.218456][ T29] audit: type=1400 audit(1732728135.842:7220): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:15 syzkaller kern.notice kernel: [ 313.241750][ T29] audit: type=1400 audit(1732728135.842:7221): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:16 syzkaller daemon.err dhcpcd[3061]: ps_sendpsmmsg: Connection refused Nov 27 17:22:16 syzkaller daemon.err dhcpcd[3061]: ps_root_recvmsgcb: failed to send message to pid 9728: Connection refused Nov 27 17:22:16 syzkaller daemon.err dhcpcd[3061]: ps_sendpsmmsg: Connection refused Nov 27 17:22:16 syzkaller daemon.err dhcpcd[3061]: ps_root_recvmsgcb: failed to send message to pid 9729: Connection refused Nov 27 17:22:18 syzkaller daemon.err dhcpcd[3061]: ps_sendpsmmsg: Connection refused Nov 27 17:22:18 syzkaller daemon.err dhcpcd[3061]: ps_root_recvmsgcb: failed to send message to pid 9731: Connection refused Nov 27 17:22:22 [ 319.870068][ T29] kauditd_printk_skb: 10 callbacks suppressed syzkaller daemon[ 319.870080][ T29] audit: type=1400 audit(1732728142.512:7232): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[9732[ 319.900712][ T29] audit: type=1400 audit(1732728142.512:7233): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_bpf_start_[ 319.900781][ T29] audit: type=1400 audit(1732728142.522:7234): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 bpf: bpf_open: I[ 319.948247][ T29] audit: type=1400 audit(1732728142.592:7235): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 nvalid argument[ 319.970718][ T29] audit: type=1400 audit(1732728142.592:7236): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 27 17:22:22[ 319.994109][ T29] audit: type=1400 audit(1732728142.592:7237): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemo[ 319.994133][ T29] audit: type=1400 audit(1732728142.612:7238): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 n.err dhcpcd[973[ 320.041655][ T29] audit: type=1400 audit(1732728142.682:7239): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 2]: ps_root_recv[ 320.064172][ T29] audit: type=1400 audit(1732728142.682:7240): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 msg: Invalid arg[ 320.087459][ T29] audit: type=1400 audit(1732728142.682:7241): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ument Nov 27 17:22:22 syzkaller kern.warn kernel: [ 319.870068][ T29] kauditd_printk_skb: 10 callbacks suppressed Nov 27 17:22:22 syzkaller kern.notice kernel: [ 319.870080][ T29] audit: type=1400 audit(1732728142.512:7232): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:22 syzkaller kern.notice kernel: [ 319.900712][ T29] audit: type=1400 audit(1732728142.512:7233): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:22 syzkaller kern.notice kernel: [ 319.900781][ T29] audit: type=1400 audit(1732728142.522:7234): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:22 syzkaller kern.notice kernel: [ 319.948247][ T29] audit: type=1400 audit(1732728142.592:7235): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:22 syzkaller kern.notice kernel: [ 319.970718][ T29] audit: type=1400 audit(1732728142.592:7236): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:22 syzkaller kern.notice kernel: [ 319.994109][ T29] audit: type=1400 audit(1732728142.592:7237): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:22 syzkaller kern.notice kernel: [ 319.994133][ T29] audit: type=1400 audit(1732728142.612:7238): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:22 syzkaller kern.notice kernel: [ 320.041655][ T29] audit: type=1400 audit(1732728142.682:7239): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:22 syzkaller kern.notice kernel: [ 320.064172][ T29] audit: type=1400 audit(1732728142.682:7240): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:22 syzkaller kern.notice kernel: [ 320.087459][ T29] audit: type=1400 audit(1732728142.682:7241): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:23 syzkaller daemon.err dhcpcd[9733]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 27 17:22:23 syzkaller daemon.err dhcpcd[9733]: ps_root_recvmsg: Invalid argument Nov 27 17:22:24 syzkaller daemon.err dhcpcd[9734]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 27 17:22:24 syzkaller daemon.err dhcpcd[9734]: ps_root_recvmsg: Invalid argument Nov 27 17:22:27 syzkaller daemon.err dhcpcd[9735]: ps_bpf_start_bpf: bpf_open: Invalid argument Nov 27 17:22:27 syzkaller daemon.err dhcpcd[9735]: ps_root_recvmsg: Invalid argument [ 325.099777][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 325.099787][ T29] audit: type=1400 audit(1732728147.742:7257): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=48896 daddr=10.128.1.138 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 325.130918][ T29] audit: type=1400 audit(1732728147.752:7258): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 27 17:22:27 [ 325.153531][ T29] audit: type=1400 audit(1732728147.802:7259): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 325.176300][ T29] audit: type=1400 audit(1732728147.802:7260): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 3[ 325.199880][ T29] audit: type=1400 audit(1732728147.842:7261): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 25.099777][ T2[ 325.223372][ T29] audit: type=1400 audit(1732728147.872:7262): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 325.246406][ T29] audit: type=1400 audit(1732728147.872:7263): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 15 callba[ 325.270574][ T29] audit: type=1400 audit(1732728147.912:7264): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 cks suppressed [ 325.293251][ T29] audit: type=1400 audit(1732728147.912:7265): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 27 17:22:27 [ 325.316905][ T29] audit: type=1400 audit(1732728147.962:7266): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 325.099787][ T29] audit: type=1400 audit(1732728147.742:7257): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=48896 daddr=10.128.1.138 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext Nov 27 17:22:27 syzkaller kern.notice kernel: [ 325.130918][ T29] audit: type=1400 audit(1732728147.752:7258): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:27 syzkaller kern.notice kernel: [ 325.153531][ T29] audit: type=1400 audit(1732728147.802:7259): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:27 syzkaller kern.notice kernel: [ 325.176300][ T29] audit: type=1400 audit(1732728147.802:7260): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:27 syzkaller kern.notice kernel: [ 325.199880][ T29] audit: type=1400 audit(1732728147.842:7261): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:27 syzkaller kern.notice kernel: [ 325.223372][ T29] audit: type=1400 audit(1732728147.872:7262): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:27 syzkaller kern.notice kernel: [ 325.246406][ T29] audit: type=1400 audit(1732728147.872:7263): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:27 syzkaller kern.notice kernel: [ 325.270574][ T29] audit: type=1400 audit(1732728147.912:7264): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:27 syzkaller kern.notice kernel: [ 325.293251][ T29] audit: type=1400 audit(1732728147.912:7265): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:27 syzkaller kern.notice kernel: [ 325.316905][ T29] audit: type=1400 audit(1732728147.962:7266): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 326.893629][ C0] ================================================================== [ 326.901725][ C0] BUG: KCSAN: data-race in __tmigr_cpu_deactivate / tmigr_handle_remote [ 326.910049][ C0] [ 326.912351][ C0] write to 0xffff888237d205dc of 1 bytes by task 0 on cpu 1: [ 326.919696][ C0] __tmigr_cpu_deactivate+0xa1/0x410 [ 326.924966][ C0] tmigr_cpu_deactivate+0x66/0x180 [ 326.930058][ C0] __get_next_timer_interrupt+0x137/0x530 [ 326.935766][ C0] timer_base_try_to_set_idle+0x54/0x60 [ 326.941294][ C0] tick_nohz_idle_stop_tick+0x15b/0x650 [ 326.946823][ C0] do_idle+0x175/0x230 [ 326.950870][ C0] cpu_startup_entry+0x25/0x30 [ 326.955610][ C0] start_secondary+0x96/0xa0 [ 326.960201][ C0] common_startup_64+0x12c/0x137 [ 326.965114][ C0] [ 326.967416][ C0] read to 0xffff888237d205dc of 1 bytes by interrupt on cpu 0: [ 326.974937][ C0] tmigr_handle_remote+0x26e/0x940 [ 326.980034][ C0] run_timer_softirq+0x5f/0x70 [ 326.984781][ C0] handle_softirqs+0xbf/0x280 [ 326.989434][ C0] __irq_exit_rcu+0x3a/0xc0 [ 326.993913][ C0] sysvec_apic_timer_interrupt+0x73/0x80 [ 326.999527][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 327.005492][ C0] acpi_safe_halt+0x21/0x30 [ 327.009974][ C0] acpi_idle_do_entry+0x1d/0x30 [ 327.014801][ C0] acpi_idle_enter+0x96/0xb0 [ 327.019369][ C0] cpuidle_enter_state+0xc5/0x260 [ 327.024378][ C0] cpuidle_enter+0x40/0x70 [ 327.028775][ C0] do_idle+0x192/0x230 [ 327.032817][ C0] cpu_startup_entry+0x25/0x30 [ 327.037559][ C0] rest_init+0xef/0xf0 [ 327.041604][ C0] start_kernel+0x586/0x5e0 [ 327.046091][ C0] x86_64_start_reservations+0x2a/0x30 [ 327.051527][ C0] x86_64_start_kernel+0x9a/0xa0 [ 327.056440][ C0] common_startup_64+0x12c/0x137 [ 327.061357][ C0] [ 327.063657][ C0] value changed: 0x01 -> 0x00 [ 327.068306][ C0] [ 327.070606][ C0] Reported by Kernel Concurrency Sanitizer on: [ 327.076738][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-syzkaller-10296-gaaf20f870da0 #0 [ 327.086692][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 327.096730][ C0] ================================================================== Nov 27 17:22:29 syzkaller kern.err kernel: [ 326.893629][ C0] ================================================================== Nov 27 17:22:29 syzkaller kern.err kernel: [ 326.901725][ C0] BUG: KCSAN: data-race in __tmigr_cpu_deactivate / tmigr_handle_remote Nov 27 17:22:29 syzkaller kern.err kernel: [ 326.910049][ C0] Nov 27 17:22:29 syzkaller kern.err kernel: [ 326.912351][ C0] write to 0xffff888237d205dc of 1 bytes by task 0 on cpu 1: Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.919696][ C0] __tmigr_cpu_deactivate+0xa1/0x410 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.924966][ C0] tmigr_cpu_deactivate+0x66/0x180 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.930058][ C0] __get_next_timer_interrupt+0x137/0x530 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.935766][ C0] timer_base_try_to_set_idle+0x54/0x60 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.941294][ C0] tick_nohz_idle_stop_tick+0x15b/0x650 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.946823][ C0] do_idle+0x175/0x230 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.950870][ C0] cpu_startup_entry+0x25/0x30 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.955610][ C0] start_secondary+0x96/0xa0 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.960201][ C0] common_startup_64+0x12c/0x137 Nov 27 17:22:29 syzkaller kern.err kernel: [ 326.965114][ C0] Nov 27 17:22:29 syzkaller kern.err kernel: [ 326.967416][ C0] read to 0xffff888237d205dc of 1 bytes by interrupt on cpu 0: Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.974937][ C0] tmigr_handle_remote+0x26e/0x940 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.980034][ C0] run_timer_softirq+0x5f/0x70 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.984781][ C0] handle_softirqs+0xbf/0x280 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.989434][ C0] __irq_exit_rcu+0x3a/0xc0 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.993913][ C0] sysvec_apic_timer_interrupt+0x73/0x80 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 326.999527][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 327.005492][ C0] acpi_safe_halt+0x21/0x30 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 327.009974][ C0] acpi_idle_do_entry+0x1d/0x30 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 327.014801][ C0] acpi_idle_enter+0x96/0xb0 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 327.019369][ C0] cpuidle_enter_state+0xc5/0x260 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 327.024378][ C0] cpuidle_enter+0x40/0x70 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 327.028775][ C0] do_idle+0x192/0x230 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 327.032817][ C0] cpu_startup_entry+0x25/0x30 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 327.037559][ C0] rest_init+0xef/0xf0 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 327.041604][ C0] start_kernel+0x586/0x5e0 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 327.046091][ C0] x86_64_start_reservations+0x2a/0x30 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 327.051527][ C0] x86_64_start_kernel+0x9a/0xa0 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 327.056440][ C0] common_startup_64+0x12c/0x137 Nov 27 17:22:29 syzkaller kern.err kernel: [ 327.061357][ C0] Nov 27 17:22:29 syzkaller kern.err kernel: [ 327.063657][ C0] value changed: 0x01 -> 0x00 Nov 27 17:22:29 syzkaller kern.err kernel: [ 327.068306][ C0] Nov 27 17:22:29 syzkaller kern.err kernel: [ 327.070606][ C0] Reported by Kernel Concurrency Sanitizer on: Nov 27 17:22:29 syzkaller kern.warn kernel: [ 327.076738][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-syzkaller-10296-gaaf20f870da0 #0 Nov 27 17:22:29 syzkaller kern.warn kernel: [ 327.086692][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 27 17:22:29 syzkaller kern.err kernel: [ 327.096730][ C0] ================================================================== [ 335.951634][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 335.951645][ T29] audit: type=1400 audit(1732728158.592:7310): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=48896 daddr=10.128.1.138 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 335.982743][ T29] audit: type=1400 audit(1732728158.602:7311): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 27 17:22:38 [ 336.005158][ T29] audit: type=1400 audit(1732728158.652:7312): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 336.028330][ T29] audit: type=1400 audit(1732728158.652:7313): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 3[ 336.051944][ T29] audit: type=1400 audit(1732728158.692:7314): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 35.951634][ T2[ 336.075375][ T29] audit: type=1400 audit(1732728158.722:7315): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 336.098482][ T29] audit: type=1400 audit(1732728158.742:7316): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 43 callba[ 336.121893][ T29] audit: type=1400 audit(1732728158.762:7317): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 cks suppressed [ 336.145246][ T29] audit: type=1400 audit(1732728158.792:7318): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 27 17:22:38 [ 336.168327][ T29] audit: type=1400 audit(1732728158.792:7319): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 335.951645][ T29] audit: type=1400 audit(1732728158.592:7310): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=48896 daddr=10.128.1.138 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext Nov 27 17:22:38 syzkaller kern.notice kernel: [ 335.982743][ T29] audit: type=1400 audit(1732728158.602:7311): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:38 syzkaller kern.notice kernel: [ 336.005158][ T29] audit: type=1400 audit(1732728158.652:7312): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:38 syzkaller kern.notice kernel: [ 336.028330][ T29] audit: type=1400 audit(1732728158.652:7313): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:38 syzkaller kern.notice kernel: [ 336.051944][ T29] audit: type=1400 audit(1732728158.692:7314): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:38 syzkaller kern.notice kernel: [ 336.075375][ T29] audit: type=1400 audit(1732728158.722:7315): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:38 syzkaller kern.notice kernel: [ 336.098482][ T29] audit: type=1400 audit(1732728158.742:7316): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:38 syzkaller kern.notice kernel: [ 336.121893][ T29] audit: type=1400 audit(1732728158.762:7317): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:38 syzkaller kern.notice kernel: [ 336.145246][ T29] audit: type=1400 audit(1732728158.792:7318): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Nov 27 17:22:38 syzkaller kern.notice kernel: [ 336.168327][ T29] audit: type=1400 audit(1732728158.792:7319): avc: denied { read } for pid=3005 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=