last executing test programs: 7m57.16488392s ago: executing program 1 (id=5276): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) r3 = shmget(0x0, 0x1000, 0xa04, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_RMID(r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x900a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x10001}, 0x6080, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x4, &(0x7f00000001c0)=ANY=[], 0x88, 0x2c6, &(0x7f0000000680)="$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") r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r4, &(0x7f0000000480)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r5, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) r6 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r6, &(0x7f00000003c0)=ANY=[@ANYBLOB="00070000420091"], 0xfe33) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) recvmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000004700)=""/4097, 0x1001}, {&(0x7f0000002500)=""/4137, 0x1029}, {&(0x7f00000005c0)=""/172, 0xac}, {&(0x7f0000000440)=""/171, 0xab}], 0x4}, 0x0) r7 = socket(0x11, 0x2, 0x0) setsockopt(r7, 0x107, 0x1, &(0x7f00000001c0)="110000000200060000071a80010061cc", 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x8, 0x1, 0x2}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000000c0)={'tunl0\x00', 0x0}) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="4000000010001fff000000000000000000060000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32=r9, @ANYBLOB="2637f1ff622bc3169c24ec72773931c2cfe3a82ebc4f010057f872948180ffa08a4d2d1961b3d2275ccdb665ecf4"], 0x40}}, 0x0) 7m56.688339323s ago: executing program 1 (id=5280): bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x8) sched_setscheduler(r0, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) unshare(0x8000000) semtimedop(0x0, &(0x7f0000000280)=[{0x0, 0x1000, 0x1000}], 0x1, 0x0) unshare(0x2c040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x2010, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r4 = socket(0x15, 0x5, 0x0) getsockopt(r4, 0x200000000114, 0x271b, &(0x7f0000000580)=""/102389, &(0x7f0000000100)=0x18ff5) write(r3, &(0x7f0000000740)="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", 0x5e7) openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001d40)=ANY=[@ANYBLOB="12000000290000000400000002"], 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r5, &(0x7f0000000040)}, 0x20) r6 = fsopen(&(0x7f00000001c0)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) fsmount(r6, 0x0, 0x0) 7m55.784142578s ago: executing program 1 (id=5282): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe82, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r2}, 0x10) socket$packet(0x11, 0xa, 0x300) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r4 = io_uring_setup(0xbb8, &(0x7f000000c480)={0x0, 0xe8e2, 0x200, 0x1, 0x2d6}) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/179, 0xb3}], 0x1) r5 = io_uring_setup(0x739c, &(0x7f0000000600)={0x0, 0x653f, 0x0, 0x0, 0x28e, 0x0, r4}) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f00000001c0)={&(0x7f0000000300)=""/177, 0xb1, 0xa72, 0x270}) io_uring_register$IORING_REGISTER_FILES(r5, 0x1e, &(0x7f0000000000)=[r4], 0x1) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x680}}, 0x40) r6 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(r6, 0x0, 0x20) symlinkat(&(0x7f0000000000)='.\x00', r7, &(0x7f0000000140)='./file0\x00') openat(r7, &(0x7f00000000c0)='./file0\x00', 0x515a02, 0x52abe154ad664fa4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r7}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000008000000180103200a1109fb297628dfdf66ea1b8f000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000d76b099a9a496cf0fa6980fa002d000000189068250020756c2500000000002020207b1af8ff00"/134], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r8}, 0x10) 7m55.731333048s ago: executing program 1 (id=5285): syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4600, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x4db1, 0x2}, 0x0, 0x0) syz_clone(0x8d002240, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x5, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0xd, 0x0, 0x0, 0x0, 0x10}, @jmp={0x5, 0x0, 0x3}]}, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0xfff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f0000000600)=""/38, 0x26}, {&(0x7f0000000b40)=""/4096, 0x1000}, {0x0}, {&(0x7f00000006c0)=""/227, 0xe3}, {&(0x7f00000008c0)=""/227, 0xe3}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/46, 0x2e}], 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x8, &(0x7f0000000140)={0x1d, 0x5, 0xfefffff9}) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 7m55.571895769s ago: executing program 1 (id=5286): r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) fallocate(r0, 0x0, 0x0, 0x2000402) lseek(r0, 0x0, 0x3) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000000)={[{@errors_remount}, {@grpquota}]}, 0x4, 0x4f2, &(0x7f0000000a40)="$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") bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000580)={0x8000}, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4b, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x64}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x3, 0x6, 0x401, 0x0, 0x0, {0x7, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="160000000000000004000000010000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000100000000000002"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0100000007000000070000000900000000000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000d970e4e8c2cfc90f87c12851190800"/41], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) fsopen(&(0x7f0000000380)='efs\x00', 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r5}, 0x3d) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000540)='kfree\x00', r6, 0x0, 0x4}, 0x18) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000000)=@req3={0x1000, 0x3a, 0x1000, 0x3a}, 0x1c) 7m54.732006235s ago: executing program 1 (id=5291): syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4600, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x4db1, 0x2}, 0x0, 0x0) syz_clone(0x8d002240, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x5, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0xd, 0x0, 0x0, 0x0, 0x10}, @jmp={0x5, 0x0, 0x3}]}, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0xfff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f0000000600)=""/38, 0x26}, {&(0x7f0000000b40)=""/4096, 0x1000}, {0x0}, {&(0x7f00000006c0)=""/227, 0xe3}, {&(0x7f00000008c0)=""/227, 0xe3}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/46, 0x2e}], 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x8, &(0x7f0000000140)={0x1d, 0x5, 0xfefffff9}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_usb_connect(0x2, 0x0, 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x111900, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r3, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) r4 = open(&(0x7f0000000000)='./bus\x00', 0x1050c1, 0x170) fgetxattr(r4, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r4, 0x11, 0x1, &(0x7f0000000400)=""/181, &(0x7f0000000580)=0xb5) syz_genetlink_get_family_id$gtp(&(0x7f0000000180), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x24044000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@map, 0xffffffffffffffff, 0x13, 0x4018}, 0x20) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000880)={0x2, 0x7, 0x0, 0x5, 0x5, 0x0, 0x70bd2d, 0x25dfdbff, [@sadb_key={0x3, 0x8, 0x68, 0x0, "090ebfec9e2e3f6284fffc3a53"}]}, 0x28}}, 0x4040014) pwritev2(r0, &(0x7f00000001c0)=[{&(0x7f0000000300)='\ttL', 0x3}], 0x1, 0xe7b, 0x0, 0x8) 7m54.731815335s ago: executing program 32 (id=5291): syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4600, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x4db1, 0x2}, 0x0, 0x0) syz_clone(0x8d002240, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x5, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0xd, 0x0, 0x0, 0x0, 0x10}, @jmp={0x5, 0x0, 0x3}]}, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0xfff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f0000000600)=""/38, 0x26}, {&(0x7f0000000b40)=""/4096, 0x1000}, {0x0}, {&(0x7f00000006c0)=""/227, 0xe3}, {&(0x7f00000008c0)=""/227, 0xe3}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/46, 0x2e}], 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x8, &(0x7f0000000140)={0x1d, 0x5, 0xfefffff9}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_usb_connect(0x2, 0x0, 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x111900, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r3, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) r4 = open(&(0x7f0000000000)='./bus\x00', 0x1050c1, 0x170) fgetxattr(r4, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r4, 0x11, 0x1, &(0x7f0000000400)=""/181, &(0x7f0000000580)=0xb5) syz_genetlink_get_family_id$gtp(&(0x7f0000000180), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x24044000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@map, 0xffffffffffffffff, 0x13, 0x4018}, 0x20) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000880)={0x2, 0x7, 0x0, 0x5, 0x5, 0x0, 0x70bd2d, 0x25dfdbff, [@sadb_key={0x3, 0x8, 0x68, 0x0, "090ebfec9e2e3f6284fffc3a53"}]}, 0x28}}, 0x4040014) pwritev2(r0, &(0x7f00000001c0)=[{&(0x7f0000000300)='\ttL', 0x3}], 0x1, 0xe7b, 0x0, 0x8) 7m54.164890528s ago: executing program 3 (id=5295): syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4600, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x4db1, 0x2}, 0x0, 0x0) syz_clone(0x8d002240, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x5, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0xd, 0x0, 0x0, 0x0, 0x10}, @jmp={0x5, 0x0, 0x3}]}, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0xfff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f0000000600)=""/38, 0x26}, {&(0x7f0000000b40)=""/4096, 0x1000}, {0x0}, {&(0x7f00000006c0)=""/227, 0xe3}, {&(0x7f00000008c0)=""/227, 0xe3}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/46, 0x2e}], 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x8, &(0x7f0000000140)={0x1d, 0x5, 0xfefffff9}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_usb_connect(0x2, 0x0, 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x111900, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r3, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) r4 = open(&(0x7f0000000000)='./bus\x00', 0x1050c1, 0x170) fgetxattr(r4, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r4, 0x11, 0x1, &(0x7f0000000400)=""/181, &(0x7f0000000580)=0xb5) syz_genetlink_get_family_id$gtp(&(0x7f0000000180), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x24044000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@map, 0xffffffffffffffff, 0x13, 0x4018}, 0x20) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000880)={0x2, 0x7, 0x0, 0x5, 0x5, 0x0, 0x70bd2d, 0x25dfdbff, [@sadb_key={0x3, 0x8, 0x68, 0x0, "090ebfec9e2e3f6284fffc3a53"}]}, 0x28}}, 0x4040014) pwritev2(r0, &(0x7f00000001c0)=[{&(0x7f0000000300)='\ttL', 0x3}], 0x1, 0xe7b, 0x0, 0x8) 7m51.183915707s ago: executing program 3 (id=5315): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) lsm_get_self_attr(0x65, 0x0, &(0x7f00000000c0)=0xffffffffffffff26, 0x0) ioctl$RTC_WIE_ON(r2, 0x700f) r4 = socket(0x10, 0x803, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x1}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000c40)=@newtfilter={0x94, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfb, {0x0, 0x0, 0x0, r6, {0xf}, {}, {0x7, 0x4}}, [@filter_kind_options=@f_bpf={{0x8}, {0x68, 0x2, [@TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_OPS={{0x6, 0x4, 0x5}, {0x2c, 0x5, [{0xfffd, 0xa, 0x4, 0x2}, {0x101, 0x2, 0x3, 0x5}, {0x9, 0x4, 0x52, 0x8}, {0x8, 0x1, 0x14, 0x8}, {0x3aff, 0xff, 0x3f, 0x1}]}}, @TCA_BPF_FD={0x8}, @TCA_BPF_OPS={{0x6, 0x4, 0x2}, {0x14, 0x5, [{0xff, 0x3, 0x0, 0x2}, {0xffff, 0x3, 0x10, 0x6}]}}]}}]}, 0x94}}, 0x24040084) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) lsm_get_self_attr(0x64, &(0x7f0000000040), &(0x7f0000000000)=0x101, 0x0) 7m50.193408313s ago: executing program 3 (id=5322): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a84000000060a0b0400000000000000000200000058000480540001800a0001006d617463680000004400028008000240000000002c0003005c8f022482395afa4d23edfcbe6d55b57cb15e63c15c46395916e2b388abc3d6ce2316334e8278ad0900010069707673000000000900010073797a300000"], 0xac}, 0x1, 0x0, 0x0, 0x2000094}, 0x4000800) 7m50.149917993s ago: executing program 3 (id=5325): syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4600, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x4db1, 0x2}, 0x0, 0x0) syz_clone(0x8d002240, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x5, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0xd, 0x0, 0x0, 0x0, 0x10}, @jmp={0x5, 0x0, 0x3}]}, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 7m49.986324854s ago: executing program 3 (id=5326): r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) fallocate(r0, 0x0, 0x0, 0x2000402) lseek(r0, 0x0, 0x3) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000000)={[{@errors_remount}, {@grpquota}]}, 0x4, 0x4f2, &(0x7f0000000a40)="$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") bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000580)={0x8000}, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4b, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="640000000206010200000000000000000000000015000300686173683a69702c706f72742c6e6574000000000900020073797a320000000005000400000000001400078008001240000000000500150022000000050005000200000005000100"], 0x64}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x3, 0x6, 0x401, 0x0, 0x0, {0x7, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000100000000000002"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0100000007000000070000000900000000000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000d970e4e8c2cfc90f87c12851190800"/41], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) fsopen(&(0x7f0000000380)='efs\x00', 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r5}, 0x3d) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000540)='kfree\x00', r6, 0x0, 0x4}, 0x18) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f0000000000)=@req3={0x1000, 0x3a, 0x1000, 0x3a}, 0x1c) 7m48.931016391s ago: executing program 3 (id=5331): socket$key(0xf, 0x3, 0x2) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYRES16=r0], 0x48) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000001480)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='kfree\x00', r2, 0x0, 0x4804}, 0x18) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xd, 0x3}, 0x12, 0x6, 0x7, 0x0, 0x4, 0x5}, 0x0, 0x2000000000000000, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='cpu>00\t&&') 7m48.865611761s ago: executing program 33 (id=5331): socket$key(0xf, 0x3, 0x2) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYRES16=r0], 0x48) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000001480)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='kfree\x00', r2, 0x0, 0x4804}, 0x18) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xd, 0x3}, 0x12, 0x6, 0x7, 0x0, 0x4, 0x5}, 0x0, 0x2000000000000000, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='cpu>00\t&&') 3m56.389577344s ago: executing program 4 (id=7737): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x14) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x1214c2, 0x10) statx(r2, 0x0, 0x48e0cdf8471afff4, 0x54663aafb2d54055, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000f1ffff000000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x2, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1000000e}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$netlink(0x10, 0x3, 0x10) r6 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r6, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r6, 0x1, 0x8, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r8, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) sendmsg$DEVLINK_CMD_RATE_NEW(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000500)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010003000040fbdbdf28250000000e0001006e657464657673696d09000002006e6574393d93d87026c081909c5fcc412b4e52395083b80acf878345fa0000"], 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)={0x38, 0x1403, 0x1, 0x70bd2d, 0x0, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) 3m56.341464984s ago: executing program 4 (id=7740): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) process_vm_writev(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 3m56.307829874s ago: executing program 4 (id=7743): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0xa, 0x5, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r0, 0x29, 0x4c, &(0x7f0000000000)=0x2000000, 0x4) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b10000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = fspick(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000800)='./cgroup\x00', &(0x7f0000000840), 0x0, 0x0, 0x2) r3 = memfd_create(&(0x7f0000000cc0)='\x103q}2[\xe0\x9a\xee\xaf\x03\x97\x9et\v\"|Ma\x86\xe7\xc0\x14\x9f\xb9h\xb1\x96\xe7=I\x860S6\xb5\xa8\xc2\x95Je%\xfeG\'\b\x00\xd5\xfd\xa9\r\xac7V\xf2\x93A\x94k\xcd\t\x00\x90\xbe\xd6\x05\xb6&\xd0\x9daA\xc5\x9c_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2Oc\xc0c\agB!\xb0\xb8n\x01\x9bT\x95\x10\x86\xe8$\x7f\r[\xf9\x0e1v\xb1\n\x88\v\x95uy\xb5:`\x8b\nC\x18A;\xaa%\xaf\xc7\xa3\xac\xa2D\xb5\xe2\xe1\xdc(\xfd\x05\x9fB\x84O\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\xa0\x17\xe3\xac\xe9\xc9\xa7\x8a\x1b\x03\"&\xac\xcap>\xccZ\x01\xbc\x18\xc1\xb9\xe9\v\x8b\x9c\xb4Q\xd4\x96EV<>\x99\xca\xb3\xe0\xc4tL\xed\xf5W\x9f#\xcf\x8a\x84\xed\x9f/\xd4\xbb\xea;-Dp\xd8\xf8\xd0F\x90\xf8\x92Ip6\xf4\x16\xe8\x14\xe0\x96!\x92-F\xe2\x14D\x91\xa8b\x04\xdd\x1d\a\xdc\xe0\x18\x85{\x80Q\xf6k\x96\xfaQ\x9fW\vO\xf0\xe4O\\\xceS\xe2_\x16\x05\x049d\x06#\x88\xc3\xdf\x85O\x1c\xc3\xad?r\xd7\x0e\x00\xd7\x83\xb0\x88\x9c\xf6Y-F\x98\xdd\x9c~\xfd\x95\xc3\xb6lC\xaa\"Y\xa2K\xecz\x84:*\xf5Y\xd1\x9b1\xbd\x9b\x15\xd4\xec\x02o\x01&\xaa\x90w\xc4\xc7\x8en\xb5\x1ag\xab&?\xbe\xcb\xe8v\xa8\xe0\xa4\x81sW\xacf\x149\xd2}\xef\x03Ga\x9a$4\x8c\xa5!p\x83\x05\x96%\x02%\xabj\n\b\xc8NC\x91}&y\xd3\xe1\xeep\'\xc5\xab\x19GsX5\x8c\n\x9fh\xee;4\xb1%V\xe0\xa9\x8e\xf30:\xd8\x18N~G\x139\xcaf2\x02F1\xc6\x82\x00E\xae\x9d\x17\x871N:\xb4\xea \x8e\xdelP\x83\x1f\'\xe2\xd6\xc0\xc3\xfc\xc9677u\xf3RUP@o>\xee\xb8\xa3\t\x02\xb7\\,\xebK\xed\x1b\xc9e\xb3\x16\xce\x9bI\xdb\xfa\x82\x85\t\x9bg\xd0s\xe2\f{\x8cp~;\xf8\x96\xf2\x91\x06\xd7\x80t\xfc\xf8\xd2\x12N\x1cB7^\xfd4\xae\xb0V\\w\b!\xae\x1baTv\xc0z\x19\xc5\xc8w\xba\x97N\x9a`\x8f\xfc\x9ee\xf9\x00\x1cQA\x14]\r\xd4\"\xc2\x12GD\xdb{\x17fNo\xb3\x1d\xbb\xcaI\x05\xff\x8d\xf4_\x1a\vqA\xb7\x0ed<\x98\xee\xb8\x19\xec\x9f\xee\xe1_\xacG\x8b\xa3\xc3\x13\x80\x0f\xf4I\xdeAwG\xbdkno\xa2\b\x126\x97\x9b\xf9|P\xd94\v\x15\xcb\xc0\x9d\x11\xf3\x18\xae!2\x1b\x12\xa9\xc8~\xb7S\x94\xb5\xc7;\xa90D>s\xe9\xa4N\xf8\xdb\xab\xa0\x94~\xa1]b\xa4\xe5\xe2e\x1c\x8b\xd2\xc7Md\x93\x02\xd8\xb0,\xeb\x03\xaa\v\xed\x9bR\x8a\x80\xc2\x1f\x17ej\x973wv\x83a\xe06\x96\xde\xbc%UH\xf8S\xf1\xa1g\x02\xc4\xc3\xa4\xa8\x96\t\xfex\x02Y\x8e\xae\xf5m\xca\xa0i\x80O\x11\xac\xb7$\xdb\xbc\xb0\xcb\xacqU\xb5*\x00\x00\x00\x00\x00\x00\x00\f\xda\xf8oV\x89\xd3\x1f\x99+\xe5\x04\x00\x00\x00\x00\x00\x00\x00\xf2\xcc\xd3\x94\xca\xd4\x00\x00\x00\x00\x00\x00\x00\x00\x00~A9\xf6IBu2L\x9e\xa2\xbb\xa9s\xab\x90\x06\xc6!p\x9e?~\xf9\xe6\xae*\v\xa3\xd9\xcfJ\t}\xd4:\xe4\xbe\x1c\x10\n\xc6hPO\xeagxKN\'z]*\x93\xf7\b\x91\xd0\xff\xd9\xc6a\xb5q\x9c\xa1Go\xd58\x93\xe0,\x9f\xe4\xa9\xd9A\x9e\x95e\x98\xd0V\x9d\xed\x97\xf1\xc5\xce\xf5\x90!D\x9a\xd8\x10\xbbx\r8\xff\x8bNUK\xebA\xe5\x92f\xc4\xd1\xa8\x15\xbf\xb5iW\xdb.kbf*\x89\xf0\xecq m-~\xbbf?\xec=\xd2\xe2\x1e\xca\xc5kz\x8e9\xd6\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa3d5V\x80\x1a\x90\x10\xe3\xdf%\xfdz\xf7\x9aE\xe6\x9b\x00'/993, 0x3) r4 = socket$inet(0x2, 0x1, 0x0) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x1, 0x3, 0x2, 0xf, "c7cde812b360b4c0a229ccbdf58306941c1138dafbe4213794b7f4c73a3eb79f2e616e1e11a2e92e03e5e20acfc20f4e800cd9e9b3a1fd3acd9e491fde1f2a", 0x17}, 0x60) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080200000e"], 0x50) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_opts(r4, 0x0, 0x4, &(0x7f0000000000)="89", 0x1) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0x6, 0x1000000}) fcntl$addseals(r3, 0x409, 0xb) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x0, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r5, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) r6 = socket$netlink(0x10, 0x3, 0x0) writev(r6, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) listen(0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$inet(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x800) 3m55.32396697s ago: executing program 4 (id=7771): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000480)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x1c5008, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x500, 0x40) r1 = open_tree(r0, &(0x7f0000000300)='\x00', 0x89901) move_mount(r1, &(0x7f0000000040)='./file0/../file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x172) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/mdstat\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000004200)=0x0) io_submit(r4, 0x29, &(0x7f0000004540)=[&(0x7f0000004280)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], 0x0, 0x402, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) shutdown(r7, 0x1) sendmmsg$inet6(r2, &(0x7f00000060c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000040)="18", 0x1}], 0x1}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0xd, @ipv4={'\x00', '\xff\xff', @loopback}, 0xe}, 0x1c, &(0x7f00000001c0)=[{&(0x7f00000006c0)="e6d1d43fd15e899d5068393475eca3200bb42756a7c40597973718b1dc1470b055f43757f22f06b39ba2dcc4a6cf4a5407a4e793d127a9b0fc027556aef02a0b2870346c6650c67820208cfa7894b0c3423976cbef62ba47647ded98725579a2fc9553b75833a56f10b26860076d3c979ddd5181387e4e90fcaec5ce2f0e63c9e316b5e6e6564896c684edb6a9a3c7f18d7003e2674c754d8294f79bbf65964c34253cad6fac9ffb638bcb39529e5e9063400ef10ef859047706e1c5f372b1c60af8f4b1a633af1bfa001a253cf1ab7d9f88026072c088b44662df746ceed9338bc646eafcd9caae9e95f1170110de421eccb03ebf", 0xf5}], 0x1}}], 0x2, 0xc) shutdown(r2, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e22, 0x1, @loopback, 0x3}}, [0x7, 0x1, 0x4, 0x81, 0x3d, 0x40, 0x9, 0x5, 0x6227, 0x8, 0x8, 0xd610, 0x8, 0xd9f, 0x200]}, &(0x7f0000000140)=0x100) 3m55.151952901s ago: executing program 4 (id=7776): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000380)=0x20000, 0x4) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/5, 0x204000, 0x1000}, 0x20) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket$phonet(0x23, 0x2, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r2, @ANYRES32=r2, @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x43, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r3}, 0x9) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) syz_open_dev$usbfs(&(0x7f0000000000), 0x20000007d, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r7, 0x541b, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000040)=0x4000, 0x4) bind$xdp(r0, &(0x7f00000002c0)={0x2c, 0x4, r6, 0x30, r0}, 0x10) 3m54.943660703s ago: executing program 4 (id=7782): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='percpu_free_percpu\x00', r0, 0x0, 0x401}, 0x18) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0xff05, 0x0, 0x0, {0x0, 0x0, 0x4a00}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @multicast}]}, 0x48}}, 0x0) 3m54.933253432s ago: executing program 34 (id=7782): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='percpu_free_percpu\x00', r0, 0x0, 0x401}, 0x18) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0xff05, 0x0, 0x0, {0x0, 0x0, 0x4a00}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}, @IFLA_ADDRESS={0xa, 0x1, @multicast}]}, 0x48}}, 0x0) 3.466272239s ago: executing program 0 (id=11959): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/pm_wakeup_irq', 0x0, 0x1a0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000300), 0x81, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000280)='./file1\x00', 0x810, &(0x7f0000000140)=ANY=[@ANYRES8=0x0, @ANYRES32], 0x1, 0x256, &(0x7f0000000bc0)="$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") openat(0xffffffffffffff9c, 0x0, 0x105142, 0x2c) r1 = creat(0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x42, 0x4) fallocate(r2, 0x1, 0x13, 0xfffe) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x18) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x36e, &(0x7f00000007c0)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105142, 0x2c) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x100000b, 0x2013, r4, 0x0) 3.432796349s ago: executing program 0 (id=11961): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000004000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, 0x0, 0x0) 3.3760343s ago: executing program 0 (id=11962): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x2) getsockname$packet(r1, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000200), &(0x7f0000000240)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00', r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, 0x0, &(0x7f0000000240)=r5}, 0x20) openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x2}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) mremap(&(0x7f0000000000/0x9000)=nil, 0x200003, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) pipe(&(0x7f00000001c0)) 2.718823113s ago: executing program 0 (id=11969): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f00000001c0), r2) sendmsg$NFC_CMD_FW_DOWNLOAD(r2, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f0000070000"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) unshare(0x62040200) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) sendmsg$NFT_BATCH(r8, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000780)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 1.988134778s ago: executing program 5 (id=11976): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) sendmsg$nl_route_sched(r0, 0x0, 0x4000c00) 1.987865058s ago: executing program 5 (id=11977): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008000000182300", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='kfree\x00', r1, 0x0, 0x4ab}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x288, 0x1b8, 0xe8, 0xffffffff, 0xffffffff, 0xe8, 0x288, 0xe8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 1.954727808s ago: executing program 5 (id=11978): syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4600, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x4db1, 0x2}, 0x0, 0x0) syz_clone(0x8d002240, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x5, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0xd, 0x0, 0x0, 0x0, 0x10}, @jmp={0x5, 0x0, 0x3}]}, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0xfff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f0000000600)=""/38, 0x26}, {&(0x7f0000000b40)=""/4096, 0x1000}, {0x0}, {&(0x7f00000006c0)=""/227, 0xe3}, {&(0x7f00000008c0)=""/227, 0xe3}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/46, 0x2e}], 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x8, &(0x7f0000000140)={0x1d, 0x5, 0xfefffff9}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_usb_connect(0x2, 0x0, 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x111900, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r3, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) r4 = open(&(0x7f0000000000)='./bus\x00', 0x1050c1, 0x170) fgetxattr(r4, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r4, 0x11, 0x1, &(0x7f0000000400)=""/181, &(0x7f0000000580)=0xb5) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000180), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r5, 0x200, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x24044000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@map, 0xffffffffffffffff, 0x13, 0x4018}, 0x20) socket$key(0xf, 0x3, 0x2) pwritev2(r0, &(0x7f00000001c0)=[{&(0x7f0000000300)='\ttL', 0x3}], 0x1, 0xe7b, 0x0, 0x8) 1.814599419s ago: executing program 0 (id=11980): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x34}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE2(r4, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADDDEF(r5, &(0x7f0000000500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, r6, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_MGMT_A_DOMAIN={0x16, 0x1, 'fib6_table_lookup\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @multicast1}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @empty}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x20040041) r7 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x18, 0x1402, 0x1, 0x70bd2d, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x4008004}, 0x404c880) r8 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000600), r5) sendmsg$NLBL_UNLABEL_C_ACCEPT(r5, &(0x7f0000000780)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000740)={&(0x7f0000000680)={0xa8, r8, 0x910, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @rand_addr=' \x01\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:apt_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x22}}, @NLBL_UNLABEL_A_SECCTX={0x2d, 0x7, 'system_u:object_r:devicekit_var_lib_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0xa8}, 0x1, 0x0, 0x0, 0x40}, 0x40000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x8031, r4, 0x1000) syz_open_dev$hidraw(&(0x7f00000004c0), 0x0, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002a00000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80001}, 0x94) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r10, 0x20, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x2, 0x2, &(0x7f0000000000)=@raw=[@btf_id={0x18, 0x6, 0x3, 0x0, 0x3}], 0x0, 0x7, 0x0, 0x0, 0x41100, 0x11, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r11, r9, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) r12 = socket$inet6(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/467], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffe1}, 0x48) setsockopt$inet6_mreq(r12, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) 1.806381949s ago: executing program 2 (id=11981): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x2) getsockname$packet(r1, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000200), &(0x7f0000000240)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00', r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, 0x0, &(0x7f0000000240)=r5}, 0x20) openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x2}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) mremap(&(0x7f0000000000/0x9000)=nil, 0x200003, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) pipe(&(0x7f00000001c0)) 1.466514701s ago: executing program 6 (id=11984): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) lsm_set_self_attr(0x68, &(0x7f0000000600)={0x67, 0x5, 0x20}, 0x20, 0x0) 1.404610662s ago: executing program 6 (id=11985): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="160000000000000000000000008000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="265c798d49ec851f5ddfea74ef82439cf015756db10c65bd4852f98305229ced10780a2c5b5cb6", @ANYBLOB], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf15d198a9005cb36, 0xf, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018110000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00'}, 0x10) close(0xffffffffffffffff) execve(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000002580)="89000000120081ae08060cdc030000007f03e3f7000000026ee2ffca1b1f1400000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec001210000140090c0c00bdad446b9bbc7a46e39882a5dcdf12741308", 0x66}, {&(0x7f0000002700)}], 0x2, 0x0, 0x0, 0xff0f0000}, 0x0) syz_read_part_table(0x5a1, &(0x7f00000005c0)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x7fff}, 0x18) r4 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000001080)={0x38, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'bond0\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4040000}, 0x100) 1.375069272s ago: executing program 6 (id=11986): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f00000001c0), r2) sendmsg$NFC_CMD_FW_DOWNLOAD(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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", @ANYRES32=r1, @ANYBLOB, @ANYRES32=r1, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f0000070000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) unshare(0x62040200) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000780)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) sendmsg$NFT_BATCH(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2c000000060a0b040000000000000000020000000900010073797a30000000000900020073797a3200000000140000001100", @ANYRES8], 0x54}, 0x1, 0x0, 0x0, 0x24068045}, 0x0) 1.353002952s ago: executing program 5 (id=11987): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r2, &(0x7f00000000c0), 0x0, 0x0, 0x0) 1.351492841s ago: executing program 2 (id=11988): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008000000182300", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='kfree\x00', r1, 0x0, 0x4ab}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x288, 0x1b8, 0xe8, 0xffffffff, 0xffffffff, 0xe8, 0x288, 0xe8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 1.286533162s ago: executing program 2 (id=11989): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1}, 0x18) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000100)='./file0\x00') chmod(&(0x7f0000000180)='./file0\x00', 0x23f) 1.283692062s ago: executing program 5 (id=11990): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f00000001c0), r2) sendmsg$NFC_CMD_FW_DOWNLOAD(r2, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f0000070000"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) unshare(0x62040200) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) sendmsg$NFT_BATCH(r8, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000780)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 1.132852613s ago: executing program 2 (id=11991): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd9b, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r3 = mq_open(&(0x7f0000000480)='!sel\x00\x00\x00\x10\x00\x00\x00\x00\xd7\\P\xc1\xde.O\xcb]0y\x00\x00\x00\x00\x00\x00\x00\x00', 0x6e93ebbbcc0884f2, 0x196, &(0x7f0000000240)={0x1, 0x1, 0x5b, 0x7}) mq_timedsend(r3, 0x0, 0x0, 0x0, 0x0) r4 = openat$ppp(0xffffffffffffff9c, 0x0, 0x40082, 0x0) ioctl$PPPIOCNEWUNIT(r4, 0xc004743e, 0x0) setresgid(0xee01, 0xffffffffffffffff, 0xffffffffffffffff) mq_timedsend(r3, 0x0, 0x0, 0x9, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth1_macvtap\x00'}) socket$netlink(0x10, 0x3, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x113040, 0x0) mq_timedreceive(r3, &(0x7f0000000880)=""/202, 0xca, 0x100000000000000, 0x0) socket$inet6(0xa, 0x3, 0x87) socket$kcm(0xa, 0x922000000003, 0x11) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) syz_emit_ethernet(0x81, &(0x7f0000000200)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x73, 0x0, 0x0, 0x1, 0x6, 0x0, @rand_addr=0x64010101, @local, {[@rr={0x7, 0x3, 0xca}]}}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}, {"e1aed3cd1647e1b264ce6146843c426ca01ec62131403a9e65a2370adf98e0ce25275ef7ca7a8b9a8aa8825ba733df5702ac24b5643a5294275069cfff000db77c0df4fdf504b9"}}}}}}, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r6, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x81}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xa0}]}, 0x2c}}, 0x50) mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX]) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r7 = getpid() sched_setscheduler(r7, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) syz_genetlink_get_family_id$nfc(0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) 1.102184703s ago: executing program 0 (id=11993): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/pm_wakeup_irq', 0x0, 0x1a0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000300), 0x81, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000280)='./file1\x00', 0x810, &(0x7f0000000140)=ANY=[@ANYRES8=0x0, @ANYRES32], 0x1, 0x256, &(0x7f0000000bc0)="$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") openat(0xffffffffffffff9c, 0x0, 0x105142, 0x2c) r1 = creat(0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x42, 0x4) fallocate(r2, 0x1, 0x13, 0xfffe) socket$nl_audit(0x10, 0x3, 0x9) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x18) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x36e, &(0x7f00000007c0)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105142, 0x2c) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x100000b, 0x2013, r4, 0x0) 875.429524ms ago: executing program 7 (id=11996): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1600000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="02000000000000", @ANYRES32=0x0, @ANYBLOB="265c798d49ec851f5ddfea74ef82439cf015756db10c65bd4852f98305229ced10780a2c5b5cb65329a2f4921e4c222dfadbf0ff14f3041e5013b9ec35e7858d068785c0364d291ca323a8b8a66cd916f7fead9b663c673e2ca3b64ecdd7496d1a170d9eba44379829a54edfeab0218b0af9f21093fa0e8a0b1bc2e76ec2b6e5450f510596e81714f8fd418eae7cf8b2a4c2c55c2e3bbd09ae32d2d06353a05d14b8b4f1", @ANYBLOB="00000000000000000000000000000000000000000000110000000000"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf15d198a9005cb36, 0xf, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018110000", @ANYRES32=r1, @ANYBLOB="00000000007bf300b702000014000000b70300e6ffffffff8400000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000000)='./file0\x00', 0x40000022) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000191bda0000200001000000000280000000000003"], 0x69) close(r3) execve(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000002580)="89000000120081ae08060cdc030000007f03e3f7000000026ee2ffca1b1f1400000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec001210000140090c0c00bdad446b9bbc7a46e39882a5dcdf12741308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27f", 0x88}, {&(0x7f0000002700)="d6f4de1bc9418695029a22", 0xb}], 0x2, 0x0, 0x0, 0xff0f0000}, 0x0) syz_read_part_table(0x5a1, &(0x7f00000005c0)="$eJzs0r9Lc1cYB/CTCy+h0JfIywsOdhAMTlFBBx2SQSSGLEbEioOz4KCD4OAgkejsj39A8ReIizh1ySimIApxkoziXFBcMqW03g61kxQV289nuZzzPPc+9/A9gU8tCr+1Wq1ECKGVfP3bP5/kR4ud48MTkyEkwkwIIf/Tj39WEnHHX189i9eleF1M/lDfuxx5PGm76rqppQ+iuF6NQlgNIczfHab+7dn47zvNXaTW1hcLG8u5udvCyv3AbE++YzO/sD24ny1PtWen44tVjd5nfro+dHTdKj3sfO39Uqs3+3+N+zKJt5nPx3qZ/+73SqPSHOs+XurLfGucl7fi3J/+mf8b3UgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOD/6jR3kVpbXyxsLOfmbgsr9wOzPfmOzfzC9uB+tjzVnp2Onvuq0fvMT9eHjq5bpYedr71favVm/y9xXybxNvP5WC/z3/1eaVSaY93HS32Zb43z8lac+9Pf809+zN8CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJ9BfrTYOT48MRlCIsyEEEaitsM/9lvJ53oi7juLn6V4v5jsr+9djjyetF113dTSB+PxfjUKYTWEMH93mHr3w/BqvwcAAP//X3yHGg==") bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7dc470d00281f324, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7, 0x0, 0x7fff}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r5}, &(0x7f0000000200), &(0x7f0000000240)=r6}, 0x20) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000300)={'syzkaller0\x00', 0x0}) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f0000000100)={r9, 0x2, 0x6}, 0x10) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f0000000000)={r9, 0x1, 0x6, @multicast}, 0x10) r10 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r10, 0x89a1, &(0x7f0000000040)={'syzkaller0\x00'}) r11 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r11, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000001080)={0x38, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'bond0\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4040000}, 0x100) 685.514976ms ago: executing program 2 (id=11997): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x18) r2 = semget$private(0x0, 0x20000000102, 0x0) semop(r2, &(0x7f0000000240)=[{0x3, 0xff7f, 0x1800}], 0x1) 656.341916ms ago: executing program 2 (id=11998): syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$eJzs3T9oJFUcB/DvzO565m6RUxtB/AMiooFwdoJNbBQCEoKIoEJExEZJhJhgl1jZWGitksomiJ3RUtIEG0WwipoiNoIGC4OFFiu7k0hMVqNu3Dkynw9MZibz3vzesPN9u83sBmisq0mmk7SSTCbpJCmON7i7Wq4e7q5PbM8nvd4TPxWDdtV+5ajflSRrSR5KslUWeamdrGw+s/fLzmP3vbncuff9zacnxnqRh/b3dh8/eG/2jY9mHlz54qsfZotMp/un6zp/xZD/tYvklv+j2HWiaNc9Av6Judc+/Lqf+1uT3DPIfydlqhfvraUbtjp54N2/6vv2j1/ePs6xAuev1+v03wPXekDjlEm6KcqpJNV2WU5NVZ/hv2ldLl9eXHp18sXF5YUX6p6pgPPSTXYf/eTSx1dO5P/7VpV/4OLq5//JuY1v+9sHrbpHA4zFHdWqn//J51bvj/xD48g/NJf8Q3PJPzSX/ENzyT80l/zDBdb5+8PyD80l/9Bc8g/NdTz/AECz9C7V/QQyUJe65x8AAAAAAAAAAAAAAAAAAOC09Ynt+aNlXDU/eyfZfyRJe1j91uD3iJMbB38v/1z0m/2hqLqN5Nm7RjzBiD6o+enrm76rt/7nd9Zbf3UhWXs9ybV2+/T9Vxzef//dzWcc7zw/YoF/qTix//BT461/0m8b9daf2Uk+7c8/14bNP2VuG6yHzz/ds79i+Uyv/DriCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABib3wMAAP//+kBtTA==") r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4600, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x4db1, 0x2}, 0x0, 0x0) syz_clone(0x8d002240, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x5, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0xd, 0x0, 0x0, 0x0, 0x10}, @jmp={0x5, 0x0, 0x3}]}, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0xfff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f0000000600)=""/38, 0x26}, {&(0x7f0000000b40)=""/4096, 0x1000}, {0x0}, {&(0x7f00000006c0)=""/227, 0xe3}, {&(0x7f00000008c0)=""/227, 0xe3}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/46, 0x2e}], 0x8) rt_tgsigqueueinfo(0x0, 0x0, 0x8, &(0x7f0000000140)={0x1d, 0x5, 0xfefffff9}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_usb_connect(0x2, 0x0, 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x111900, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r3, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) r4 = open(&(0x7f0000000000)='./bus\x00', 0x1050c1, 0x170) fgetxattr(r4, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r4, 0x11, 0x1, &(0x7f0000000400)=""/181, &(0x7f0000000580)=0xb5) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000180), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r5, 0x200, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x24044000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@map, 0xffffffffffffffff, 0x13, 0x4018}, 0x20) socket$key(0xf, 0x3, 0x2) pwritev2(r0, &(0x7f00000001c0)=[{&(0x7f0000000300)='\ttL', 0x3}], 0x1, 0xe7b, 0x0, 0x8) 474.654197ms ago: executing program 7 (id=11999): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f0000000900)='kfree\x00', r0}, 0x18) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0x0, 0x1}, {0xffff, 0xffff}, {0xffff, 0x9}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0xe0000000, 0x5, 0xb7, 0x2, 0x1, 0x1, 0x4, 0x3, 0x1}}}}]}, 0x58}}, 0x4000) r5 = socket(0x10, 0x803, 0x0) r6 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newtfilter={0x44, 0x2c, 0xd2b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0xb, 0x3}, {}, {0x1, 0x9}}, [@filter_kind_options=@f_u32={{0x8}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x7, 0x6, 0x0, 0x9, 0x401, 0x1000, 0x8a0, 0xd5}}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x81}, 0x800) 472.540227ms ago: executing program 6 (id=12000): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r2, &(0x7f00000000c0), 0x0, 0x0, 0x0) 428.803477ms ago: executing program 6 (id=12001): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1}, 0x18) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000100)='./file0\x00') chmod(&(0x7f0000000180)='./file0\x00', 0x23f) 428.483757ms ago: executing program 6 (id=12002): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f0000070000"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) unshare(0x62040200) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002580)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000080a01010000000000000000020000000900010073797a300000000038000000060a17d50000000000000000020000000900020073797a32000000000900010073797a30000000000c0003400000000000000002"], 0xcdc}}, 0x0) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="010023010000340200000200000008000100", @ANYRES32=r1], 0x1c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e841cca555077e3a159110193dd2ff1fa7c3205bfedbe9d8f3bd23cd78a07e32fe0231368b2264f9c504b2f1f65515b2e1a38d522be18bd10a48b043ccc42673d06d7535f7866925d86751dfced1fd8accae669e173a659c1cfd6587d47578f4c35235138d5521f9453559c35da860e8efbcbfb42c30d294a55e1c46680bee88956f2b3599f455c7a3a49a01010000009f2f0517e4ca0e1803a20000000013d4e21b3336f1ae0796f23526ec0fd97f7325eac34c4dfafe7cc03b0864009d2e7d7ff6ff72ba8972b122b09789d99b3d0524f39d5ae913b2d22eb2c09244ba5dbe9180950f76f7049db5cb19d7962fed44e00f39ed8c13a11fa798de504e2865cd81f2b77fdd76c677f812d249c8130b018d4300000020000000db3947c85c3a9027ce9e856fa8b7fb05000000000000593d60abc9b3e67d127e56f3d3759dcfeb820634fd4d419efaefc74305b2bea2000600000051fcf5d62205561b6efaad206335a309f7b9e01446a6285f4665a7fe3cda2349f8bf400100000000000000f435f28fbeda75cf971f54a9698cf3270f420ee83f2d9babe7b922401639ce3c4ff0850a8e078374909413f3fbd3ced3285252dc81a46ef7ce29484dc6b6adfd7a4db730fc594609654d97836f171b766ffd7526847a6bfda9c648e8aa5c558aa6d463ec9d840f3914909187b6b0776952be71b0417d33d3ab25493418ba0fbacf768e07c1a939d31f606085b9e3efc93b0f58d5ec37494d9d10d76e603129e9a726579ac7d672cacd581b7ca77b3610b7403930fd42051d4b7443e5b49c000000000000007d6173050027791c9c1e04ad3711a66da2254a6f911b1469c62a6e1e3f9c1715c009a58e6eadac8f61b45853673df72dc813f7454ae22d79ac48034282f03040889500000000179dcf66d93907cedd49e0c5752f755849953957143a0335d2f62acbf18b251ce63b29fe177745448ccc925770fac12cf9e291200df6bb669d5a57dd74df817ef2f8698f710c359afe73947afebdf5536e4db8b0231d0cbc798766ec60586f14b44775bc9d250e4515cb83275d3b495fa90000e69a68b47ac4595463e1442d88e0606a060000cc914fae896ab129ccdf8792a8435972c8391d132a2fcbd40e865d62cc7c4200000000000000000000000000000800002a77fbbccfdb1ab3d8434905f09726b8145ea99c7640faab578dc98a6134df0a10a54ce7e7ddbb709a27d977d1f91ab9ee940700009594c9a50961b7fcc56d82584dc8254df7c411fa61353a6897c4f3b9f6f2ab47adb29aefecce96c94f360e129c9f2af569c794b68b2ead404bcdd4aa9cb6a128e1ad45fd4030e1e69adf4986b7860f3122d59c079f0f9a1732f691590f45512aec4ed2413f66cac7dd022301741c576dea82005b166d6c3b9ed0c297ac197a92188a618745e78dca0b3c62f1601243089d9c687563382b0b88a7d80fd7bf7fae8a690f52db1464d29b1b926414cd35705c89662c585e32c881d917b74f027674dbc017499ba15a2e2900000000000000000000000000007b593ecbdd162fee9f239a3c615b3e9a3fb0af254bdd247a5a5abdbc0123c950eec0f1800b295be71418dd65de15e11beef9630499c70fce74135a7c7c8e818b79b85ff65d59d89492d7a663d3f25651e252ab49d358eac853ffe182ee37a5db085a072647719cb8604ba2e0b80af3f1867bd8fb6afca671437e0a5a9d5a088436739262d894986882ec0fb419a377ef47f4920a5de6d8de0d3090b4cb6b773e825442d351f980eed0d997a4d98a51220c41b145e2186546c646128a3e69f52fcad83a026def90b9eb55f4a0a2251bbae428c6c017b5a47f1580831a7ce232857e6aa9e777e99da1a3ad03fdc93fa7ed96228deac5e3bce983971041297a6ba18783a2edc7e3901cc891035872c61e7ea375b0902be0c5cc7fdef968ba1ca17ce5e11f2f384cd28c1194f56d3cf074e8ba4e60e84dc2f352c3cd170581aee0c93ca8ceff84cda40325d340759e79e5c4bcec227e37f7ec2193c78877fb319ec1f2d4dcf1d46a15cde1d6cecce6ecdb0c0a3413394d51341a7b3606ad8c29b6dbf6be3265b528c3208de35161bfe19678df43a45b314e5a0f8754cfaf4f9d3fdf9c8f7b7c296bf2e632d25ba8ee6369b362a8e4c9dff176d482d32249c93680a04f6464f184acfd0376662fee9e1031e569248db9bc724cdd97976a4d7c5c5172d1383fa1e442f68a14b747a9f2597bf115dd0111fe8ba3584a43176f33bd39a408f8648b19839bba9cc47624ea19e46dbbdf0faf591bcdc8613828a0c5a40c04ae34bbf4a0e27828b0c7cb9d7a7455db030425a4bd69cf6dcb4b1d066f8ef4ea1c710e05819df82d5cc94ace6b41c2de37a2eaf24f24b3d9a7dd4d197d51407be3e90000000000000000dbc0b0d6e11ccb71437ebea7ad01d5b93a7a0561e4a1b3fa1aa9c75f3aaec4ace1b6201a3e007b657be62df59133b4d8f0f145d9fc954cc7792077268bf0977e2a699722ce3dbb97248b8a8a771dd0f7d9c97e6587524a44fd6d49330ccbc39ca277b84f7f0a39759ef0b42388bd69fe341a925e8cdc5d7b2d6ddb7331a081bd0672bf4d02255de095a179e51bf5492d4e89c3cbad59db725c0dd7e35cbd9887175286a37d7621a361eb830cc5b842b11b5d040ccceb254d6a0c9c43718d0816bb2465928e236101b8cd46b5ef9cb930378a9249cbb41bcde9bb78d71c512153d2f1d765b56d2e5ef3e3d34975787646630051074c9706747fda873ccfdb394fc269c8cfadc0a52c3402f392a38052f859ab5600000000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffdb, 0x0, 0x0, 0x10, 0x1}, 0x70) 381.440517ms ago: executing program 5 (id=12003): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$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") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1}, 0x18) open_tree(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x0) r2 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffc) fremovexattr(r0, &(0x7f0000000080)=@random={'btrfs.', '&]$:#^!-\xcd-\x00'}) sendfile(r2, r2, 0x0, 0x800000009) 208.346079ms ago: executing program 7 (id=12004): openat$dir(0xffffffffffffff9c, 0x0, 0x140, 0x82) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) lsetxattr$trusted_overlay_nlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0, 0x2) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000004000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kfree\x00', r1}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xe7fd}, 0x100002, 0x3, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x64, 0x1, [@m_tunnel_key={0x60, 0x1, 0x0, 0x0, {{0xf}, {0x30, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @loopback}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @broadcast}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x400c000}, 0x0) openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000001d00), 0x1, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000400)='kfree\x00', r7, 0x0, 0x115}, 0x18) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000009060106000000ffff000000000000000900020073797a310000000005000100070000001c0007800c00018008000140ffffffff0c000280080001407f"], 0x44}, 0x1, 0x0, 0x0, 0x10040047}, 0x240008c4) 170.699809ms ago: executing program 7 (id=12005): mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000700000e0000000000000000000a20000000000a03000000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a30000000000800054000000002600000000c0a01080000000000000000010000000900020073797a32000000003400038030000080080003400000000224000b80200001800e000100636f6e6e6c696d69740000000c00028008000140000000000900010073797a30"], 0xe4}}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a09000000000000000000020000000900020073794f310000000008000440080000000900010073797a3000000000080003400000000114000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$NFT_MSG_GETOBJ(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="34000000150a03f5"], 0x34}, 0x1, 0x0, 0x0, 0x66df5cfbe53006d1}, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x1003, 0x5, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0d0000000800000003000000b4e000006ba6bde8fe089b65c02326123d925f7be0ab2af8721538b021f6c9f810f3a20395db759c89f6e3f26a29b11f98534ada89feaed32400ddd4cbf052b990adb37fb4d8b695d26cd26a2489c124b10c343e0c17ae9fd345b81e3abe7e514e19269dede0652d7c880c904abcd449009120a0a70df68a38774c5df49a1e38000000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB='ya\x00\x00\x00\x00\x00\x00\x00\x00~'], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000c00)={0x148, 0x0, 0x300, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_HANDLE_DFS={0x4}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x8001}, @NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_CONNECTED_TO_AS={0x5}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_TX_RATES={0xf8, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x38, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x18, 0x1, [0x2, 0x4, 0x24, 0xc, 0x1, 0x3, 0x36, 0x9, 0x1, 0x60, 0x1, 0x30, 0x3, 0x2, 0x0, 0x18, 0x1b, 0x3, 0x0, 0x18]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8001, 0x1, 0x8, 0x2, 0x4, 0x7ff, 0x3, 0x8001]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x4}]}, @NL80211_BAND_60GHZ={0x58, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x400, 0x1, 0x3, 0xfff3, 0x7, 0xd, 0x3]}}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x1, 0x5, 0x36, 0xc, 0x9, 0x16, 0x1b, 0x48, 0xb, 0xb, 0x6, 0x24, 0x60, 0x9af6b8590b5387de, 0x1b, 0xb, 0xc, 0x2, 0x6c, 0x1, 0xc, 0x36, 0xc, 0x4, 0x9, 0x36, 0x28, 0xb, 0x1]}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x8000, 0x1000, 0x5, 0x1, 0x200, 0x2, 0x3]}}]}, @NL80211_BAND_6GHZ={0x40, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HE_GI={0x5}, @NL80211_TXRATE_HE_GI={0x5}, @NL80211_TXRATE_HE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HE={0x14, 0x5, {[0x2, 0x8, 0x4, 0x9, 0xc, 0x10, 0xa, 0x2da]}}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x2}]}, @NL80211_BAND_5GHZ={0x24, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x15, 0x1, [0x30, 0x24, 0x2, 0x3, 0x30, 0x30, 0x9, 0x36, 0x16, 0x24, 0x6, 0x1, 0x4, 0x1b, 0x60, 0x1b, 0x34]}, @NL80211_TXRATE_HE_LTF={0x5, 0x7, 0x1}]}]}, @NL80211_ATTR_HANDLE_DFS={0x4}]}, 0x148}, 0x1, 0x0, 0x0, 0x840}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00'}, 0x10) 76.647899ms ago: executing program 7 (id=12006): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000001d00), 0x1, 0x0) pwritev(r2, &(0x7f0000003100)=[{&(0x7f0000001d40)="472e7f688644aecfa46d3d", 0xb}], 0x1, 0xd, 0x0) 0s ago: executing program 7 (id=12007): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0700000004000000800000000100000028000000", @ANYRES32, @ANYBLOB="b50007000000000cb12506e04591df4f54000000ee27616d1925863bdd363669", @ANYRES32=0x0, @ANYRES8=0x0, @ANYBLOB='\x00'/28], 0x50) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000008000000000000005000100070000000900020073797a30000000001400078008001240000000000500150004000000050005000000000005000400000000000d000300686173683a6d6163"], 0x5c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) r1 = eventfd(0x0) read$eventfd(r1, &(0x7f0000000240), 0x8) (async) writev(r1, &(0x7f0000000080)=[{&(0x7f0000001100)="02965d1f5ec3de3d", 0x8}, {&(0x7f0000002180)="27a8104ce45cd4d5", 0x8}], 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x8000, 0x8000, 0x4, 0x8, {{0x6, 0x4, 0x2, 0x3f, 0x18, 0x64, 0x0, 0x5, 0x4, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x4, 0x3d, 0x1, 0x2}]}}}}}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x18) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="c0020000100063d10000000000000000fe8000000000000000000000000000bbfe8000000000000000000000000000aa0000000000000000000000003a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc01000000000000000000000000000000000000330000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000b000000000000000000000000000000ffffffffffffffff000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001600000000020000000000000000000000bf010100636d61632861657329"], 0x2c0}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="050000000400000005000040000000f100"/28], 0x50) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1e0001002200000026b600000500000001000000", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=r4, @ANYRES32=r6, @ANYBLOB], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc18933988aa81f20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) (async) creat(&(0x7f0000000500)='./file0\x00', 0xf4) (async) ppoll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x200}], 0x1, 0x0, &(0x7f0000000980)={[0x2]}, 0x8) (async) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x47f2, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800007f00000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000f00)='kfree\x00', r8}, 0x18) kernel console output (not intermixed with test programs): 1000 [ 814.841867][T21750] lo speed is unknown, defaulting to 1000 [ 815.155817][ T29] kauditd_printk_skb: 283 callbacks suppressed [ 815.155876][ T29] audit: type=1400 audit(1762556006.815:41045): avc: denied { prog_load } for pid=21732 comm="syz.5.10401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 815.181376][ T29] audit: type=1400 audit(1762556006.815:41046): avc: denied { bpf } for pid=21732 comm="syz.5.10401" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 815.202261][ T29] audit: type=1400 audit(1762556006.815:41047): avc: denied { perfmon } for pid=21732 comm="syz.5.10401" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 815.223461][ T29] audit: type=1400 audit(1762556006.915:41048): avc: denied { create } for pid=21732 comm="syz.5.10401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 815.244502][ T29] audit: type=1400 audit(1762556006.915:41049): avc: denied { map_create } for pid=21732 comm="syz.5.10401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 815.263922][ T29] audit: type=1400 audit(1762556006.915:41050): avc: denied { map_read map_write } for pid=21732 comm="syz.5.10401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 815.284062][ T29] audit: type=1400 audit(1762556006.915:41051): avc: denied { write } for pid=21732 comm="syz.5.10401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 815.304886][ T29] audit: type=1400 audit(1762556007.125:41052): avc: denied { read write } for pid=21760 comm="syz.0.10403" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 815.328707][ T29] audit: type=1400 audit(1762556007.125:41053): avc: denied { open } for pid=21760 comm="syz.0.10403" path="/dev/virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 815.352447][ T29] audit: type=1400 audit(1762556007.135:41054): avc: denied { ioctl } for pid=21760 comm="syz.0.10403" path="/dev/virtual_nci" dev="devtmpfs" ino=132 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 815.461990][T21807] siw: device registration error -23 [ 815.676730][T21810] vcan0 speed is unknown, defaulting to 1000 [ 815.716216][T21730] Set syz1 is full, maxelem 65536 reached [ 815.802069][T21810] lo speed is unknown, defaulting to 1000 [ 815.974022][T21900] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=21900 comm=syz.0.10417 [ 816.202573][T21903] vcan0 speed is unknown, defaulting to 1000 [ 816.233501][T21903] lo speed is unknown, defaulting to 1000 [ 816.456632][T21911] netlink: 'syz.0.10420': attribute type 1 has an invalid length. [ 816.464572][T21911] netlink: 224 bytes leftover after parsing attributes in process `syz.0.10420'. [ 816.641718][T21933] rdma_rxe: rxe_newlink: failed to add bond0 [ 816.643048][T21938] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=21938 comm=syz.0.10429 [ 816.683870][T21941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=21941 comm=syz.5.10431 [ 816.714470][T21944] SELinux: Context system_u:object_r:hald_keymap_exec_t:s0 is not valid (left unmapped). [ 816.741488][T21934] vcan0 speed is unknown, defaulting to 1000 [ 816.854422][T21934] lo speed is unknown, defaulting to 1000 [ 816.971136][T21980] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=21980 comm=syz.5.10447 [ 817.192452][T22005] FAULT_INJECTION: forcing a failure. [ 817.192452][T22005] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 817.205591][T22005] CPU: 1 UID: 0 PID: 22005 Comm: syz.0.10456 Not tainted syzkaller #0 PREEMPT(voluntary) [ 817.205622][T22005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 817.205715][T22005] Call Trace: [ 817.205721][T22005] [ 817.205729][T22005] __dump_stack+0x1d/0x30 [ 817.205751][T22005] dump_stack_lvl+0xe8/0x140 [ 817.205773][T22005] dump_stack+0x15/0x1b [ 817.205792][T22005] should_fail_ex+0x265/0x280 [ 817.205811][T22005] should_fail+0xb/0x20 [ 817.205888][T22005] should_fail_usercopy+0x1a/0x20 [ 817.205912][T22005] _copy_from_iter+0xd2/0xe80 [ 817.205982][T22005] ? __build_skb_around+0x1ab/0x200 [ 817.206010][T22005] ? __alloc_skb+0x223/0x320 [ 817.206041][T22005] netlink_sendmsg+0x471/0x6b0 [ 817.206066][T22005] ? __pfx_netlink_sendmsg+0x10/0x10 [ 817.206088][T22005] __sock_sendmsg+0x145/0x180 [ 817.206140][T22005] ____sys_sendmsg+0x31e/0x4e0 [ 817.206250][T22005] ___sys_sendmsg+0x17b/0x1d0 [ 817.206278][T22005] __x64_sys_sendmsg+0xd4/0x160 [ 817.206300][T22005] x64_sys_call+0x191e/0x3000 [ 817.206326][T22005] do_syscall_64+0xd2/0x200 [ 817.206348][T22005] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 817.206448][T22005] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 817.206488][T22005] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 817.206518][T22005] RIP: 0033:0x7f9de5bfefc9 [ 817.206535][T22005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 817.206622][T22005] RSP: 002b:00007f9de4667038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 817.206644][T22005] RAX: ffffffffffffffda RBX: 00007f9de5e55fa0 RCX: 00007f9de5bfefc9 [ 817.206739][T22005] RDX: 0000000004000800 RSI: 0000200000000000 RDI: 0000000000000003 [ 817.206752][T22005] RBP: 00007f9de4667090 R08: 0000000000000000 R09: 0000000000000000 [ 817.206767][T22005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 817.206779][T22005] R13: 00007f9de5e56038 R14: 00007f9de5e55fa0 R15: 00007fffdeb4e358 [ 817.206796][T22005] [ 817.782385][T22072] syz2: rxe_newlink: already configured on bond0 [ 817.954537][T22111] 9pnet: Could not find request transport: rÿma [ 817.981697][T22111] program syz.0.10478 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 818.215824][T22154] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10486'. [ 818.349388][T22168] vcan0 speed is unknown, defaulting to 1000 [ 818.382640][T22168] lo speed is unknown, defaulting to 1000 [ 819.036860][T22265] vhci_hcd: invalid port number 129 [ 819.042208][T22265] vhci_hcd: default hub control req: 2006 v02fe i0081 l0 [ 819.350133][T22291] siw: device registration error -23 [ 819.639144][T22325] vcan0 speed is unknown, defaulting to 1000 [ 819.672339][T22325] lo speed is unknown, defaulting to 1000 [ 819.897015][T22329] vcan0 speed is unknown, defaulting to 1000 [ 819.922566][T22334] netlink: 96 bytes leftover after parsing attributes in process `syz.7.10531'. [ 819.955029][T22326] vcan0 speed is unknown, defaulting to 1000 [ 819.961607][T22329] lo speed is unknown, defaulting to 1000 [ 819.975683][T22328] SELinux: failed to load policy [ 820.028170][T22326] lo speed is unknown, defaulting to 1000 [ 820.165274][ T29] kauditd_printk_skb: 386 callbacks suppressed [ 820.165313][ T29] audit: type=1326 audit(1762556012.205:41441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22338 comm="syz.7.10532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c6714efc9 code=0x7ffc0000 [ 820.195510][ T29] audit: type=1326 audit(1762556012.205:41442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22338 comm="syz.7.10532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c6714efc9 code=0x7ffc0000 [ 820.273560][ T29] audit: type=1326 audit(1762556012.315:41443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22347 comm="syz.6.10536" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 820.297592][ T29] audit: type=1326 audit(1762556012.315:41444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22347 comm="syz.6.10536" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 820.321317][ T29] audit: type=1326 audit(1762556012.315:41445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22347 comm="syz.6.10536" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 820.344943][ T29] audit: type=1326 audit(1762556012.315:41446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22347 comm="syz.6.10536" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 820.435466][ T29] audit: type=1400 audit(1762556012.475:41447): avc: denied { relabelfrom } for pid=22354 comm="syz.2.10539" name="NETLINK" dev="sockfs" ino=123255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 820.460338][ T29] audit: type=1400 audit(1762556012.475:41448): avc: denied { relabelto } for pid=22354 comm="syz.2.10539" name="NETLINK" dev="sockfs" ino=123255 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_netfilter_socket permissive=1 [ 820.502010][T22359] 9pnet_fd: Insufficient options for proto=fd [ 820.508223][ T29] audit: type=1400 audit(1762556012.545:41449): avc: denied { mounton } for pid=22357 comm="syz.5.10541" path="/386/file0" dev="tmpfs" ino=2009 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 820.580766][T22367] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=22367 comm=syz.5.10545 [ 820.684305][ T29] audit: type=1400 audit(1762556012.725:41450): avc: denied { read write } for pid=22370 comm="syz.6.10546" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 821.408057][T22378] vcan0 speed is unknown, defaulting to 1000 [ 821.441772][T22378] lo speed is unknown, defaulting to 1000 [ 821.477381][T22382] rdma_rxe: rxe_newlink: failed to add bond0 [ 821.805175][T22402] vcan0 speed is unknown, defaulting to 1000 [ 821.897765][T22415] vcan0 speed is unknown, defaulting to 1000 [ 821.897789][T22402] lo speed is unknown, defaulting to 1000 [ 821.932611][T22415] lo speed is unknown, defaulting to 1000 [ 821.932634][T22419] vcan0 speed is unknown, defaulting to 1000 [ 821.978806][T22419] lo speed is unknown, defaulting to 1000 [ 822.052888][T22428] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=22428 comm=syz.6.10562 [ 822.137297][T22432] rdma_rxe: rxe_newlink: failed to add bond0 [ 822.241450][T22438] vcan0 speed is unknown, defaulting to 1000 [ 822.270013][T22438] lo speed is unknown, defaulting to 1000 [ 822.539145][T22441] vcan0 speed is unknown, defaulting to 1000 [ 822.572079][T22441] lo speed is unknown, defaulting to 1000 [ 822.632150][T22459] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=22459 comm=syz.0.10573 [ 822.738585][T22464] rdma_rxe: rxe_newlink: failed to add bond0 [ 822.936830][T22483] vcan0 speed is unknown, defaulting to 1000 [ 822.974338][T22483] lo speed is unknown, defaulting to 1000 [ 823.093339][T22501] vcan0 speed is unknown, defaulting to 1000 [ 823.126275][T22501] lo speed is unknown, defaulting to 1000 [ 823.174890][T22497] vcan0 speed is unknown, defaulting to 1000 [ 823.209186][T22497] lo speed is unknown, defaulting to 1000 [ 823.389105][T22510] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=22510 comm=syz.2.10588 [ 823.483995][T22516] SELinux: failed to load policy [ 824.401729][T22529] syzkaller0: entered allmulticast mode [ 824.473506][T22529] syzkaller0: entered promiscuous mode [ 824.499812][T22529] syzkaller0 (unregistering): left allmulticast mode [ 824.506541][T22529] syzkaller0 (unregistering): left promiscuous mode [ 824.585364][T22535] rdma_rxe: rxe_newlink: failed to add bond0 [ 824.677218][T22554] netlink: 24 bytes leftover after parsing attributes in process `syz.2.10604'. [ 824.767727][T22567] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10609'. [ 824.780796][T22567] netlink: 32 bytes leftover after parsing attributes in process `syz.5.10609'. [ 824.819213][T22567] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10609'. [ 824.847302][T22570] vcan0 speed is unknown, defaulting to 1000 [ 824.881422][T22570] lo speed is unknown, defaulting to 1000 [ 824.895364][T22582] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=22582 comm=syz.7.10616 [ 824.914534][T22581] netlink: 44 bytes leftover after parsing attributes in process `syz.2.10614'. [ 824.929228][T22583] netlink: 'syz.6.10615': attribute type 11 has an invalid length. [ 825.030859][T22585] rdma_rxe: rxe_newlink: failed to add bond0 [ 825.118695][T22595] FAULT_INJECTION: forcing a failure. [ 825.118695][T22595] name failslab, interval 1, probability 0, space 0, times 0 [ 825.126710][T22597] netlink: 24 bytes leftover after parsing attributes in process `syz.5.10622'. [ 825.131358][T22595] CPU: 0 UID: 0 PID: 22595 Comm: syz.7.10621 Not tainted syzkaller #0 PREEMPT(voluntary) [ 825.131386][T22595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 825.131400][T22595] Call Trace: [ 825.131407][T22595] [ 825.131416][T22595] __dump_stack+0x1d/0x30 [ 825.131484][T22595] dump_stack_lvl+0xe8/0x140 [ 825.131545][T22595] dump_stack+0x15/0x1b [ 825.131564][T22595] should_fail_ex+0x265/0x280 [ 825.131585][T22595] should_failslab+0x8c/0xb0 [ 825.131625][T22595] kmem_cache_alloc_noprof+0x50/0x480 [ 825.131684][T22595] ? audit_log_start+0x342/0x720 [ 825.131708][T22595] audit_log_start+0x342/0x720 [ 825.131730][T22595] ? kstrtouint+0x76/0xc0 [ 825.131832][T22595] audit_seccomp+0x48/0x100 [ 825.131866][T22595] ? __seccomp_filter+0x82d/0x1250 [ 825.131895][T22595] __seccomp_filter+0x83e/0x1250 [ 825.131975][T22595] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 825.132008][T22595] ? vfs_write+0x7e8/0x960 [ 825.132040][T22595] __secure_computing+0x82/0x150 [ 825.132164][T22595] syscall_trace_enter+0xcf/0x1e0 [ 825.132194][T22595] do_syscall_64+0xac/0x200 [ 825.132214][T22595] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 825.132320][T22595] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 825.132427][T22595] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 825.132449][T22595] RIP: 0033:0x7f6c6714efc9 [ 825.132465][T22595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 825.132485][T22595] RSP: 002b:00007f6c65bb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 825.132513][T22595] RAX: ffffffffffffffda RBX: 00007f6c673a5fa0 RCX: 00007f6c6714efc9 [ 825.132527][T22595] RDX: 0000000000600000 RSI: 0000000000a00000 RDI: 0000200000000000 [ 825.132547][T22595] RBP: 00007f6c65bb7090 R08: 0000200000a00000 R09: 0000000000000000 [ 825.132560][T22595] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 825.132573][T22595] R13: 00007f6c673a6038 R14: 00007f6c673a5fa0 R15: 00007ffeae10f1a8 [ 825.132614][T22595] [ 825.176845][ T29] kauditd_printk_skb: 171 callbacks suppressed [ 825.176861][ T29] audit: type=1326 audit(1762556017.175:41620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.7.10621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f6c6714d9dc code=0x7ffc0000 [ 825.371047][ T29] audit: type=1326 audit(1762556017.175:41621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.7.10621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f6c6714da7f code=0x7ffc0000 [ 825.394529][ T29] audit: type=1326 audit(1762556017.175:41622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.7.10621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f6c6714dc2a code=0x7ffc0000 [ 825.418096][ T29] audit: type=1326 audit(1762556017.175:41623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.7.10621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c6714efc9 code=0x7ffc0000 [ 825.441860][ T29] audit: type=1326 audit(1762556017.185:41624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22594 comm="syz.7.10621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c6714efc9 code=0x7ffc0000 [ 825.466155][ T29] audit: type=1400 audit(1762556017.225:41625): avc: denied { read write } for pid=22598 comm="syz.7.10623" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 825.490098][ T29] audit: type=1400 audit(1762556017.225:41626): avc: denied { open } for pid=22598 comm="syz.7.10623" path="/dev/virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 825.514194][ T29] audit: type=1400 audit(1762556017.225:41627): avc: denied { ioctl } for pid=22598 comm="syz.7.10623" path="/dev/virtual_nci" dev="devtmpfs" ino=132 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 825.539328][ T29] audit: type=1400 audit(1762556017.225:41628): avc: denied { read } for pid=22598 comm="syz.7.10623" dev="nsfs" ino=4026532483 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 825.560874][ T29] audit: type=1400 audit(1762556017.225:41629): avc: denied { open } for pid=22598 comm="syz.7.10623" path="net:[4026532483]" dev="nsfs" ino=4026532483 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 825.772013][T22597] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10622'. [ 825.781469][T22597] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10622'. [ 825.850756][T22605] vcan0 speed is unknown, defaulting to 1000 [ 825.884877][T22605] lo speed is unknown, defaulting to 1000 [ 826.212524][T22636] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10629'. [ 826.230266][T22608] vcan0 speed is unknown, defaulting to 1000 [ 826.281612][T22643] netlink: 20 bytes leftover after parsing attributes in process `syz.0.10634'. [ 826.399864][T22628] vcan0 speed is unknown, defaulting to 1000 [ 826.407616][T22608] lo speed is unknown, defaulting to 1000 [ 826.503479][T22628] lo speed is unknown, defaulting to 1000 [ 826.517091][T22665] FAULT_INJECTION: forcing a failure. [ 826.517091][T22665] name failslab, interval 1, probability 0, space 0, times 0 [ 826.529795][T22665] CPU: 1 UID: 0 PID: 22665 Comm: syz.5.10643 Not tainted syzkaller #0 PREEMPT(voluntary) [ 826.529826][T22665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 826.529839][T22665] Call Trace: [ 826.529847][T22665] [ 826.529855][T22665] __dump_stack+0x1d/0x30 [ 826.529914][T22665] dump_stack_lvl+0xe8/0x140 [ 826.529934][T22665] dump_stack+0x15/0x1b [ 826.529950][T22665] should_fail_ex+0x265/0x280 [ 826.530016][T22665] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 826.530041][T22665] should_failslab+0x8c/0xb0 [ 826.530073][T22665] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 826.530184][T22665] ? debugfs_alloc_inode+0x34/0x40 [ 826.530255][T22665] ? lookup_noperm+0xc9/0x180 [ 826.530277][T22665] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 826.530301][T22665] debugfs_alloc_inode+0x34/0x40 [ 826.530325][T22665] alloc_inode+0x40/0x170 [ 826.530428][T22665] new_inode+0x1d/0xe0 [ 826.530665][T22665] __debugfs_create_file+0x109/0x330 [ 826.530801][T22665] debugfs_create_file_full+0x3f/0x60 [ 826.530824][T22665] ? __pfx_ip6_tnl_dev_setup+0x10/0x10 [ 826.530856][T22665] ref_tracker_dir_debugfs+0x100/0x1e0 [ 826.530958][T22665] alloc_netdev_mqs+0x1a7/0xa50 [ 826.530980][T22665] ? sized_strscpy+0x157/0x1a0 [ 826.531010][T22665] ip6_tnl_locate+0x37e/0x4a0 [ 826.531046][T22665] ip6_tnl_siocdevprivate+0x550/0x920 [ 826.531087][T22665] dev_ifsioc+0x8f8/0xaa0 [ 826.531112][T22665] dev_ioctl+0x78d/0x960 [ 826.531152][T22665] sock_ioctl+0x593/0x610 [ 826.531206][T22665] ? __pfx_sock_ioctl+0x10/0x10 [ 826.531229][T22665] __se_sys_ioctl+0xce/0x140 [ 826.531254][T22665] __x64_sys_ioctl+0x43/0x50 [ 826.531276][T22665] x64_sys_call+0x1816/0x3000 [ 826.531302][T22665] do_syscall_64+0xd2/0x200 [ 826.531351][T22665] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 826.531456][T22665] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 826.531622][T22665] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 826.531645][T22665] RIP: 0033:0x7f97e833efc9 [ 826.531663][T22665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 826.531721][T22665] RSP: 002b:00007f97e6d9f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 826.531764][T22665] RAX: ffffffffffffffda RBX: 00007f97e8595fa0 RCX: 00007f97e833efc9 [ 826.531779][T22665] RDX: 0000200000000040 RSI: 00000000000089f1 RDI: 0000000000000003 [ 826.531795][T22665] RBP: 00007f97e6d9f090 R08: 0000000000000000 R09: 0000000000000000 [ 826.531809][T22665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 826.531821][T22665] R13: 00007f97e8596038 R14: 00007f97e8595fa0 R15: 00007ffd18bb9e48 [ 826.531840][T22665] [ 826.531849][T22665] debugfs: out of free dentries, can not create file 'netdev@ffff88811a574558' [ 826.821518][T22667] bond1: option lacp_active: mode dependency failed, not supported in mode balance-tlb(5) [ 826.845063][T22667] bond1 (unregistering): Released all slaves [ 827.115560][T22715] vhci_hcd: default hub control req: 2318 v0005 i0000 l0 [ 827.291975][T22724] syzkaller0: entered allmulticast mode [ 827.297726][T22724] syzkaller0: entered promiscuous mode [ 827.313794][T22724] syzkaller0 (unregistering): left allmulticast mode [ 827.320585][T22724] syzkaller0 (unregistering): left promiscuous mode [ 827.361319][T22749] rdma_rxe: rxe_newlink: failed to add bond0 [ 827.431145][T22752] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=22752 comm=syz.7.10668 [ 827.456257][T22760] block device autoloading is deprecated and will be removed. [ 827.653841][T22785] FAULT_INJECTION: forcing a failure. [ 827.653841][T22785] name failslab, interval 1, probability 0, space 0, times 0 [ 827.666543][T22785] CPU: 0 UID: 0 PID: 22785 Comm: syz.7.10671 Not tainted syzkaller #0 PREEMPT(voluntary) [ 827.666573][T22785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 827.666656][T22785] Call Trace: [ 827.666666][T22785] [ 827.666674][T22785] __dump_stack+0x1d/0x30 [ 827.666782][T22785] dump_stack_lvl+0xe8/0x140 [ 827.666869][T22785] dump_stack+0x15/0x1b [ 827.666888][T22785] should_fail_ex+0x265/0x280 [ 827.666910][T22785] should_failslab+0x8c/0xb0 [ 827.666940][T22785] kmem_cache_alloc_noprof+0x50/0x480 [ 827.666981][T22785] ? audit_log_start+0x342/0x720 [ 827.667002][T22785] audit_log_start+0x342/0x720 [ 827.667073][T22785] ? kstrtouint+0x76/0xc0 [ 827.667109][T22785] audit_seccomp+0x48/0x100 [ 827.667140][T22785] ? __seccomp_filter+0x82d/0x1250 [ 827.667241][T22785] __seccomp_filter+0x83e/0x1250 [ 827.667272][T22785] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 827.667307][T22785] ? vfs_write+0x7e8/0x960 [ 827.667335][T22785] __secure_computing+0x82/0x150 [ 827.667433][T22785] syscall_trace_enter+0xcf/0x1e0 [ 827.667464][T22785] do_syscall_64+0xac/0x200 [ 827.667482][T22785] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 827.667574][T22785] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 827.667603][T22785] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 827.667624][T22785] RIP: 0033:0x7f6c6714efc9 [ 827.667655][T22785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 827.667673][T22785] RSP: 002b:00007f6c65bb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 827.667691][T22785] RAX: ffffffffffffffda RBX: 00007f6c673a5fa0 RCX: 00007f6c6714efc9 [ 827.667706][T22785] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 827.667720][T22785] RBP: 00007f6c65bb7090 R08: 0000000000000000 R09: 0000000000000000 [ 827.667735][T22785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 827.667747][T22785] R13: 00007f6c673a6038 R14: 00007f6c673a5fa0 R15: 00007ffeae10f1a8 [ 827.667847][T22785] [ 827.925934][T22771] vcan0 speed is unknown, defaulting to 1000 [ 827.988658][T22771] lo speed is unknown, defaulting to 1000 [ 828.161910][T22808] rdma_rxe: rxe_newlink: failed to add bond0 [ 828.419988][T22833] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 828.456549][T22833] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 828.493420][T22859] syzkaller0: entered allmulticast mode [ 828.502187][T22859] syzkaller0: entered promiscuous mode [ 828.516802][T22859] syzkaller0 (unregistering): left allmulticast mode [ 828.523680][T22859] syzkaller0 (unregistering): left promiscuous mode [ 828.565172][T22877] rdma_rxe: rxe_newlink: failed to add bond0 [ 828.999473][T22943] syzkaller0: entered allmulticast mode [ 829.048619][T22943] syzkaller0: entered promiscuous mode [ 829.060019][T22943] syzkaller0 (unregistering): left allmulticast mode [ 829.066781][T22943] syzkaller0 (unregistering): left promiscuous mode [ 829.106393][T22962] rdma_rxe: rxe_newlink: failed to add bond0 [ 829.149276][T22951] vcan0 speed is unknown, defaulting to 1000 [ 829.182532][T22951] lo speed is unknown, defaulting to 1000 [ 829.307014][T22970] vcan0 speed is unknown, defaulting to 1000 [ 829.364719][T22970] lo speed is unknown, defaulting to 1000 [ 829.581217][T22992] vcan0 speed is unknown, defaulting to 1000 [ 829.614744][T22992] lo speed is unknown, defaulting to 1000 [ 829.888691][T23004] __nla_validate_parse: 8 callbacks suppressed [ 829.888715][T23004] netlink: 4 bytes leftover after parsing attributes in process `syz.0.10717'. [ 829.914758][T23004] netlink: 32 bytes leftover after parsing attributes in process `syz.0.10717'. [ 829.927302][T23004] netlink: 8 bytes leftover after parsing attributes in process `syz.0.10717'. [ 830.055295][T23011] pimreg: entered allmulticast mode [ 830.073555][T23009] syzkaller0: entered allmulticast mode [ 830.081090][T23009] syzkaller0: entered promiscuous mode [ 830.093610][T23009] syzkaller0 (unregistering): left allmulticast mode [ 830.100362][T23009] syzkaller0 (unregistering): left promiscuous mode [ 830.150669][T23021] syz2: rxe_newlink: already configured on bond0 [ 830.179969][ T29] kauditd_printk_skb: 262 callbacks suppressed [ 830.180002][ T29] audit: type=1400 audit(1762556022.225:41890): avc: denied { open } for pid=23024 comm="syz.5.10725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 830.205679][ T29] audit: type=1400 audit(1762556022.225:41891): avc: denied { kernel } for pid=23024 comm="syz.5.10725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 830.281248][ T29] audit: type=1400 audit(1762556022.315:41892): avc: denied { create } for pid=23028 comm="syz.5.10726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 830.381337][ T29] audit: type=1400 audit(1762556022.345:41893): avc: denied { allowed } for pid=23030 comm="syz.0.10728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 830.400984][ T29] audit: type=1400 audit(1762556022.345:41894): avc: denied { sqpoll } for pid=23030 comm="syz.0.10728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 830.420596][ T29] audit: type=1400 audit(1762556022.345:41895): avc: denied { create } for pid=23030 comm="syz.0.10728" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 830.442068][ T29] audit: type=1400 audit(1762556022.375:41896): avc: denied { mount } for pid=23028 comm="syz.5.10726" name="/" dev="ramfs" ino=125347 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 830.464772][ T29] audit: type=1400 audit(1762556022.375:41897): avc: denied { read write } for pid=23030 comm="syz.0.10728" name="event1" dev="devtmpfs" ino=243 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 830.488756][ T29] audit: type=1400 audit(1762556022.375:41898): avc: denied { open } for pid=23030 comm="syz.0.10728" path="/dev/input/event1" dev="devtmpfs" ino=243 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 830.499997][T23042] netlink: 52 bytes leftover after parsing attributes in process `syz.6.10732'. [ 830.527879][T23036] vcan0 speed is unknown, defaulting to 1000 [ 830.539728][ T29] audit: type=1400 audit(1762556022.425:41899): avc: denied { write } for pid=23034 comm="syz.2.10729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 830.688318][T23036] lo speed is unknown, defaulting to 1000 [ 830.703307][T23061] FAULT_INJECTION: forcing a failure. [ 830.703307][T23061] name failslab, interval 1, probability 0, space 0, times 0 [ 830.716019][T23061] CPU: 1 UID: 0 PID: 23061 Comm: syz.6.10736 Not tainted syzkaller #0 PREEMPT(voluntary) [ 830.716059][T23061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 830.716073][T23061] Call Trace: [ 830.716080][T23061] [ 830.716089][T23061] __dump_stack+0x1d/0x30 [ 830.716113][T23061] dump_stack_lvl+0xe8/0x140 [ 830.716138][T23061] dump_stack+0x15/0x1b [ 830.716159][T23061] should_fail_ex+0x265/0x280 [ 830.716181][T23061] should_failslab+0x8c/0xb0 [ 830.716213][T23061] __kmalloc_noprof+0xa5/0x570 [ 830.716246][T23061] ? copy_splice_read+0xc2/0x660 [ 830.716336][T23061] copy_splice_read+0xc2/0x660 [ 830.716366][T23061] sock_splice_read+0xa5/0xb0 [ 830.716392][T23061] ? __pfx_sock_splice_read+0x10/0x10 [ 830.716417][T23061] splice_file_to_pipe+0x238/0x390 [ 830.716444][T23061] do_splice+0xc48/0x10b0 [ 830.716537][T23061] ? proc_fail_nth_write+0x13b/0x160 [ 830.716663][T23061] ? __rcu_read_unlock+0x4f/0x70 [ 830.716690][T23061] ? __fget_files+0x184/0x1c0 [ 830.716721][T23061] __se_sys_splice+0x26c/0x3a0 [ 830.716750][T23061] __x64_sys_splice+0x78/0x90 [ 830.716784][T23061] x64_sys_call+0x28a7/0x3000 [ 830.716809][T23061] do_syscall_64+0xd2/0x200 [ 830.716830][T23061] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 830.716874][T23061] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 830.716909][T23061] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 830.716999][T23061] RIP: 0033:0x7fc07c2defc9 [ 830.717013][T23061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 830.717033][T23061] RSP: 002b:00007fc07ad3f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 830.717055][T23061] RAX: ffffffffffffffda RBX: 00007fc07c535fa0 RCX: 00007fc07c2defc9 [ 830.717069][T23061] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000004 [ 830.717083][T23061] RBP: 00007fc07ad3f090 R08: 0000000000000007 R09: 0000000000000009 [ 830.717096][T23061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 830.717149][T23061] R13: 00007fc07c536038 R14: 00007fc07c535fa0 R15: 00007ffcdf546098 [ 830.717166][T23061] [ 831.077304][T23073] syzkaller0: entered allmulticast mode [ 831.083574][T23073] syzkaller0: entered promiscuous mode [ 831.097314][T23073] syzkaller0 (unregistering): left allmulticast mode [ 831.104165][T23073] syzkaller0 (unregistering): left promiscuous mode [ 831.147365][T23080] rdma_rxe: rxe_newlink: failed to add bond0 [ 831.269134][T23043] vcan0 speed is unknown, defaulting to 1000 [ 831.398711][T23043] lo speed is unknown, defaulting to 1000 [ 831.939410][T23101] syz2: rxe_newlink: already configured on bond0 [ 832.959412][T23124] netlink: 20 bytes leftover after parsing attributes in process `syz.7.10756'. [ 832.980333][T23124] netlink: 12 bytes leftover after parsing attributes in process `syz.7.10756'. [ 833.160541][T23149] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=23149 comm=syz.7.10760 [ 833.414816][T23173] vcan0 speed is unknown, defaulting to 1000 [ 833.487709][T23180] vcan0 speed is unknown, defaulting to 1000 [ 833.489949][T23173] lo speed is unknown, defaulting to 1000 [ 833.542392][T23180] lo speed is unknown, defaulting to 1000 [ 833.822687][T23255] rdma_rxe: rxe_newlink: failed to add bond0 [ 834.467248][T23312] vcan0 speed is unknown, defaulting to 1000 [ 834.520180][T23312] lo speed is unknown, defaulting to 1000 [ 834.792000][T23333] vcan0 speed is unknown, defaulting to 1000 [ 834.825463][T23333] lo speed is unknown, defaulting to 1000 [ 835.244944][T23338] vcan0 speed is unknown, defaulting to 1000 [ 835.251052][ T29] kauditd_printk_skb: 100 callbacks suppressed [ 835.251067][ T29] audit: type=1400 audit(1762556027.285:42000): avc: denied { watch } for pid=23358 comm="syz.2.10789" path="/361/file0" dev="tmpfs" ino=1908 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 835.354090][T23338] lo speed is unknown, defaulting to 1000 [ 835.382848][ T29] audit: type=1400 audit(1762556027.425:42001): avc: denied { create } for pid=23358 comm="syz.2.10789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 835.396722][T23359] syzkaller0: entered allmulticast mode [ 835.439779][ T29] audit: type=1400 audit(1762556027.425:42002): avc: denied { ioctl } for pid=23358 comm="syz.2.10789" path="socket:[125707]" dev="sockfs" ino=125707 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 835.465222][ T29] audit: type=1400 audit(1762556027.425:42003): avc: denied { setopt } for pid=23358 comm="syz.2.10789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 835.489418][T23359] syzkaller0: entered promiscuous mode [ 835.531107][T23359] syzkaller0 (unregistering): left allmulticast mode [ 835.537809][T23359] syzkaller0 (unregistering): left promiscuous mode [ 835.609828][ T29] audit: type=1400 audit(1762556027.645:42004): avc: denied { create } for pid=23358 comm="syz.2.10789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 835.614591][T23360] rdma_rxe: rxe_newlink: failed to add bond0 [ 835.661506][ T29] audit: type=1400 audit(1762556027.655:42005): avc: denied { write } for pid=23358 comm="syz.2.10789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 835.738010][ T29] audit: type=1400 audit(1762556027.775:42006): avc: denied { create } for pid=23365 comm="syz.2.10792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 835.816620][ T29] audit: type=1400 audit(1762556027.855:42007): avc: denied { read } for pid=23368 comm="syz.2.10793" dev="nsfs" ino=4026532422 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 835.838109][ T29] audit: type=1400 audit(1762556027.855:42008): avc: denied { open } for pid=23368 comm="syz.2.10793" path="net:[4026532422]" dev="nsfs" ino=4026532422 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 835.861642][ T29] audit: type=1400 audit(1762556027.855:42009): avc: denied { write } for pid=23368 comm="syz.2.10793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 835.888309][T23373] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10793'. [ 835.934021][T23373] netlink: 32 bytes leftover after parsing attributes in process `syz.2.10793'. [ 835.989968][T23373] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10793'. [ 836.161887][T23388] vcan0 speed is unknown, defaulting to 1000 [ 836.195519][T23388] lo speed is unknown, defaulting to 1000 [ 836.416459][T23419] rdma_rxe: rxe_newlink: failed to add bond0 [ 836.714671][T23452] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=23452 comm=syz.2.10808 [ 836.807424][T23454] vcan0 speed is unknown, defaulting to 1000 [ 836.844347][T23454] lo speed is unknown, defaulting to 1000 [ 837.247982][T23483] syzkaller0: entered allmulticast mode [ 837.254356][T23483] syzkaller0: entered promiscuous mode [ 837.261365][T23483] syzkaller0 (unregistering): left allmulticast mode [ 837.268054][T23483] syzkaller0 (unregistering): left promiscuous mode [ 837.312516][T23495] rdma_rxe: rxe_newlink: failed to add bond0 [ 837.418159][T23502] vcan0 speed is unknown, defaulting to 1000 [ 837.450948][T23502] lo speed is unknown, defaulting to 1000 [ 837.939591][T23544] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=23544 comm=syz.2.10821 [ 838.520295][T23625] syzkaller0: entered allmulticast mode [ 838.526063][T23625] syzkaller0: entered promiscuous mode [ 838.533711][T23625] syzkaller0 (unregistering): left allmulticast mode [ 838.540470][T23625] syzkaller0 (unregistering): left promiscuous mode [ 838.589129][T23628] rdma_rxe: rxe_newlink: failed to add bond0 [ 838.651625][T23630] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=23630 comm=syz.6.10837 [ 839.079467][T23653] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10848'. [ 839.090224][T23653] netlink: 32 bytes leftover after parsing attributes in process `syz.5.10848'. [ 839.755902][T23749] x_tables: unsorted entry at hook 2 [ 839.980270][T23773] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10861'. [ 839.989281][T23773] netlink: 'syz.6.10861': attribute type 21 has an invalid length. [ 839.997263][T23773] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10861'. [ 840.075113][ T12] netdevsim netdevsim6 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 840.084200][T23773] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10861'. [ 840.093933][T23773] netlink: 'syz.6.10861': attribute type 21 has an invalid length. [ 840.101905][T23773] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10861'. [ 840.111036][ T12] netdevsim netdevsim6 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 840.120381][ T12] netdevsim netdevsim6 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 840.129245][ T12] netdevsim netdevsim6 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 840.178514][T23801] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10863'. [ 840.985677][T23862] x_tables: unsorted entry at hook 2 [ 841.029509][T23866] FAULT_INJECTION: forcing a failure. [ 841.029509][T23866] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 841.042657][T23866] CPU: 0 UID: 0 PID: 23866 Comm: syz.2.10876 Not tainted syzkaller #0 PREEMPT(voluntary) [ 841.042688][T23866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 841.042701][T23866] Call Trace: [ 841.042708][T23866] [ 841.042716][T23866] __dump_stack+0x1d/0x30 [ 841.042754][T23866] dump_stack_lvl+0xe8/0x140 [ 841.042827][T23866] dump_stack+0x15/0x1b [ 841.042846][T23866] should_fail_ex+0x265/0x280 [ 841.042867][T23866] should_fail+0xb/0x20 [ 841.042885][T23866] should_fail_usercopy+0x1a/0x20 [ 841.042934][T23866] _copy_to_user+0x20/0xa0 [ 841.042961][T23866] simple_read_from_buffer+0xb5/0x130 [ 841.042989][T23866] proc_fail_nth_read+0x10e/0x150 [ 841.043023][T23866] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 841.043070][T23866] vfs_read+0x1a8/0x770 [ 841.043095][T23866] ? __rcu_read_unlock+0x4f/0x70 [ 841.043123][T23866] ? __fget_files+0x184/0x1c0 [ 841.043207][T23866] ksys_read+0xda/0x1a0 [ 841.043295][T23866] __x64_sys_read+0x40/0x50 [ 841.043322][T23866] x64_sys_call+0x27c0/0x3000 [ 841.043348][T23866] do_syscall_64+0xd2/0x200 [ 841.043369][T23866] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 841.043399][T23866] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 841.043469][T23866] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 841.043490][T23866] RIP: 0033:0x7f6c56a3d9dc [ 841.043505][T23866] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 841.043523][T23866] RSP: 002b:00007f6c5549f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 841.043619][T23866] RAX: ffffffffffffffda RBX: 00007f6c56c95fa0 RCX: 00007f6c56a3d9dc [ 841.043631][T23866] RDX: 000000000000000f RSI: 00007f6c5549f0a0 RDI: 0000000000000004 [ 841.043642][T23866] RBP: 00007f6c5549f090 R08: 0000000000000000 R09: 0000000000000000 [ 841.043654][T23866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.043665][T23866] R13: 00007f6c56c96038 R14: 00007f6c56c95fa0 R15: 00007ffcdffe6578 [ 841.043683][T23866] [ 841.637725][ T29] kauditd_printk_skb: 169 callbacks suppressed [ 841.637741][ T29] audit: type=1400 audit(1762556033.675:42179): avc: denied { relabelfrom } for pid=23917 comm="syz.2.10890" name="" dev="pipefs" ino=126378 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 841.681415][ T29] audit: type=1400 audit(1762556033.705:42180): avc: denied { relabelto } for pid=23917 comm="syz.2.10890" name="" dev="pipefs" ino=126378 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:hald_keymap_exec_t:s0" [ 841.763167][T23937] __nla_validate_parse: 1 callbacks suppressed [ 841.763191][T23937] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10894'. [ 841.779113][T23937] netlink: 32 bytes leftover after parsing attributes in process `syz.2.10894'. [ 841.834928][ T29] audit: type=1400 audit(1762556033.875:42181): avc: denied { watch } for pid=23949 comm="syz.2.10895" path="/388/file0" dev="tmpfs" ino=2056 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 841.942740][ T29] audit: type=1400 audit(1762556033.985:42182): avc: denied { ioctl } for pid=23949 comm="syz.2.10895" path="socket:[126414]" dev="sockfs" ino=126414 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 841.968136][ T29] audit: type=1400 audit(1762556033.985:42183): avc: denied { sys_module } for pid=23949 comm="syz.2.10895" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 841.989725][ T29] audit: type=1400 audit(1762556033.985:42184): avc: denied { setopt } for pid=23949 comm="syz.2.10895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 842.115782][T23975] netlink: 4 bytes leftover after parsing attributes in process `syz.2.10900'. [ 842.126318][T23975] netlink: 32 bytes leftover after parsing attributes in process `syz.2.10900'. [ 842.175121][ T29] audit: type=1400 audit(1762556034.215:42185): avc: denied { create } for pid=23984 comm=77DEA305FF07 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 842.267622][ T29] audit: type=1400 audit(1762556034.245:42186): avc: denied { create } for pid=23984 comm=77DEA305FF07 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 842.643006][ T29] audit: type=1326 audit(1762556034.685:42187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24044 comm="syz.6.10913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 842.708524][ T29] audit: type=1326 audit(1762556034.715:42188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24044 comm="syz.6.10913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 843.962326][T24148] x_tables: unsorted entry at hook 2 [ 844.006270][T24150] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=24150 comm=syz.7.10935 [ 844.270372][T24163] syz2: rxe_newlink: already configured on bond0 [ 844.437607][T24184] x_tables: unsorted entry at hook 2 [ 844.691776][T24200] rdma_rxe: rxe_newlink: failed to add bond0 [ 845.154053][T24219] Set syz1 is full, maxelem 65536 reached [ 845.723131][T24346] syz2: rxe_newlink: already configured on bond0 [ 845.851819][T24372] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=24372 comm=syz.2.10972 [ 845.926845][T24370] vcan0 speed is unknown, defaulting to 1000 [ 845.959425][T24370] lo speed is unknown, defaulting to 1000 [ 846.171154][T24398] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=24398 comm=syz.6.10984 [ 846.371475][T24425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=24425 comm=syz.6.10996 [ 846.558288][T24453] netlink: 4 bytes leftover after parsing attributes in process `syz.5.11009'. [ 846.568496][T24453] netlink: 32 bytes leftover after parsing attributes in process `syz.5.11009'. [ 846.663970][ T29] kauditd_printk_skb: 165 callbacks suppressed [ 846.663986][ T29] audit: type=1400 audit(1762556038.705:42354): avc: denied { watch } for pid=24464 comm="syz.0.11016" path="/465/file0" dev="tmpfs" ino=2435 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 846.810918][ T29] audit: type=1400 audit(1762556038.855:42355): avc: denied { execmem } for pid=24484 comm="syz.0.11024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 846.849610][ T29] audit: type=1400 audit(1762556038.885:42356): avc: denied { create } for pid=24480 comm=77DEA305FF07 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 846.890867][ T29] audit: type=1400 audit(1762556038.915:42357): avc: denied { create } for pid=24480 comm=77DEA305FF07 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 846.911451][ T29] audit: type=1400 audit(1762556038.925:42358): avc: denied { create } for pid=24491 comm="syz.5.11028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 846.935756][ T29] audit: type=1400 audit(1762556038.975:42359): avc: denied { bind } for pid=24491 comm="syz.5.11028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 846.956184][ T29] audit: type=1400 audit(1762556038.975:42360): avc: denied { setopt } for pid=24491 comm="syz.5.11028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 846.978571][ T29] audit: type=1326 audit(1762556039.025:42361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24495 comm="syz.2.11029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c56a3efc9 code=0x7ffc0000 [ 847.003031][ T29] audit: type=1326 audit(1762556039.025:42362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24495 comm="syz.2.11029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c56a3efc9 code=0x7ffc0000 [ 847.028949][ T29] audit: type=1326 audit(1762556039.025:42363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24495 comm="syz.2.11029" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6c56a3efc9 code=0x7ffc0000 [ 847.509766][T24528] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=24528 comm=syz.6.11043 [ 847.905974][T24569] rdma_rxe: rxe_newlink: failed to add bond0 [ 847.988729][T24601] netlink: 4 bytes leftover after parsing attributes in process `syz.5.11074'. [ 848.026955][T24601] netlink: 32 bytes leftover after parsing attributes in process `syz.5.11074'. [ 848.180847][T24584] vcan0 speed is unknown, defaulting to 1000 [ 848.192927][ T53] batadv4: left allmulticast mode [ 848.197980][ T53] batadv4: left promiscuous mode [ 848.203314][ T53] bridge0: port 6(batadv4) entered disabled state [ 848.226505][ T53] batadv3: left allmulticast mode [ 848.231600][ T53] batadv3: left promiscuous mode [ 848.236786][ T53] bridge0: port 5(batadv3) entered disabled state [ 848.281406][ T53] batadv2: left allmulticast mode [ 848.286465][ T53] batadv2: left promiscuous mode [ 848.291580][ T53] bridge0: port 4(batadv2) entered disabled state [ 848.298599][ T53] batadv1: left allmulticast mode [ 848.303657][ T53] batadv1: left promiscuous mode [ 848.308790][ T53] bridge0: port 3(batadv1) entered disabled state [ 848.316268][ T53] bridge_slave_1: left allmulticast mode [ 848.322021][ T53] bridge_slave_1: left promiscuous mode [ 848.327594][ T53] bridge0: port 2(bridge_slave_1) entered disabled state [ 848.348948][ T53] bridge_slave_0: left allmulticast mode [ 848.354653][ T53] bridge_slave_0: left promiscuous mode [ 848.360314][ T53] bridge0: port 1(bridge_slave_0) entered disabled state [ 848.621569][ T53] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 848.635157][ T53] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 848.644744][ T53] bond0 (unregistering): (slave batadv0): Releasing backup interface [ 848.661278][ T53] bond0 (unregistering): Released all slaves [ 848.671577][T24584] lo speed is unknown, defaulting to 1000 [ 848.679472][T24622] rdma_rxe: rxe_newlink: failed to add bond0 [ 848.868379][T24629] vcan0 speed is unknown, defaulting to 1000 [ 848.885732][ T53] hsr_slave_0: left promiscuous mode [ 848.905334][ T53] hsr_slave_1: left promiscuous mode [ 848.913271][ T53] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 848.924156][ T53] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 848.925365][T24650] netlink: 12 bytes leftover after parsing attributes in process `syz.6.11094'. [ 848.995572][ T53] team0 (unregistering): Port device team_slave_1 removed [ 849.006924][ T53] team0 (unregistering): Port device team_slave_0 removed [ 849.045991][T24584] chnl_net:caif_netlink_parms(): no params data found [ 849.054616][T24629] lo speed is unknown, defaulting to 1000 [ 849.128727][T24584] bridge0: port 1(bridge_slave_0) entered blocking state [ 849.135866][T24584] bridge0: port 1(bridge_slave_0) entered disabled state [ 849.144304][T24584] bridge_slave_0: entered allmulticast mode [ 849.153105][T24584] bridge_slave_0: entered promiscuous mode [ 849.160215][T24584] bridge0: port 2(bridge_slave_1) entered blocking state [ 849.167283][T24584] bridge0: port 2(bridge_slave_1) entered disabled state [ 849.174483][T24584] bridge_slave_1: entered allmulticast mode [ 849.181797][T24584] bridge_slave_1: entered promiscuous mode [ 849.282668][T24584] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 849.319728][T24584] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 849.352178][T24584] team0: Port device team_slave_0 added [ 849.358852][T24584] team0: Port device team_slave_1 added [ 849.456687][T24584] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 849.463688][T24584] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 849.490271][T24584] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 849.521433][T24584] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 849.528396][T24584] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 849.555034][T24584] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 849.687132][T24584] hsr_slave_0: entered promiscuous mode [ 849.697081][T24584] hsr_slave_1: entered promiscuous mode [ 849.711559][T24584] debugfs: 'hsr0' already exists in 'hsr' [ 849.717308][T24584] Cannot create hsr debugfs directory [ 849.796574][T24702] netlink: 4 bytes leftover after parsing attributes in process `syz.0.11110'. [ 849.923398][T24698] vcan0 speed is unknown, defaulting to 1000 [ 850.013838][T24698] lo speed is unknown, defaulting to 1000 [ 850.025221][T24716] netlink: 68 bytes leftover after parsing attributes in process `syz.2.11116'. [ 850.247166][T24584] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 850.281358][T24584] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 850.295988][T24584] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 850.330995][T24584] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 850.423979][T24584] 8021q: adding VLAN 0 to HW filter on device bond0 [ 850.451127][T24584] 8021q: adding VLAN 0 to HW filter on device team0 [ 850.472402][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 850.479484][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 850.510847][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 850.517920][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 850.638023][T24584] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 850.847872][T24775] vcan0 speed is unknown, defaulting to 1000 [ 850.931250][T24584] veth0_vlan: entered promiscuous mode [ 850.958169][T24584] veth1_vlan: entered promiscuous mode [ 851.075750][T24775] lo speed is unknown, defaulting to 1000 [ 851.142548][T24818] vcan0 speed is unknown, defaulting to 1000 [ 851.259239][T24818] lo speed is unknown, defaulting to 1000 [ 851.417620][T24836] netlink: 20 bytes leftover after parsing attributes in process `syz.6.11128'. [ 851.439536][T24584] veth0_macvtap: entered promiscuous mode [ 851.456299][T24836] netlink: 12 bytes leftover after parsing attributes in process `syz.6.11128'. [ 851.468210][T24584] veth1_macvtap: entered promiscuous mode [ 851.492251][T24584] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 851.533827][T24584] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 851.573130][T17494] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 851.607527][T17494] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 851.627368][T17494] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 851.643678][T24863] netlink: 32 bytes leftover after parsing attributes in process `syz.6.11132'. [ 851.656873][T17970] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 851.859332][ T29] kauditd_printk_skb: 203 callbacks suppressed [ 851.859348][ T29] audit: type=1326 audit(1762556043.895:42567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24901 comm="syz.6.11140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 851.862000][T24902] netlink: 20 bytes leftover after parsing attributes in process `syz.6.11140'. [ 851.868774][ T29] audit: type=1326 audit(1762556043.895:42568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24901 comm="syz.6.11140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 851.922519][ T29] audit: type=1326 audit(1762556043.905:42569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24901 comm="syz.6.11140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 851.933254][T24902] netlink: 12 bytes leftover after parsing attributes in process `syz.6.11140'. [ 851.946866][ T29] audit: type=1326 audit(1762556043.905:42570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24901 comm="syz.6.11140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 851.979647][ T29] audit: type=1326 audit(1762556043.905:42571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24901 comm="syz.6.11140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 852.003987][ T29] audit: type=1326 audit(1762556043.905:42572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24901 comm="syz.6.11140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 852.027585][ T29] audit: type=1326 audit(1762556043.905:42573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24901 comm="syz.6.11140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 852.052026][ T29] audit: type=1326 audit(1762556043.905:42574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24901 comm="syz.6.11140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 852.075628][ T29] audit: type=1326 audit(1762556043.905:42575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24901 comm="syz.6.11140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 852.100040][ T29] audit: type=1326 audit(1762556043.905:42576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24901 comm="syz.6.11140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fc07c2defc9 code=0x7ffc0000 [ 852.144913][T24936] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=24936 comm=syz.7.11143 [ 852.241944][T24952] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=24952 comm=syz.7.11148 [ 852.443009][T17494] netdevsim netdevsim6 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 852.491570][T17494] netdevsim netdevsim6 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 852.541301][T17494] netdevsim netdevsim6 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 852.594965][T24979] vcan0 speed is unknown, defaulting to 1000 [ 852.611414][T17494] netdevsim netdevsim6 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 852.646532][T24979] lo speed is unknown, defaulting to 1000 [ 852.705212][T17494] batadv5: left allmulticast mode [ 852.710304][T17494] batadv5: left promiscuous mode [ 852.715496][T17494] bridge0: port 7(batadv5) entered disabled state [ 852.724763][T17494] batadv4: left allmulticast mode [ 852.730604][T17494] batadv4: left promiscuous mode [ 852.735723][T17494] bridge0: port 6(batadv4) entered disabled state [ 852.743791][T17494] batadv3: left allmulticast mode [ 852.748847][T17494] batadv3: left promiscuous mode [ 852.757294][T17494] bridge0: port 5(batadv3) entered disabled state [ 852.765005][T17494] batadv2: left allmulticast mode [ 852.770146][T17494] batadv2: left promiscuous mode [ 852.775262][T17494] bridge0: port 4(batadv2) entered disabled state [ 852.796102][T17494] batadv1: left allmulticast mode [ 852.801290][T17494] batadv1: left promiscuous mode [ 852.806349][T17494] bridge0: port 3(batadv1) entered disabled state [ 852.817930][T17494] bridge_slave_1: left allmulticast mode [ 852.824365][T17494] bridge_slave_1: left promiscuous mode [ 852.830237][T17494] bridge0: port 2(bridge_slave_1) entered disabled state [ 852.838774][T17494] bridge_slave_0: left allmulticast mode [ 852.844561][T17494] bridge_slave_0: left promiscuous mode [ 852.850930][T17494] bridge0: port 1(bridge_slave_0) entered disabled state [ 853.062528][T17494] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 853.073997][T17494] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 853.701785][T17494] bond0 (unregistering): Released all slaves [ 853.753289][T25055] vcan0 speed is unknown, defaulting to 1000 [ 853.786374][T25055] lo speed is unknown, defaulting to 1000 [ 853.884202][T24979] chnl_net:caif_netlink_parms(): no params data found [ 853.942860][T25071] __nla_validate_parse: 5 callbacks suppressed [ 853.942873][T25071] netlink: 12 bytes leftover after parsing attributes in process `syz.0.11190'. [ 853.979729][T25054] vcan0 speed is unknown, defaulting to 1000 [ 853.985823][T24979] bridge0: port 1(bridge_slave_0) entered blocking state [ 853.993553][T24979] bridge0: port 1(bridge_slave_0) entered disabled state [ 854.013523][T25079] x_tables: unsorted entry at hook 2 [ 854.031668][T24979] bridge_slave_0: entered allmulticast mode [ 854.057198][T24979] bridge_slave_0: entered promiscuous mode [ 854.072802][T24979] bridge0: port 2(bridge_slave_1) entered blocking state [ 854.080619][T24979] bridge0: port 2(bridge_slave_1) entered disabled state [ 854.100000][T24979] bridge_slave_1: entered allmulticast mode [ 854.106783][T24979] bridge_slave_1: entered promiscuous mode [ 854.152029][T24979] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 854.161161][T25054] lo speed is unknown, defaulting to 1000 [ 854.186812][T24979] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 854.212968][T17494] hsr_slave_0: left promiscuous mode [ 854.219732][T17494] hsr_slave_1: left promiscuous mode [ 854.225301][T17494] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 854.244480][T17494] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 854.303550][T17494] team0 (unregistering): Port device team_slave_1 removed [ 854.313697][T17494] team0 (unregistering): Port device team_slave_0 removed [ 854.362956][T24979] team0: Port device team_slave_0 added [ 854.375915][T24979] team0: Port device team_slave_1 added [ 854.392282][T24979] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 854.399230][T24979] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 854.425137][T24979] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 854.545765][T25095] vcan0 speed is unknown, defaulting to 1000 [ 854.597665][T25095] lo speed is unknown, defaulting to 1000 [ 854.801304][T24979] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 854.808269][T24979] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 854.834193][T24979] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 854.863043][T24979] hsr_slave_0: entered promiscuous mode [ 854.869076][T24979] hsr_slave_1: entered promiscuous mode [ 854.890117][T24979] debugfs: 'hsr0' already exists in 'hsr' [ 854.895854][T24979] Cannot create hsr debugfs directory [ 855.012039][T25112] netlink: 12 bytes leftover after parsing attributes in process `syz.7.11204'. [ 855.033572][T25117] x_tables: unsorted entry at hook 2 [ 855.226792][T25129] vcan0 speed is unknown, defaulting to 1000 [ 855.279423][T25129] lo speed is unknown, defaulting to 1000 [ 855.534225][T25142] syz2: rxe_newlink: already configured on bond0 [ 855.551758][T25144] netlink: 12 bytes leftover after parsing attributes in process `syz.2.11216'. [ 855.577873][T25147] x_tables: unsorted entry at hook 2 [ 855.798707][T24979] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 855.863787][T24979] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 855.885809][T24979] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 855.911092][T24979] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 855.958029][T24979] 8021q: adding VLAN 0 to HW filter on device bond0 [ 855.968169][T25151] vcan0 speed is unknown, defaulting to 1000 [ 855.974689][T24979] 8021q: adding VLAN 0 to HW filter on device team0 [ 855.984435][T17970] bridge0: port 1(bridge_slave_0) entered blocking state [ 855.991558][T17970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 856.017139][T17970] bridge0: port 2(bridge_slave_1) entered blocking state [ 856.024256][T17970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 856.047996][T25151] lo speed is unknown, defaulting to 1000 [ 856.177377][T24979] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 856.323959][T25219] netlink: 40 bytes leftover after parsing attributes in process `syz.7.11226'. [ 856.329084][T24979] veth0_vlan: entered promiscuous mode [ 856.345213][T25219] ip6gre1: entered promiscuous mode [ 856.350553][T25219] ip6gre1: entered allmulticast mode [ 856.366199][T24979] veth1_vlan: entered promiscuous mode [ 856.389522][T24979] veth0_macvtap: entered promiscuous mode [ 856.401659][T24979] veth1_macvtap: entered promiscuous mode [ 856.414030][T24979] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 856.419755][T25230] netlink: 12 bytes leftover after parsing attributes in process `syz.7.11228'. [ 856.426377][T24979] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 856.471621][ T3485] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.533094][ T3485] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.559596][ T3485] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.594712][ T3485] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.733614][T25266] netlink: 40 bytes leftover after parsing attributes in process `syz.0.11236'. [ 857.476198][ T29] kauditd_printk_skb: 156 callbacks suppressed [ 857.476213][ T29] audit: type=1326 audit(1762556049.515:42733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25371 comm="syz.2.11247" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c56a3efc9 code=0x7ffc0000 [ 857.513528][ T29] audit: type=1326 audit(1762556049.545:42734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25371 comm="syz.2.11247" exe="/root/syz-executor" sig=0 arch=c000003e syscall=69 compat=0 ip=0x7f6c56a3efc9 code=0x7ffc0000 [ 857.548428][T25377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=25377 comm=syz.7.11248 [ 857.602473][ T29] audit: type=1400 audit(1762556049.645:42735): avc: denied { ioctl } for pid=25378 comm="syz.6.11249" path="socket:[130928]" dev="sockfs" ino=130928 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 857.655344][ T29] audit: type=1400 audit(1762556049.655:42736): avc: denied { write } for pid=25378 comm="syz.6.11249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 857.678550][ T29] audit: type=1400 audit(1762556049.715:42738): avc: denied { prog_load } for pid=25380 comm="syz.7.11252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 857.697975][ T29] audit: type=1400 audit(1762556049.715:42737): avc: denied { map_create } for pid=25381 comm="syz.0.11250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 857.717378][ T29] audit: type=1400 audit(1762556049.715:42739): avc: denied { bpf } for pid=25380 comm="syz.7.11252" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 857.738193][ T29] audit: type=1400 audit(1762556049.715:42741): avc: denied { map_create } for pid=25384 comm="syz.6.11251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 857.757609][ T29] audit: type=1400 audit(1762556049.715:42740): avc: denied { perfmon } for pid=25380 comm="syz.7.11252" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 857.778807][ T29] audit: type=1400 audit(1762556049.715:42742): avc: denied { map_read map_write } for pid=25384 comm="syz.6.11251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 857.917748][T25401] x_tables: unsorted entry at hook 2 [ 857.952232][T25405] syz2: rxe_newlink: already configured on bond0 [ 858.137459][T25434] syz2: rxe_newlink: already configured on bond0 [ 858.149826][T25436] netlink: 4 bytes leftover after parsing attributes in process `syz.5.11275'. [ 858.170535][T25436] netlink: 32 bytes leftover after parsing attributes in process `syz.5.11275'. [ 858.448513][T25479] syz2: rxe_newlink: already configured on bond0 [ 858.509026][T25496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=25496 comm=syz.0.11290 [ 858.647505][T25474] vcan0 speed is unknown, defaulting to 1000 [ 858.716134][T25474] lo speed is unknown, defaulting to 1000 [ 858.898560][T25545] rdma_rxe: rxe_newlink: failed to add bond0 [ 858.966929][T25565] netlink: 12 bytes leftover after parsing attributes in process `syz.7.11304'. [ 859.247883][T25612] syz2: rxe_newlink: already configured on bond0 [ 859.423109][T25643] netlink: 40 bytes leftover after parsing attributes in process `syz.0.11325'. [ 859.475762][T25650] rdma_rxe: rxe_newlink: failed to add bond0 [ 859.476290][T25654] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=25654 comm=syz.5.11329 [ 859.657956][T25692] netlink: 40 bytes leftover after parsing attributes in process `syz.5.11338'. [ 859.819493][T25700] vcan0 speed is unknown, defaulting to 1000 [ 859.852491][T25700] lo speed is unknown, defaulting to 1000 [ 859.999015][T25723] vcan0 speed is unknown, defaulting to 1000 [ 860.055311][T25723] lo speed is unknown, defaulting to 1000 [ 860.273852][T25746] vcan0 speed is unknown, defaulting to 1000 [ 860.341729][T25751] syzkaller0: entered allmulticast mode [ 860.347322][T25746] lo speed is unknown, defaulting to 1000 [ 860.347425][T25751] syzkaller0: entered promiscuous mode [ 860.366416][T25751] syzkaller0 (unregistering): left allmulticast mode [ 860.373835][T25751] syzkaller0 (unregistering): left promiscuous mode [ 860.415099][T25752] syz2: rxe_newlink: already configured on bond0 [ 860.846144][T25767] syzkaller0: entered allmulticast mode [ 860.862154][T25767] syzkaller0: entered promiscuous mode [ 860.869516][T25773] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=25773 comm=syz.2.11359 [ 860.888371][T25767] syzkaller0 (unregistering): left allmulticast mode [ 860.895782][T25767] syzkaller0 (unregistering): left promiscuous mode [ 860.925575][T25776] syz2: rxe_newlink: already configured on bond0 [ 861.208855][T25788] vcan0 speed is unknown, defaulting to 1000 [ 861.215652][T25790] syzkaller0: entered allmulticast mode [ 861.224414][T25790] syzkaller0: entered promiscuous mode [ 861.244740][T25788] lo speed is unknown, defaulting to 1000 [ 861.295640][T25790] syzkaller0 (unregistering): left allmulticast mode [ 861.303066][T25790] syzkaller0 (unregistering): left promiscuous mode [ 861.357105][T25801] rdma_rxe: rxe_newlink: failed to add bond0 [ 861.511705][T25802] vcan0 speed is unknown, defaulting to 1000 [ 861.562926][T25802] lo speed is unknown, defaulting to 1000 [ 862.190408][T25841] vcan0 speed is unknown, defaulting to 1000 [ 862.241218][T25841] lo speed is unknown, defaulting to 1000 [ 862.516903][T25857] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=25857 comm=syz.0.11386 [ 862.612275][ T29] kauditd_printk_skb: 139 callbacks suppressed [ 862.612290][ T29] audit: type=1400 audit(1762556054.655:42882): avc: denied { map_create } for pid=25843 comm="syz.5.11383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 862.638396][ T29] audit: type=1400 audit(1762556054.655:42883): avc: denied { bpf } for pid=25843 comm="syz.5.11383" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 862.659262][ T29] audit: type=1400 audit(1762556054.655:42884): avc: denied { map_read map_write } for pid=25843 comm="syz.5.11383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 862.679408][ T29] audit: type=1400 audit(1762556054.655:42885): avc: denied { prog_load } for pid=25843 comm="syz.5.11383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 862.698971][ T29] audit: type=1400 audit(1762556054.655:42886): avc: denied { perfmon } for pid=25843 comm="syz.5.11383" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 862.720224][ T29] audit: type=1400 audit(1762556054.655:42887): avc: denied { prog_run } for pid=25843 comm="syz.5.11383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 862.791609][T25858] vcan0 speed is unknown, defaulting to 1000 [ 862.821056][ T29] audit: type=1400 audit(1762556054.785:42888): avc: denied { create } for pid=25843 comm="syz.5.11383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 862.841963][ T29] audit: type=1400 audit(1762556054.805:42889): avc: denied { create } for pid=25862 comm="syz.0.11387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 862.862693][ T29] audit: type=1400 audit(1762556054.805:42890): avc: denied { open } for pid=25862 comm="syz.0.11387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 862.882183][ T29] audit: type=1400 audit(1762556054.805:42891): avc: denied { kernel } for pid=25862 comm="syz.0.11387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 862.889599][T25858] lo speed is unknown, defaulting to 1000 [ 862.957197][T25873] x_tables: unsorted entry at hook 2 [ 863.206336][T25905] netlink: 12 bytes leftover after parsing attributes in process `syz.2.11403'. [ 863.896143][T25908] vcan0 speed is unknown, defaulting to 1000 [ 863.963410][T25908] lo speed is unknown, defaulting to 1000 [ 864.007444][T25909] vcan0 speed is unknown, defaulting to 1000 [ 864.042090][T25909] lo speed is unknown, defaulting to 1000 [ 864.120543][T25919] netlink: 68 bytes leftover after parsing attributes in process `syz.2.11408'. [ 864.581636][T25934] vcan0 speed is unknown, defaulting to 1000 [ 864.721272][T25964] vcan0 speed is unknown, defaulting to 1000 [ 864.776610][T25964] lo speed is unknown, defaulting to 1000 [ 864.854727][T25934] lo speed is unknown, defaulting to 1000 [ 865.270251][T25979] vcan0 speed is unknown, defaulting to 1000 [ 865.305469][T25979] lo speed is unknown, defaulting to 1000 [ 865.414061][T25973] vcan0 speed is unknown, defaulting to 1000 [ 865.473571][T25973] lo speed is unknown, defaulting to 1000 [ 865.630529][T26016] netlink: 12 bytes leftover after parsing attributes in process `syz.7.11444'. [ 866.042139][T26069] netlink: 12 bytes leftover after parsing attributes in process `syz.5.11468'. [ 866.103510][T26078] x_tables: unsorted entry at hook 2 [ 866.377224][T26113] vcan0 speed is unknown, defaulting to 1000 [ 866.415432][T26113] lo speed is unknown, defaulting to 1000 [ 866.431616][T26129] rdma_rxe: rxe_newlink: failed to add bond0 [ 866.442220][T26134] netlink: 4 bytes leftover after parsing attributes in process `syz.6.11486'. [ 866.451863][T26134] netlink: 32 bytes leftover after parsing attributes in process `syz.6.11486'. [ 866.470978][T26137] x_tables: unsorted entry at hook 2 [ 866.676752][T26175] rdma_rxe: rxe_newlink: failed to add bond0 [ 866.721017][T26186] x_tables: unsorted entry at hook 2 [ 866.797826][T26197] netlink: 4 bytes leftover after parsing attributes in process `syz.7.11502'. [ 866.824369][T26197] netlink: 32 bytes leftover after parsing attributes in process `syz.7.11502'. [ 867.030874][T26240] x_tables: unsorted entry at hook 2 [ 867.063557][T26242] rdma_rxe: rxe_newlink: failed to add bond0 [ 867.163784][T26264] x_tables: unsorted entry at hook 2 [ 867.171951][T26261] netlink: 4 bytes leftover after parsing attributes in process `syz.2.11515'. [ 867.185656][T26261] netlink: 32 bytes leftover after parsing attributes in process `syz.2.11515'. [ 867.631184][T26323] vcan0 speed is unknown, defaulting to 1000 [ 867.651628][T26341] x_tables: unsorted entry at hook 2 [ 867.664666][T26323] lo speed is unknown, defaulting to 1000 [ 868.095399][T26402] vcan0 speed is unknown, defaulting to 1000 [ 868.150436][T26402] lo speed is unknown, defaulting to 1000 [ 868.419586][T26410] netlink: 12 bytes leftover after parsing attributes in process `syz.0.11542'. [ 868.472589][T26423] x_tables: unsorted entry at hook 2 [ 868.918564][T26491] vcan0 speed is unknown, defaulting to 1000 [ 868.951137][T26491] lo speed is unknown, defaulting to 1000 [ 869.259075][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 869.259091][ T29] audit: type=1326 audit(1762556061.295:42955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26558 comm="syz.2.11573" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c56a3efc9 code=0x7ffc0000 [ 869.289108][ T29] audit: type=1326 audit(1762556061.295:42956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26558 comm="syz.2.11573" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c56a3efc9 code=0x7ffc0000 [ 869.313288][ T29] audit: type=1326 audit(1762556061.295:42957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26558 comm="syz.2.11573" exe="/root/syz-executor" sig=0 arch=c000003e syscall=69 compat=0 ip=0x7f6c56a3efc9 code=0x7ffc0000 [ 869.912211][T26610] vcan0 speed is unknown, defaulting to 1000 [ 869.945642][T26610] lo speed is unknown, defaulting to 1000 [ 870.040239][T26629] __nla_validate_parse: 2 callbacks suppressed [ 870.040312][T26629] netlink: 4 bytes leftover after parsing attributes in process `syz.5.11593'. [ 870.058391][T26629] netlink: 32 bytes leftover after parsing attributes in process `syz.5.11593'. [ 870.960673][T26661] vcan0 speed is unknown, defaulting to 1000 [ 871.014032][T26661] lo speed is unknown, defaulting to 1000 [ 871.097472][T26668] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=26668 comm=syz.2.11607 [ 871.212304][ T29] audit: type=1400 audit(1762556063.255:42958): avc: denied { read } for pid=26675 comm="syz.0.11609" dev="nsfs" ino=4026532370 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 871.233927][ T29] audit: type=1400 audit(1762556063.255:42959): avc: denied { open } for pid=26675 comm="syz.0.11609" path="net:[4026532370]" dev="nsfs" ino=4026532370 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 871.283982][ T29] audit: type=1400 audit(1762556063.255:42960): avc: denied { create } for pid=26675 comm="syz.0.11609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 871.304761][ T29] audit: type=1400 audit(1762556063.255:42961): avc: denied { write } for pid=26675 comm="syz.0.11609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 871.325424][ T29] audit: type=1400 audit(1762556063.275:42962): avc: denied { execmem } for pid=26675 comm="syz.0.11609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 871.353736][ T29] audit: type=1400 audit(1762556063.385:42963): avc: denied { prog_load } for pid=26677 comm="syz.7.11610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 871.373083][ T29] audit: type=1400 audit(1762556063.385:42964): avc: denied { bpf } for pid=26677 comm="syz.7.11610" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 872.313821][T26686] vcan0 speed is unknown, defaulting to 1000 [ 872.495490][T16739] batadv3: left allmulticast mode [ 872.500569][T16739] batadv3: left promiscuous mode [ 872.505659][T16739] bridge0: port 5(batadv3) entered disabled state [ 872.523770][T16739] batadv2: left allmulticast mode [ 872.528844][T16739] batadv2: left promiscuous mode [ 872.534644][T16739] bridge0: port 4(batadv2) entered disabled state [ 872.541896][T16739] batadv1: left allmulticast mode [ 872.546929][T16739] batadv1: left promiscuous mode [ 872.552048][T16739] bridge0: port 3(batadv1) entered disabled state [ 872.559544][T16739] bridge_slave_1: left allmulticast mode [ 872.565753][T16739] bridge_slave_1: left promiscuous mode [ 872.571490][T16739] bridge0: port 2(bridge_slave_1) entered disabled state [ 872.590994][T16739] bridge_slave_0: left allmulticast mode [ 872.596668][T16739] bridge_slave_0: left promiscuous mode [ 872.602291][T16739] bridge0: port 1(bridge_slave_0) entered disabled state [ 872.721031][T16739] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 872.730314][T16739] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 872.739208][T16739] bond0 (unregistering): Released all slaves [ 872.753608][T26711] vcan0 speed is unknown, defaulting to 1000 [ 872.753633][T26686] lo speed is unknown, defaulting to 1000 [ 872.792573][T26711] lo speed is unknown, defaulting to 1000 [ 872.858918][T26702] vcan0 speed is unknown, defaulting to 1000 [ 872.912808][T26702] lo speed is unknown, defaulting to 1000 [ 872.949101][T26724] vcan0 speed is unknown, defaulting to 1000 [ 872.982637][T26724] lo speed is unknown, defaulting to 1000 [ 873.299383][T16739] hsr_slave_0: left promiscuous mode [ 873.310832][T16739] hsr_slave_1: left promiscuous mode [ 873.335078][T26763] netlink: 12 bytes leftover after parsing attributes in process `syz.2.11629'. [ 873.345553][T16739] pimreg (unregistering): left allmulticast mode [ 873.367959][T26728] Set syz1 is full, maxelem 65536 reached [ 873.413522][T16739] team0 (unregistering): Port device team_slave_1 removed [ 873.424483][T16739] team0 (unregistering): Port device team_slave_0 removed [ 873.462437][T17970] smc: removing ib device syz1 [ 873.491687][T26702] chnl_net:caif_netlink_parms(): no params data found [ 873.529426][T26790] rdma_rxe: rxe_newlink: failed to add bond0 [ 873.560993][T26759] rdma_rxe: rxe_newlink: failed to add bond0 [ 873.785892][T26702] bridge0: port 1(bridge_slave_0) entered blocking state [ 873.793084][T26702] bridge0: port 1(bridge_slave_0) entered disabled state [ 873.817497][T26702] bridge_slave_0: entered allmulticast mode [ 873.828219][T26702] bridge_slave_0: entered promiscuous mode [ 873.839052][T26702] bridge0: port 2(bridge_slave_1) entered blocking state [ 873.846241][T26702] bridge0: port 2(bridge_slave_1) entered disabled state [ 873.859723][T26702] bridge_slave_1: entered allmulticast mode [ 873.891283][T26702] bridge_slave_1: entered promiscuous mode [ 873.946525][T26702] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 873.969189][T26702] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 874.004933][T26828] lo speed is unknown, defaulting to 1000 [ 874.005798][T26702] team0: Port device team_slave_0 added [ 874.017774][T26702] team0: Port device team_slave_1 added [ 874.056619][T26702] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 874.063647][T26702] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 874.089585][T26702] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 874.103149][T26702] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 874.110138][T26702] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 874.136084][T26702] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 874.187010][T26702] hsr_slave_0: entered promiscuous mode [ 874.193230][T26702] hsr_slave_1: entered promiscuous mode [ 874.199322][T26702] debugfs: 'hsr0' already exists in 'hsr' [ 874.205168][T26702] Cannot create hsr debugfs directory [ 874.407095][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 874.407108][ T29] audit: type=1326 audit(1762556066.445:42999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26892 comm="syz.2.11638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6c56a3efc9 code=0x7ffc0000 [ 874.437380][ T29] audit: type=1326 audit(1762556066.455:43000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26892 comm="syz.2.11638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=69 compat=0 ip=0x7f6c56a3efc9 code=0x7ffc0000 [ 874.553354][T26913] netlink: 12 bytes leftover after parsing attributes in process `syz.6.11640'. [ 874.591608][ T29] audit: type=1400 audit(1762556066.635:43001): avc: denied { ioctl } for pid=26914 comm="syz.6.11641" path="socket:[134141]" dev="sockfs" ino=134141 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 874.622991][ T29] audit: type=1400 audit(1762556066.665:43002): avc: denied { write } for pid=26917 comm="syz.6.11643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 874.659037][T26702] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 874.667998][T26702] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 874.677408][T26702] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 874.701906][T26702] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 874.734856][T26925] syzkaller0: entered allmulticast mode [ 874.740563][T26925] syzkaller0: entered promiscuous mode [ 874.747381][T26925] syzkaller0 (unregistering): left allmulticast mode [ 874.754092][T26925] syzkaller0 (unregistering): left promiscuous mode [ 874.797150][T26932] rdma_rxe: rxe_newlink: failed to add bond0 [ 874.816636][T26702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 874.831844][T26702] 8021q: adding VLAN 0 to HW filter on device team0 [ 874.841792][ T53] bridge0: port 1(bridge_slave_0) entered blocking state [ 874.848948][ T53] bridge0: port 1(bridge_slave_0) entered forwarding state [ 874.859690][ T53] bridge0: port 2(bridge_slave_1) entered blocking state [ 874.866839][ T53] bridge0: port 2(bridge_slave_1) entered forwarding state [ 874.935561][T26702] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 875.044221][T26702] veth0_vlan: entered promiscuous mode [ 875.051752][T26702] veth1_vlan: entered promiscuous mode [ 875.066339][T26702] veth0_macvtap: entered promiscuous mode [ 875.073627][T26702] veth1_macvtap: entered promiscuous mode [ 875.084096][T26702] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 875.094334][T26964] netlink: 12 bytes leftover after parsing attributes in process `syz.0.11651'. [ 875.106101][T26702] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 875.128596][T17970] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 875.141511][T17970] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 875.165446][T17970] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 875.181036][T17970] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 875.189796][T26960] lo speed is unknown, defaulting to 1000 [ 875.189829][ T29] audit: type=1400 audit(1762556067.215:43003): avc: denied { mounton } for pid=26702 comm="syz-executor" path="/root/syzkaller.xZO8nE/syz-tmp" dev="sda1" ino=2081 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 875.220122][ T29] audit: type=1400 audit(1762556067.225:43004): avc: denied { mount } for pid=26702 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 875.242479][ T29] audit: type=1400 audit(1762556067.225:43005): avc: denied { mounton } for pid=26702 comm="syz-executor" path="/root/syzkaller.xZO8nE/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 875.267988][ T29] audit: type=1400 audit(1762556067.225:43006): avc: denied { mount } for pid=26702 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 875.290818][ T29] audit: type=1400 audit(1762556067.285:43007): avc: denied { mounton } for pid=26702 comm="syz-executor" path="/root/syzkaller.xZO8nE/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 875.317751][ T29] audit: type=1400 audit(1762556067.285:43008): avc: denied { mounton } for pid=26702 comm="syz-executor" path="/root/syzkaller.xZO8nE/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=135133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 875.414746][T26977] syzkaller0: entered allmulticast mode [ 875.420526][T26977] syzkaller0: entered promiscuous mode [ 875.428409][T26977] syzkaller0 (unregistering): left allmulticast mode [ 875.430856][T26989] netlink: 12 bytes leftover after parsing attributes in process `syz.7.11661'. [ 875.435178][T26977] syzkaller0 (unregistering): left promiscuous mode [ 875.478139][T26995] rdma_rxe: rxe_newlink: failed to add bond0 [ 876.264940][T27095] lo speed is unknown, defaulting to 1000 [ 876.284937][T27125] netlink: 12 bytes leftover after parsing attributes in process `syz.6.11673'. [ 876.392136][ T1477] batadv1: left allmulticast mode [ 876.397242][ T1477] batadv1: left promiscuous mode [ 876.402329][ T1477] bridge0: port 3(batadv1) entered disabled state [ 876.418267][T27143] x_tables: unsorted entry at hook 2 [ 876.418405][ T1477] bridge_slave_1: left allmulticast mode [ 876.429339][ T1477] bridge_slave_1: left promiscuous mode [ 876.435014][ T1477] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.442971][ T1477] bridge_slave_0: left allmulticast mode [ 876.448649][ T1477] bridge_slave_0: left promiscuous mode [ 876.454425][ T1477] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.551286][T16739] smc: removing ib device syz2 [ 876.551444][ T1477] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 876.577881][ T1477] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 876.594452][ T1477] bond0 (unregistering): Released all slaves [ 876.613871][T27095] chnl_net:caif_netlink_parms(): no params data found [ 876.684931][T27178] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=27178 comm=syz.7.11681 [ 876.717272][T27095] bridge0: port 1(bridge_slave_0) entered blocking state [ 876.724467][T27095] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.733375][T27095] bridge_slave_0: entered allmulticast mode [ 876.741518][T27095] bridge_slave_0: entered promiscuous mode [ 876.749529][T27095] bridge0: port 2(bridge_slave_1) entered blocking state [ 876.756657][T27095] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.764871][T27095] bridge_slave_1: entered allmulticast mode [ 876.776839][T27095] bridge_slave_1: entered promiscuous mode [ 876.812789][T27095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 876.823611][T27095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 876.846358][T27095] team0: Port device team_slave_0 added [ 876.853561][T27095] team0: Port device team_slave_1 added [ 876.869655][ T1477] tipc: Disabling bearer [ 876.874662][ T1477] tipc: Left network mode [ 876.879690][T27095] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 876.886633][T27095] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 876.912645][T27095] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 876.928088][T27095] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 876.935056][T27095] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 876.961018][T27095] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 877.072253][ T1477] hsr_slave_0: left promiscuous mode [ 877.078053][ T1477] hsr_slave_1: left promiscuous mode [ 877.092063][ T1477] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 877.099590][ T1477] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 877.210637][ T1477] team0 (unregistering): Port device team_slave_1 removed [ 877.244164][ T1477] team0 (unregistering): Port device team_slave_0 removed [ 877.381969][T27203] netlink: 12 bytes leftover after parsing attributes in process `syz.5.11687'. [ 877.401040][T27188] lo speed is unknown, defaulting to 1000 [ 877.435518][T27095] hsr_slave_0: entered promiscuous mode [ 877.445967][T27095] hsr_slave_1: entered promiscuous mode [ 877.661401][T27228] netlink: 12 bytes leftover after parsing attributes in process `syz.2.11697'. [ 878.012012][T27250] infiniband syz2: set active [ 878.016721][T27250] infiniband syz2: added bond0 [ 878.035461][T27250] RDS/IB: syz2: added [ 878.039553][T27250] smc: adding ib device syz2 with port count 1 [ 878.045730][T27250] smc: ib device syz2 port 1 has no pnetid [ 878.515336][T27095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 878.538574][T27258] lo speed is unknown, defaulting to 1000 [ 878.562691][T27095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 878.583950][T27095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 878.618394][T27095] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 878.710846][T27095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 878.727693][T27095] 8021q: adding VLAN 0 to HW filter on device team0 [ 878.738529][T17494] bridge0: port 1(bridge_slave_0) entered blocking state [ 878.745629][T17494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 879.129552][T27295] lo speed is unknown, defaulting to 1000 [ 879.184131][T17494] bridge0: port 2(bridge_slave_1) entered blocking state [ 879.191224][T17494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 879.256284][T27095] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 879.341599][T27095] veth0_vlan: entered promiscuous mode [ 879.384165][T27095] veth1_vlan: entered promiscuous mode [ 879.421308][T27095] veth0_macvtap: entered promiscuous mode [ 879.435968][T27330] netlink: 4 bytes leftover after parsing attributes in process `syz.7.11733'. [ 879.458803][T27332] x_tables: unsorted entry at hook 2 [ 879.468830][T27095] veth1_macvtap: entered promiscuous mode [ 879.537470][T27095] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 879.556916][T27095] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 879.579173][T27330] netlink: 32 bytes leftover after parsing attributes in process `syz.7.11733'. [ 879.595948][ T53] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 879.625547][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 879.625561][ T29] audit: type=1400 audit(1762556071.665:43045): avc: denied { mounton } for pid=27095 comm="syz-executor" path="/root/syzkaller.hl3vxL/syz-tmp" dev="sda1" ino=2083 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 879.673922][ T53] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 879.737225][ T53] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 879.746713][ T29] audit: type=1400 audit(1762556071.715:43046): avc: denied { mount } for pid=27095 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 879.769039][ T29] audit: type=1400 audit(1762556071.715:43047): avc: denied { mounton } for pid=27095 comm="syz-executor" path="/root/syzkaller.hl3vxL/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 879.794661][ T29] audit: type=1400 audit(1762556071.715:43048): avc: denied { mount } for pid=27095 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 879.816919][ T29] audit: type=1400 audit(1762556071.715:43049): avc: denied { mounton } for pid=27095 comm="syz-executor" path="/root/syzkaller.hl3vxL/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 879.836727][T27348] rdma_rxe: rxe_newlink: failed to add bond0 [ 879.843841][ T29] audit: type=1400 audit(1762556071.715:43050): avc: denied { mounton } for pid=27095 comm="syz-executor" path="/root/syzkaller.hl3vxL/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=137266 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 879.877836][ T29] audit: type=1400 audit(1762556071.715:43051): avc: denied { unmount } for pid=27095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 879.897851][ T29] audit: type=1400 audit(1762556071.735:43052): avc: denied { mounton } for pid=27095 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 879.921070][ T29] audit: type=1400 audit(1762556071.735:43053): avc: denied { mount } for pid=27095 comm="syz-executor" name="/" dev="gadgetfs" ino=4657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 879.956585][ T53] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 880.001840][T27363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=27363 comm=syz.7.11747 [ 880.170557][ T29] audit: type=1400 audit(1762556072.185:43054): avc: denied { prog_load } for pid=27377 comm="syz.6.11754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 880.958635][T27428] lo speed is unknown, defaulting to 1000 [ 881.350262][T27444] netlink: 12 bytes leftover after parsing attributes in process `syz.0.11776'. [ 881.448408][T27429] lo speed is unknown, defaulting to 1000 [ 881.634217][T27461] x_tables: unsorted entry at hook 2 [ 881.779252][T27471] syzkaller0: entered allmulticast mode [ 881.793289][T27471] syzkaller0: entered promiscuous mode [ 881.811199][T27471] syzkaller0 (unregistering): left allmulticast mode [ 881.817929][T27471] syzkaller0 (unregistering): left promiscuous mode [ 881.856132][T27479] syz2: rxe_newlink: already configured on bond0 [ 882.280728][T27494] netlink: 12 bytes leftover after parsing attributes in process `syz.0.11796'. [ 882.792218][T27521] lo speed is unknown, defaulting to 1000 [ 882.947412][T27528] lo speed is unknown, defaulting to 1000 [ 883.655624][T27551] lo speed is unknown, defaulting to 1000 [ 883.694221][T27553] netlink: 4 bytes leftover after parsing attributes in process `syz.7.11818'. [ 883.725513][T27557] x_tables: unsorted entry at hook 2 [ 883.741937][T27553] netlink: 32 bytes leftover after parsing attributes in process `syz.7.11818'. [ 883.947427][T27569] lo speed is unknown, defaulting to 1000 [ 884.104691][T27578] netlink: 28 bytes leftover after parsing attributes in process `syz.6.11827'. [ 884.114271][T27578] netlink: 28 bytes leftover after parsing attributes in process `syz.6.11827'. [ 884.215858][T27583] lo speed is unknown, defaulting to 1000 [ 884.696901][T27595] lo speed is unknown, defaulting to 1000 [ 884.953340][T27602] x_tables: unsorted entry at hook 2 [ 885.069080][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 885.069109][ T29] audit: type=1326 audit(1762556077.105:43101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27613 comm="syz.7.11839" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f117a7fefc9 code=0x7ffc0000 [ 885.128906][ T29] audit: type=1326 audit(1762556077.135:43102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27613 comm="syz.7.11839" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f117a7fefc9 code=0x7ffc0000 [ 885.152671][ T29] audit: type=1326 audit(1762556077.145:43103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27613 comm="syz.7.11839" exe="/root/syz-executor" sig=0 arch=c000003e syscall=69 compat=0 ip=0x7f117a7fefc9 code=0x7ffc0000 [ 885.176290][ T29] audit: type=1326 audit(1762556077.145:43104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27613 comm="syz.7.11839" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f117a7fefc9 code=0x7ffc0000 [ 885.199967][ T29] audit: type=1326 audit(1762556077.145:43105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27613 comm="syz.7.11839" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f117a7fefc9 code=0x7ffc0000 [ 885.369294][T27627] lo speed is unknown, defaulting to 1000 [ 885.678147][ T29] audit: type=1400 audit(1762556077.385:43106): avc: denied { allowed } for pid=27621 comm="syz.6.11842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 885.697868][ T29] audit: type=1400 audit(1762556077.385:43107): avc: denied { create } for pid=27621 comm="syz.6.11842" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 885.734958][ T29] audit: type=1400 audit(1762556077.775:43108): avc: denied { relabelfrom } for pid=27635 comm="syz.0.11847" name="" dev="pipefs" ino=137768 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 885.757931][ T29] audit: type=1400 audit(1762556077.775:43109): avc: denied { mac_admin } for pid=27635 comm="syz.0.11847" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 885.779295][ T29] audit: type=1400 audit(1762556077.775:43110): avc: denied { relabelto } for pid=27635 comm="syz.0.11847" name="" dev="pipefs" ino=137768 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:hald_keymap_exec_t:s0" [ 885.877844][T27637] lo speed is unknown, defaulting to 1000 [ 885.896868][T27650] syzkaller0: entered allmulticast mode [ 885.918230][T27650] syzkaller0: entered promiscuous mode [ 885.971243][T27650] syzkaller0 (unregistering): left allmulticast mode [ 885.977972][T27650] syzkaller0 (unregistering): left promiscuous mode [ 885.988220][T27654] rdma_rxe: rxe_newlink: failed to add bond0 [ 886.109776][T27657] lo speed is unknown, defaulting to 1000 [ 886.231752][T27662] netlink: 12 bytes leftover after parsing attributes in process `syz.6.11855'. [ 886.565163][T27680] FAULT_INJECTION: forcing a failure. [ 886.565163][T27680] name failslab, interval 1, probability 0, space 0, times 0 [ 886.577952][T27680] CPU: 0 UID: 0 PID: 27680 Comm: syz.7.11863 Not tainted syzkaller #0 PREEMPT(voluntary) [ 886.577970][T27680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 886.578011][T27680] Call Trace: [ 886.578016][T27680] [ 886.578021][T27680] __dump_stack+0x1d/0x30 [ 886.578043][T27680] dump_stack_lvl+0xe8/0x140 [ 886.578066][T27680] dump_stack+0x15/0x1b [ 886.578086][T27680] should_fail_ex+0x265/0x280 [ 886.578099][T27680] should_failslab+0x8c/0xb0 [ 886.578123][T27680] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 886.578140][T27680] ? __d_alloc+0x3d/0x340 [ 886.578158][T27680] __d_alloc+0x3d/0x340 [ 886.578220][T27680] d_alloc_parallel+0x58/0xc70 [ 886.578282][T27680] ? __rcu_read_unlock+0x4f/0x70 [ 886.578297][T27680] ? __d_lookup+0x316/0x340 [ 886.578310][T27680] path_openat+0x6b5/0x2170 [ 886.578329][T27680] do_filp_open+0x109/0x230 [ 886.578436][T27680] do_sys_openat2+0xa6/0x110 [ 886.578448][T27680] __x64_sys_openat+0xf2/0x120 [ 886.578461][T27680] x64_sys_call+0x2eab/0x3000 [ 886.578474][T27680] do_syscall_64+0xd2/0x200 [ 886.578485][T27680] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 886.578538][T27680] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 886.578632][T27680] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 886.578661][T27680] RIP: 0033:0x7f117a7fefc9 [ 886.578671][T27680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 886.578696][T27680] RSP: 002b:00007f1179267038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 886.578709][T27680] RAX: ffffffffffffffda RBX: 00007f117aa55fa0 RCX: 00007f117a7fefc9 [ 886.578716][T27680] RDX: 000000000000275a RSI: 0000200000000240 RDI: 0000000000000003 [ 886.578732][T27680] RBP: 00007f1179267090 R08: 0000000000000000 R09: 0000000000000000 [ 886.578745][T27680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 886.578782][T27680] R13: 00007f117aa56038 R14: 00007f117aa55fa0 R15: 00007ffcf5b878a8 [ 886.578794][T27680] [ 886.863817][T27687] netlink: 4 bytes leftover after parsing attributes in process `syz.5.11866'. [ 886.962102][T27687] netlink: 32 bytes leftover after parsing attributes in process `syz.5.11866'. [ 887.040213][T27718] netlink: 28 bytes leftover after parsing attributes in process `syz.2.11876'. [ 887.057301][T27718] netlink: 28 bytes leftover after parsing attributes in process `syz.2.11876'. [ 887.371795][T27770] lo speed is unknown, defaulting to 1000 [ 887.595949][T27791] netlink: 12 bytes leftover after parsing attributes in process `syz.5.11888'. [ 888.887861][T27913] lo speed is unknown, defaulting to 1000 [ 888.916870][T27936] FAULT_INJECTION: forcing a failure. [ 888.916870][T27936] name failslab, interval 1, probability 0, space 0, times 0 [ 888.929535][T27936] CPU: 1 UID: 0 PID: 27936 Comm: syz.5.11905 Not tainted syzkaller #0 PREEMPT(voluntary) [ 888.929564][T27936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 888.929610][T27936] Call Trace: [ 888.929617][T27936] [ 888.929624][T27936] __dump_stack+0x1d/0x30 [ 888.929649][T27936] dump_stack_lvl+0xe8/0x140 [ 888.929744][T27936] dump_stack+0x15/0x1b [ 888.929763][T27936] should_fail_ex+0x265/0x280 [ 888.929786][T27936] should_failslab+0x8c/0xb0 [ 888.929859][T27936] kmem_cache_alloc_noprof+0x50/0x480 [ 888.929888][T27936] ? alloc_empty_file+0x76/0x200 [ 888.929906][T27936] alloc_empty_file+0x76/0x200 [ 888.929922][T27936] alloc_file_pseudo+0xc6/0x160 [ 888.929941][T27936] anon_inode_getfd+0xc1/0x150 [ 888.929993][T27936] bpf_map_new_fd+0x52/0x70 [ 888.930021][T27936] map_create+0xd25/0xda0 [ 888.930039][T27936] ? security_bpf+0x2b/0x90 [ 888.930069][T27936] __sys_bpf+0x54e/0x7c0 [ 888.930091][T27936] __x64_sys_bpf+0x41/0x50 [ 888.930155][T27936] x64_sys_call+0x2aee/0x3000 [ 888.930181][T27936] do_syscall_64+0xd2/0x200 [ 888.930201][T27936] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 888.930286][T27936] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 888.930396][T27936] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 888.930420][T27936] RIP: 0033:0x7fdb2401efc9 [ 888.930437][T27936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 888.930465][T27936] RSP: 002b:00007fdb22a7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 888.930487][T27936] RAX: ffffffffffffffda RBX: 00007fdb24275fa0 RCX: 00007fdb2401efc9 [ 888.930551][T27936] RDX: 0000000000000050 RSI: 0000200000001b80 RDI: 0000000000000000 [ 888.930563][T27936] RBP: 00007fdb22a7f090 R08: 0000000000000000 R09: 0000000000000000 [ 888.930575][T27936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 888.930586][T27936] R13: 00007fdb24276038 R14: 00007fdb24275fa0 R15: 00007ffea6352218 [ 888.930605][T27936] [ 889.206243][T27954] netlink: 12 bytes leftover after parsing attributes in process `syz.5.11910'. [ 889.237910][T27913] chnl_net:caif_netlink_parms(): no params data found [ 889.313007][ T53] bridge_slave_1: left allmulticast mode [ 889.318675][ T53] bridge_slave_1: left promiscuous mode [ 889.324364][ T53] bridge0: port 2(bridge_slave_1) entered disabled state [ 889.339978][ T53] bridge_slave_0: left allmulticast mode [ 889.345666][ T53] bridge_slave_0: left promiscuous mode [ 889.351414][ T53] bridge0: port 1(bridge_slave_0) entered disabled state [ 889.601888][ T53] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 889.613093][ T53] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 889.622273][ T53] bond0 (unregistering): Released all slaves [ 889.666391][T27965] lo speed is unknown, defaulting to 1000 [ 889.755486][T27913] bridge0: port 1(bridge_slave_0) entered blocking state [ 889.762655][T27913] bridge0: port 1(bridge_slave_0) entered disabled state [ 889.790178][T27913] bridge_slave_0: entered allmulticast mode [ 889.804592][T27913] bridge_slave_0: entered promiscuous mode [ 889.824117][ T53] hsr_slave_0: left promiscuous mode [ 889.834450][ T53] hsr_slave_1: left promiscuous mode [ 889.843488][ T53] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 889.855769][ T53] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 889.932450][ T53] team0 (unregistering): Port device team_slave_1 removed [ 889.946925][ T53] team0 (unregistering): Port device team_slave_0 removed [ 890.001753][T27913] bridge0: port 2(bridge_slave_1) entered blocking state [ 890.008853][T27913] bridge0: port 2(bridge_slave_1) entered disabled state [ 890.022079][T27913] bridge_slave_1: entered allmulticast mode [ 890.028773][T27913] bridge_slave_1: entered promiscuous mode [ 890.112661][T27913] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 890.130937][T27913] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 890.158892][T27913] team0: Port device team_slave_0 added [ 890.169811][T27913] team0: Port device team_slave_1 added [ 890.199442][T27913] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 890.206460][T27913] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 890.232424][T27913] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 890.248560][T27913] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 890.255553][T27913] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 890.281501][T27913] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 890.295257][T28052] syzkaller0: entered allmulticast mode [ 890.322629][T28052] syzkaller0: entered promiscuous mode [ 890.333411][T27913] hsr_slave_0: entered promiscuous mode [ 890.340172][T27913] hsr_slave_1: entered promiscuous mode [ 890.347368][T27913] debugfs: 'hsr0' already exists in 'hsr' [ 890.353151][T27913] Cannot create hsr debugfs directory [ 890.362040][T28052] syzkaller0 (unregistering): left allmulticast mode [ 890.368764][T28052] syzkaller0 (unregistering): left promiscuous mode [ 890.389420][T28074] rdma_rxe: rxe_newlink: failed to add bond0 [ 890.936542][T27913] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 890.946046][T27913] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 890.955063][T27913] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 890.964133][T27913] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 891.002649][T27913] 8021q: adding VLAN 0 to HW filter on device bond0 [ 891.016405][T27913] 8021q: adding VLAN 0 to HW filter on device team0 [ 891.026457][ T53] bridge0: port 1(bridge_slave_0) entered blocking state [ 891.033574][ T53] bridge0: port 1(bridge_slave_0) entered forwarding state [ 891.044917][T17970] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.052016][T17970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 891.118935][T27913] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 891.218085][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 891.218100][ T29] audit: type=1326 audit(1762556083.255:43129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28218 comm="syz.6.11923" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde81caefc9 code=0x7ffc0000 [ 891.225298][T27913] veth0_vlan: entered promiscuous mode [ 891.270492][T27913] veth1_vlan: entered promiscuous mode [ 891.292366][ T29] audit: type=1326 audit(1762556083.295:43130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28218 comm="syz.6.11923" exe="/root/syz-executor" sig=0 arch=c000003e syscall=69 compat=0 ip=0x7fde81caefc9 code=0x7ffc0000 [ 891.295606][T27913] veth0_macvtap: entered promiscuous mode [ 891.316073][ T29] audit: type=1326 audit(1762556083.295:43131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28218 comm="syz.6.11923" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde81caefc9 code=0x7ffc0000 [ 891.342920][T27913] veth1_macvtap: entered promiscuous mode [ 891.345489][ T29] audit: type=1326 audit(1762556083.295:43132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28218 comm="syz.6.11923" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde81caefc9 code=0x7ffc0000 [ 891.409627][T27913] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 891.427751][T27913] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 891.445861][ T53] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 891.486360][ T53] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 891.499957][ T53] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 891.516978][ T29] audit: type=1400 audit(1762556083.525:43133): avc: denied { mounton } for pid=27913 comm="syz-executor" path="/root/syzkaller.Osyeux/syz-tmp" dev="sda1" ino=2085 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 891.529582][ T53] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 891.541615][ T29] audit: type=1400 audit(1762556083.525:43134): avc: denied { mount } for pid=27913 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 891.572491][ T29] audit: type=1400 audit(1762556083.525:43135): avc: denied { mounton } for pid=27913 comm="syz-executor" path="/root/syzkaller.Osyeux/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 891.598009][ T29] audit: type=1400 audit(1762556083.525:43136): avc: denied { mount } for pid=27913 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 891.620445][ T29] audit: type=1400 audit(1762556083.525:43137): avc: denied { mounton } for pid=27913 comm="syz-executor" path="/root/syzkaller.Osyeux/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 891.647441][ T29] audit: type=1400 audit(1762556083.525:43138): avc: denied { mounton } for pid=27913 comm="syz-executor" path="/root/syzkaller.Osyeux/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=139474 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 891.699054][T28252] syzkaller0: entered allmulticast mode [ 891.707160][T28252] syzkaller0: entered promiscuous mode [ 891.715096][T28252] syzkaller0 (unregistering): left allmulticast mode [ 891.721886][T28252] syzkaller0 (unregistering): left promiscuous mode [ 891.750213][T28261] FAULT_INJECTION: forcing a failure. [ 891.750213][T28261] name failslab, interval 1, probability 0, space 0, times 0 [ 891.762918][T28261] CPU: 1 UID: 0 PID: 28261 Comm: syz.2.11930 Not tainted syzkaller #0 PREEMPT(voluntary) [ 891.763085][T28261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 891.763227][T28261] Call Trace: [ 891.763236][T28261] [ 891.763245][T28261] __dump_stack+0x1d/0x30 [ 891.763341][T28261] dump_stack_lvl+0xe8/0x140 [ 891.763383][T28261] dump_stack+0x15/0x1b [ 891.763404][T28261] should_fail_ex+0x265/0x280 [ 891.763427][T28261] should_failslab+0x8c/0xb0 [ 891.763460][T28261] kmem_cache_alloc_noprof+0x50/0x480 [ 891.763492][T28261] ? getname_flags+0x80/0x3b0 [ 891.763558][T28261] getname_flags+0x80/0x3b0 [ 891.763588][T28261] __x64_sys_symlinkat+0x4d/0x70 [ 891.763676][T28261] x64_sys_call+0x2941/0x3000 [ 891.763697][T28261] do_syscall_64+0xd2/0x200 [ 891.763716][T28261] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 891.763822][T28261] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 891.763913][T28261] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 891.763932][T28261] RIP: 0033:0x7fb1c28defc9 [ 891.763959][T28261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 891.763976][T28261] RSP: 002b:00007fb1c1347038 EFLAGS: 00000246 ORIG_RAX: 000000000000010a [ 891.763994][T28261] RAX: ffffffffffffffda RBX: 00007fb1c2b35fa0 RCX: 00007fb1c28defc9 [ 891.764006][T28261] RDX: 0000200000000000 RSI: ffffffffffffff9c RDI: 0000200000001040 [ 891.764091][T28261] RBP: 00007fb1c1347090 R08: 0000000000000000 R09: 0000000000000000 [ 891.764101][T28261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 891.764136][T28261] R13: 00007fb1c2b36038 R14: 00007fb1c2b35fa0 R15: 00007fff2b183cb8 [ 891.764191][T28261] [ 891.764333][T28265] rdma_rxe: rxe_newlink: failed to add bond0 [ 892.016014][T28267] rdma_rxe: rxe_newlink: failed to add bond0 [ 892.106729][T28290] syzkaller0: entered allmulticast mode [ 892.112665][T28290] syzkaller0: entered promiscuous mode [ 892.120293][T28290] syzkaller0 (unregistering): left allmulticast mode [ 892.126995][T28290] syzkaller0 (unregistering): left promiscuous mode [ 892.170779][T28294] rdma_rxe: rxe_newlink: failed to add bond0 [ 892.387979][T28320] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=28320 comm=syz.2.11943 [ 892.701235][T28343] netlink: 24 bytes leftover after parsing attributes in process `syz.0.11950'. [ 893.375796][T28367] netlink: 4 bytes leftover after parsing attributes in process `syz.2.11957'. [ 893.386067][T28367] netlink: 32 bytes leftover after parsing attributes in process `syz.2.11957'. [ 893.870487][T28390] sd 0:0:1:0: device reset [ 894.364351][T28410] block device autoloading is deprecated and will be removed. [ 894.400389][T28415] netlink: 4 bytes leftover after parsing attributes in process `syz.5.11972'. [ 894.573299][T28415] netlink: 32 bytes leftover after parsing attributes in process `syz.5.11972'. [ 894.723540][T28425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=538 sclass=netlink_route_socket pid=28425 comm=syz.5.11974 [ 894.950803][T28433] x_tables: unsorted entry at hook 2 [ 895.132485][ T3409] hid-generic 0000:0000:0000.0078: unknown main item tag 0x0 [ 895.146148][ T3409] hid-generic 0000:0000:0000.0078: hidraw0: HID v0.00 Device [syz1] on syz0 [ 895.534357][T28453] rdma_rxe: rxe_newlink: failed to add bond0 [ 895.594984][T28460] x_tables: unsorted entry at hook 2 [ 895.815093][T28475] FAULT_INJECTION: forcing a failure. [ 895.815093][T28475] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 895.828206][T28475] CPU: 1 UID: 0 PID: 28475 Comm: syz.7.11992 Not tainted syzkaller #0 PREEMPT(voluntary) [ 895.828234][T28475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 895.828249][T28475] Call Trace: [ 895.828256][T28475] [ 895.828264][T28475] __dump_stack+0x1d/0x30 [ 895.828289][T28475] dump_stack_lvl+0xe8/0x140 [ 895.828395][T28475] dump_stack+0x15/0x1b [ 895.828416][T28475] should_fail_ex+0x265/0x280 [ 895.828436][T28475] should_fail+0xb/0x20 [ 895.828529][T28475] should_fail_usercopy+0x1a/0x20 [ 895.828553][T28475] strncpy_from_user+0x25/0x230 [ 895.828580][T28475] ? __kmalloc_cache_noprof+0x249/0x4a0 [ 895.828611][T28475] getname_flags+0x230/0x3b0 [ 895.828668][T28475] __x64_sys_getxattr+0xfd/0x140 [ 895.828764][T28475] x64_sys_call+0x2f50/0x3000 [ 895.828787][T28475] do_syscall_64+0xd2/0x200 [ 895.828805][T28475] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 895.828891][T28475] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 895.828971][T28475] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 895.828990][T28475] RIP: 0033:0x7f117a7fefc9 [ 895.829007][T28475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 895.829028][T28475] RSP: 002b:00007f1179267038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf [ 895.829151][T28475] RAX: ffffffffffffffda RBX: 00007f117aa55fa0 RCX: 00007f117a7fefc9 [ 895.829167][T28475] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000200000003040 [ 895.829182][T28475] RBP: 00007f1179267090 R08: 0000000000000000 R09: 0000000000000000 [ 895.829195][T28475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 895.829210][T28475] R13: 00007f117aa56038 R14: 00007f117aa55fa0 R15: 00007ffcf5b878a8 [ 895.829228][T28475] [ 896.072776][T28473] 9pnet_fd: Insufficient options for proto=fd [ 896.087483][T28485] loop0: detected capacity change from 0 to 128 [ 896.130215][T28483] syzkaller0: entered allmulticast mode [ 896.136254][T28483] syzkaller0: entered promiscuous mode [ 896.143488][T28483] syzkaller0 (unregistering): left allmulticast mode [ 896.150231][T28483] syzkaller0 (unregistering): left promiscuous mode [ 896.189704][T28485] bio_check_eod: 2321 callbacks suppressed [ 896.189722][T28485] syz.0.11993: attempt to access beyond end of device [ 896.189722][T28485] loop0: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 896.208898][T28485] buffer_io_error: 2321 callbacks suppressed [ 896.208916][T28485] Buffer I/O error on dev loop0, logical block 2078, async page read [ 896.215766][T28487] syz2: rxe_newlink: already configured on bond0 [ 896.223321][T28485] syz.0.11993: attempt to access beyond end of device [ 896.223321][T28485] loop0: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 896.242745][T28485] Buffer I/O error on dev loop0, logical block 2078, async page read [ 896.258416][T28485] syz.0.11993: attempt to access beyond end of device [ 896.258416][T28485] loop0: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 896.271873][T28485] Buffer I/O error on dev loop0, logical block 2078, async page read [ 896.289343][T28485] syz.0.11993: attempt to access beyond end of device [ 896.289343][T28485] loop0: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 896.302697][T28485] Buffer I/O error on dev loop0, logical block 2078, async page read [ 896.311200][T28485] syz.0.11993: attempt to access beyond end of device [ 896.311200][T28485] loop0: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 896.324518][T28485] Buffer I/O error on dev loop0, logical block 2078, async page read [ 896.332766][T28485] syz.0.11993: attempt to access beyond end of device [ 896.332766][T28485] loop0: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 896.346141][T28485] Buffer I/O error on dev loop0, logical block 2078, async page read [ 896.354365][T28485] syz.0.11993: attempt to access beyond end of device [ 896.354365][T28485] loop0: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 896.367714][T28485] Buffer I/O error on dev loop0, logical block 2078, async page read [ 896.375875][T28485] syz.0.11993: attempt to access beyond end of device [ 896.375875][T28485] loop0: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 896.389197][T28485] Buffer I/O error on dev loop0, logical block 2078, async page read [ 896.397458][T28485] syz.0.11993: attempt to access beyond end of device [ 896.397458][T28485] loop0: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 896.410788][T28485] Buffer I/O error on dev loop0, logical block 2078, async page read [ 896.429784][T28485] syz.0.11993: attempt to access beyond end of device [ 896.429784][T28485] loop0: rw=0, sector=2078, nr_sectors = 1 limit=128 [ 896.443175][T28485] Buffer I/O error on dev loop0, logical block 2078, async page read [ 896.779588][T28511] netlink: 4 bytes leftover after parsing attributes in process `syz.7.12005'. [ 896.800404][T28511] netlink: 32 bytes leftover after parsing attributes in process `syz.7.12005'. [ 896.906542][T28515] ================================================================== [ 896.914677][T28515] BUG: KCSAN: data-race in mas_state_walk / mas_wr_store_entry [ 896.922239][T28515] [ 896.924552][T28515] write to 0xffff888103f0e500 of 8 bytes by task 28514 on cpu 0: [ 896.932258][T28515] mas_wr_store_entry+0x1d98/0x26e0 [ 896.937459][T28515] mas_store_prealloc+0x74d/0xa80 [ 896.942491][T28515] vma_iter_store_new+0x1c5/0x200 [ 896.947510][T28515] vma_complete+0x125/0x580 [ 896.952004][T28515] __split_vma+0x591/0x650 [ 896.956429][T28515] vma_modify+0x21e/0xc80 [ 896.960754][T28515] vma_modify_flags+0x101/0x130 [ 896.965599][T28515] mprotect_fixup+0x2cc/0x570 [ 896.970272][T28515] do_mprotect_pkey+0x6d6/0x980 [ 896.975121][T28515] __x64_sys_mprotect+0x48/0x60 [ 896.979968][T28515] x64_sys_call+0x2752/0x3000 [ 896.984637][T28515] do_syscall_64+0xd2/0x200 [ 896.989129][T28515] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 896.995013][T28515] [ 896.997324][T28515] read to 0xffff888103f0e500 of 8 bytes by task 28515 on cpu 1: [ 897.004944][T28515] mas_state_walk+0x485/0x650 [ 897.009627][T28515] mas_walk+0x60/0x150 [ 897.013703][T28515] lock_vma_under_rcu+0x95/0x170 [ 897.018641][T28515] do_user_addr_fault+0x233/0x1080 [ 897.023745][T28515] exc_page_fault+0x62/0xa0 [ 897.028253][T28515] asm_exc_page_fault+0x26/0x30 [ 897.033097][T28515] [ 897.035405][T28515] value changed: 0xffff8881045b110e -> 0xffff888103f0e500 [ 897.042504][T28515] [ 897.044830][T28515] Reported by Kernel Concurrency Sanitizer on: [ 897.050977][T28515] CPU: 1 UID: 0 PID: 28515 Comm: syz.7.12007 Not tainted syzkaller #0 PREEMPT(voluntary) [ 897.060868][T28515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 897.070914][T28515] ================================================================== [ 897.094066][ T29] kauditd_printk_skb: 140 callbacks suppressed [ 897.094081][ T29] audit: type=1400 audit(1762556089.125:43279): avc: denied { unmount } for pid=27095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1