last executing test programs: 8.701000998s ago: executing program 4 (id=275): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000580)={[{@init_itable}, {@abort}, {@nodioread_nolock}, {@data_err_abort}, {@init_itable}, {@nodelalloc}]}, 0x3, 0x584, &(0x7f0000000c00)="$eJzs3c1rHOUfAPDvbF76+vs1hVJURAI9WKndNIkvFQTrUbRY0Htdkmmo2XRLdlOaWGh7sBcvUgQRC6J37x6L/4B/RUELRUrQg5fIbGaabbKbpMm2Sd3PB6Z9npnZPPPsM98n39nZzQbQs4azf0oRL8aN+DqJONSyrT/yjcPL+y0+vDaRLUksLX3yZxJJvq7YP8n/P5BXXoiIX7+MOFFa2259fmG6Uq2ms3l9pDFzeaQ+v3Dy4kxlKp1KL42Nj59+c3zsnbff6lpfXzv393cf3/3g9FfHFr/9+f7h20mciYP5ttZ+bMON1spwDOfPyUCcWbXjaBca202SnT4AtqQvj/OByOaAQ9GXRz3w33c9IpaAHpVsMv5/etoHAjxjRR5QXNt36Tr4ufHg/eULoLX9719+bST2Nq+N9i8mj10ZZde7Q11oP2vjlz/u3M6W2OB1iOtdaA+gcONmRJzq7187/yX5/Ld1p5ovHq9vdRu99vsHdtLdLP95vV3+U3qU/0Sb/OdAm9jdio3jv3S/C810lOV/77bNfx9NXUN9ee1/zZxvILlwsZqeioj/R8TxGNiT1de7n3N68d5Sp22t+V+2ZO0XuWB+HPf79zz+mMlKo7KdPrd6cDPipZX8N4k18//eZq67evyz5+PcJts4mt55pdO2jfvfqvsZ8NKPEa+2Hf+VO1rJ+vcnR5rnw0hxVqz1162jv3Vq/8n6333Z+O9fv/9DSev92vqTt/HD3n/STtu2ev4PJp82y4P5uquVRmN2NGIw+Wjt+rGVxxb1Yv+s/8ePrT//tTv/90XEZ5vs/60jtzruuhvGf/KJxn+jQvEsray59+EX3xc/bHBV+5sb/zeapeP5ms3Mf5s50q2dzQAAAAAAALB7lSLiYCSl8qNyqVQuL7+/40jsL1Vr9caJC7W5S5PR/KzsUAyUijvdh1reDzGavx+2qI+tqo9HxOGI+KZvX7NenqhVJ3e68wAAAAAAAAAAAAAAAAAAALBLHGj7+f/lv9L9e99OHx3w1PnKb+hdG8Z/N77pCdiV/P6H3tUh/k0L0AMEOvQu8Q+9S/xD7xL/0LvEP/Qu8Q8AAAAAAAAAAAAAAAAAAAAAAAAAAABdde7s2WxZWnx4bSKrT16Zn5uuXTk5mdanyzNzE+WJ2uzl8lStNlVNyxO1mY1+XrVWuzw6FnNXRxppvTFSn184P1Obu9Q4f3GmMpWeTweeSa8AAAAAAAAAAAAAAAAAAADg+VKfX5iuVKvprELHwnux04fx+cvbeXjSfpSTlg4u21IT/btlmBS6WtjhiQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWvwbAAD//4mbL8A=") bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000400180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x2}, 0x18) socket$kcm(0xa, 0x3, 0x3a) syz_emit_ethernet(0x5e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60cb763e00283afffe800000000000000000000000000041ff020000000000000000000000000001"], 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x800, 0x50) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x40, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, r2, 0xe27, 0x70bd28, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x4000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r4, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) rename(0x0, &(0x7f0000000080)='./file2\x00') getdents(r1, &(0x7f0000001fc0)=""/184, 0xb8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000008c00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 8.359308065s ago: executing program 0 (id=276): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x4136}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) readv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/133, 0x85}], 0x1) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x0, 0x2}], 0x37) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x360, &(0x7f0000000b00)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x2, {0xa, 0x4e20, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}}, 0x32) r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[], 0x32600) 8.124622939s ago: executing program 4 (id=277): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x4136}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) readv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/133, 0x85}], 0x1) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x0, 0x2}], 0x37) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x360, &(0x7f0000000b00)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[], 0x32600) 6.715816625s ago: executing program 2 (id=281): syz_init_net_socket$x25(0x9, 0x5, 0x0) unshare(0xc020680) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000000)={{0x27, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x2, 'wlc\x00', 0x10, 0x7, 0x5d}, {@multicast2, 0x4e20, 0x4, 0x9, 0x9, 0x8603}}, 0x44) r1 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00'/15, @ANYBLOB], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0xee01, @ANYBLOB="020000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB, @ANYBLOB], 0x5c, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001bc0)=@newtaction={0x14, 0x30, 0xffff, 0x3}, 0x14}}, 0x0) openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_io_uring_setup(0x186, &(0x7f0000000080)={0x0, 0x3416, 0x13120, 0x2, 0x4}, 0x0, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000940)=0x28, 0x4) sendto$inet6(r3, 0x0, 0x0, 0x400ad80, &(0x7f0000000080)={0xa, 0x4621, 0x0, @local}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000006780)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="b3ab706204ee39c9dae21a1718ee351ebc92d2f0d482a863ae5c0b4d768ffe745af2c53a083d9b761b", 0xfff7}], 0x1}, 0xb00}], 0x1, 0x0) 6.621660267s ago: executing program 2 (id=282): r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x3) r1 = socket$vsock_stream(0x28, 0x1, 0x0) fgetxattr(r1, &(0x7f0000000000)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000)=0x1, 0x0) mount$9p_rdma(0x0, &(0x7f0000001400)='.\x00', &(0x7f0000001440), 0x800, 0x0) timer_settime(0x0, 0x1, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r4, 0x0, 0x2}, 0x18) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0xf00) 6.244101324s ago: executing program 4 (id=283): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000180)=0x7) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x181001, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) unshare(0x28000000) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 5.595184736s ago: executing program 2 (id=284): openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, 0x0, &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) read(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 5.550856387s ago: executing program 0 (id=285): r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x3) r1 = socket$vsock_stream(0x28, 0x1, 0x0) fgetxattr(r1, &(0x7f0000000000)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000)=0x1, 0x0) mount$9p_rdma(0x0, &(0x7f0000001400)='.\x00', &(0x7f0000001440), 0x800, 0x0) timer_settime(0x0, 0x1, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r4, 0x0, 0x2}, 0x18) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0xf00) 5.530346517s ago: executing program 1 (id=286): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x4136}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) readv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/133, 0x85}], 0x1) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x0, 0x2}], 0x37) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x360, &(0x7f0000000b00)="$eJzs3c1rO0UYwPEnaZImKW1yEEVBOtiLXpY2ehaDtCAELG0jtoKwbTcasiYlG6oRse3Jq3j3JHgovVnwUND+A71404sI3noRPFhBXdm3ZPPWl5g0/trvB0omM/PszmQn5dm0m718+/MPKiVLK+kNiSaVRERErkSyEpVAxH+MuuWEhB3KSzO///j8+mYx6VWolfzGyzml1Nz8dx9+kvK7nU3LRfbdy99yv148ffHs5T8b75ctVbZUtdZQutqu/dzQt01D7ZatiqbUqmnolqHKVcuoe+3f+Nsxa3t7TaVXd2fTe3XDspRebaqK0VSNmmrUm0p/Ty9XlaZpajYtuEnxeG1Nzw8ZvDPiwWBM6vW8PiUiqZ6W4vFEBgQAACaqO/+POin9MPn/lswVCstryunczv9PXjhvzLx1Oufn/2eJfvn/Kz952+rI/53TiXb+X/POD0o35/9fyh3y/96M6HEZOv/PjmEwGM58oqcq0vHMyf/T/vvXdfTOyaJbIP8HAAAAAAAAAAAAAAAAAAAAAOBJcGXbGdu2M8Fj8NO+hMB/jgdp0PGfFpGkc/Rtjv9Dtr65JUn3wj3nGJuf7Rf3i96j3+FcREwx/ra7OWsjuPJIObLyvXngxx/sF6fclnxJyk68LElGsu56CsXb9sobheUl5fHjW5cppcPxOcnIU+H4b93V6cTnOuP9/SfkxYVQvCYZ+WFHamLKrhvZ3v+nS0q9/mahKz7l9hORX+79oAAAAAAAMGKaaul7/q5pg9q9bxnJl9yPiQxZlIz81f/8frHv+Xks81xs0rMHAAAAAOBxsJofV3SJGnW3YJr9CikZ2DSCQqyjJi4ifTsnumri1215KjTD244nId4dTP7rvL4KXtW7RAX/SOEMvNXk31FFhhtPMH+3JhJrNf1513lFDsVdAIfhpqjcIjzWPfh5p0L17bwwcDtH/kRaNcHHRokBr7Os9m4nes1KiPfU2JHhFsAzX3z9x+jeIK+e+ivgo5s7H5mGfSC3OShdBWcXvU3xsf/iAQAAAHDv2kl/UPNauDl8I5HwzXL4yz0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAACM0lq/06ypMeo4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA/8W/AQAA//9/d/Qh") r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x2, {0xa, 0x4e20, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}}, 0x32) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[], 0x32600) 5.293113972s ago: executing program 4 (id=287): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000580)={[{@init_itable}, {@abort}, {@nodioread_nolock}, {@data_err_abort}, {@init_itable}, {@nodelalloc}]}, 0x3, 0x584, &(0x7f0000000c00)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000400180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x2}, 0x18) socket$kcm(0xa, 0x3, 0x3a) syz_emit_ethernet(0x5e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60cb763e00283afffe800000000000000000000000000041ff020000000000000000000000000001"], 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x800, 0x50) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x40, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, r2, 0xe27, 0x70bd28, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x4000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r4, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) rename(0x0, &(0x7f0000000080)='./file2\x00') getdents(r1, &(0x7f0000001fc0)=""/184, 0xb8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000008c00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4.921266208s ago: executing program 3 (id=288): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000180)=0x7) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x181001, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) unshare(0x28000000) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.714221463s ago: executing program 2 (id=289): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000580)={[{@init_itable}, {@abort}, {@nodioread_nolock}, {@data_err_abort}, {@init_itable}, {@nodelalloc}]}, 0x3, 0x584, &(0x7f0000000c00)="$eJzs3c1rHOUfAPDvbF76+vs1hVJURAI9WKndNIkvFQTrUbRY0Htdkmmo2XRLdlOaWGh7sBcvUgQRC6J37x6L/4B/RUELRUrQg5fIbGaabbKbpMm2Sd3PB6Z9npnZPPPsM98n39nZzQbQs4azf0oRL8aN+DqJONSyrT/yjcPL+y0+vDaRLUksLX3yZxJJvq7YP8n/P5BXXoiIX7+MOFFa2259fmG6Uq2ms3l9pDFzeaQ+v3Dy4kxlKp1KL42Nj59+c3zsnbff6lpfXzv393cf3/3g9FfHFr/9+f7h20mciYP5ttZ+bMON1spwDOfPyUCcWbXjaBca202SnT4AtqQvj/OByOaAQ9GXRz3w33c9IpaAHpVsMv5/etoHAjxjRR5QXNt36Tr4ufHg/eULoLX9719+bST2Nq+N9i8mj10ZZde7Q11oP2vjlz/u3M6W2OB1iOtdaA+gcONmRJzq7187/yX5/Ld1p5ovHq9vdRu99vsHdtLdLP95vV3+U3qU/0Sb/OdAm9jdio3jv3S/C810lOV/77bNfx9NXUN9ee1/zZxvILlwsZqeioj/R8TxGNiT1de7n3N68d5Sp22t+V+2ZO0XuWB+HPf79zz+mMlKo7KdPrd6cDPipZX8N4k18//eZq67evyz5+PcJts4mt55pdO2jfvfqvsZ8NKPEa+2Hf+VO1rJ+vcnR5rnw0hxVqz1162jv3Vq/8n6333Z+O9fv/9DSev92vqTt/HD3n/STtu2ev4PJp82y4P5uquVRmN2NGIw+Wjt+rGVxxb1Yv+s/8ePrT//tTv/90XEZ5vs/60jtzruuhvGf/KJxn+jQvEsray59+EX3xc/bHBV+5sb/zeapeP5ms3Mf5s50q2dzQAAAAAAALB7lSLiYCSl8qNyqVQuL7+/40jsL1Vr9caJC7W5S5PR/KzsUAyUijvdh1reDzGavx+2qI+tqo9HxOGI+KZvX7NenqhVJ3e68wAAAAAAAAAAAAAAAAAAALBLHGj7+f/lv9L9e99OHx3w1PnKb+hdG8Z/N77pCdiV/P6H3tUh/k0L0AMEOvQu8Q+9S/xD7xL/0LvEP/Qu8Q8AAAAAAAAAAAAAAAAAAAAAAAAAAABdde7s2WxZWnx4bSKrT16Zn5uuXTk5mdanyzNzE+WJ2uzl8lStNlVNyxO1mY1+XrVWuzw6FnNXRxppvTFSn184P1Obu9Q4f3GmMpWeTweeSa8AAAAAAAAAAAAAAAAAAADg+VKfX5iuVKvprELHwnux04fx+cvbeXjSfpSTlg4u21IT/btlmBS6WtjhiQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWvwbAAD//4mbL8A=") bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x2}, 0x18) socket$kcm(0xa, 0x3, 0x3a) syz_emit_ethernet(0x5e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60cb763e00283afffe800000000000000000000000000041ff0200"], 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x800, 0x50) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x40, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, r2, 0xe27, 0x70bd28, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x4000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r4, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') getdents(r1, &(0x7f0000001fc0)=""/184, 0xb8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0xb, &(0x7f0000000200)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4.665845803s ago: executing program 0 (id=290): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x4136}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) readv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/133, 0x85}], 0x1) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x0, 0x2}], 0x37) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x360, &(0x7f0000000b00)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[], 0x32600) 4.494126407s ago: executing program 4 (id=291): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x4136}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) readv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/133, 0x85}], 0x1) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x0, 0x2}], 0x37) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x360, &(0x7f0000000b00)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x2, {0xa, 0x4e20, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}}, 0x32) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[], 0x32600) 3.940343577s ago: executing program 3 (id=292): unshare(0x40020000) r0 = socket$inet6(0xa, 0x6, 0x8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unshare(0x2040400) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, 0x0, 0x0) r2 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast1, 0xfffffffe}, {0xa, 0x0, 0x0, @empty, 0x3}, 0x0, {[0x0, 0x0, 0x0, 0x2]}}, 0x5c) 3.735641711s ago: executing program 0 (id=293): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x4136}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) readv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/133, 0x85}], 0x1) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x0, 0x2}], 0x37) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x360, &(0x7f0000000b00)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x2, {0xa, 0x4e20, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}}, 0x32) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/12], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[], 0x32600) 3.670521882s ago: executing program 3 (id=294): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000580)={[{@init_itable}, {@abort}, {@nodioread_nolock}, {@data_err_abort}, {@init_itable}, {@nodelalloc}]}, 0x3, 0x584, &(0x7f0000000c00)="$eJzs3c1rHOUfAPDvbF76+vs1hVJURAI9WKndNIkvFQTrUbRY0Htdkmmo2XRLdlOaWGh7sBcvUgQRC6J37x6L/4B/RUELRUrQg5fIbGaabbKbpMm2Sd3PB6Z9npnZPPPsM98n39nZzQbQs4azf0oRL8aN+DqJONSyrT/yjcPL+y0+vDaRLUksLX3yZxJJvq7YP8n/P5BXXoiIX7+MOFFa2259fmG6Uq2ms3l9pDFzeaQ+v3Dy4kxlKp1KL42Nj59+c3zsnbff6lpfXzv393cf3/3g9FfHFr/9+f7h20mciYP5ttZ+bMON1spwDOfPyUCcWbXjaBca202SnT4AtqQvj/OByOaAQ9GXRz3w33c9IpaAHpVsMv5/etoHAjxjRR5QXNt36Tr4ufHg/eULoLX9719+bST2Nq+N9i8mj10ZZde7Q11oP2vjlz/u3M6W2OB1iOtdaA+gcONmRJzq7187/yX5/Ld1p5ovHq9vdRu99vsHdtLdLP95vV3+U3qU/0Sb/OdAm9jdio3jv3S/C810lOV/77bNfx9NXUN9ee1/zZxvILlwsZqeioj/R8TxGNiT1de7n3N68d5Sp22t+V+2ZO0XuWB+HPf79zz+mMlKo7KdPrd6cDPipZX8N4k18//eZq67evyz5+PcJts4mt55pdO2jfvfqvsZ8NKPEa+2Hf+VO1rJ+vcnR5rnw0hxVqz1162jv3Vq/8n6333Z+O9fv/9DSev92vqTt/HD3n/STtu2ev4PJp82y4P5uquVRmN2NGIw+Wjt+rGVxxb1Yv+s/8ePrT//tTv/90XEZ5vs/60jtzruuhvGf/KJxn+jQvEsray59+EX3xc/bHBV+5sb/zeapeP5ms3Mf5s50q2dzQAAAAAAALB7lSLiYCSl8qNyqVQuL7+/40jsL1Vr9caJC7W5S5PR/KzsUAyUijvdh1reDzGavx+2qI+tqo9HxOGI+KZvX7NenqhVJ3e68wAAAAAAAAAAAAAAAAAAALBLHGj7+f/lv9L9e99OHx3w1PnKb+hdG8Z/N77pCdiV/P6H3tUh/k0L0AMEOvQu8Q+9S/xD7xL/0LvEP/Qu8Q8AAAAAAAAAAAAAAAAAAAAAAAAAAABdde7s2WxZWnx4bSKrT16Zn5uuXTk5mdanyzNzE+WJ2uzl8lStNlVNyxO1mY1+XrVWuzw6FnNXRxppvTFSn184P1Obu9Q4f3GmMpWeTweeSa8AAAAAAAAAAAAAAAAAAADg+VKfX5iuVKvprELHwnux04fx+cvbeXjSfpSTlg4u21IT/btlmBS6WtjhiQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWvwbAAD//4mbL8A=") bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000400180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x2}, 0x18) socket$kcm(0xa, 0x3, 0x3a) syz_emit_ethernet(0x5e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60cb763e00283afffe800000000000000000000000000041ff020000000000000000000000000001"], 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x800, 0x50) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x34, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x0) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, r2, 0xe27, 0x70bd28, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x4000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r4, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') getdents(r1, &(0x7f0000001fc0)=""/184, 0xb8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000008c00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.152228152s ago: executing program 1 (id=295): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x4136}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) readv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/133, 0x85}], 0x1) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x0, 0x2}], 0x37) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x360, &(0x7f0000000b00)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[], 0x32600) 2.892588706s ago: executing program 2 (id=296): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x4136}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) readv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/133, 0x85}], 0x1) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x0, 0x2}], 0x37) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x360, &(0x7f0000000b00)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x2, {0xa, 0x4e20, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}}, 0x32) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/14], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[], 0x32600) 1.919207295s ago: executing program 1 (id=297): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000580)={[{@init_itable}, {@abort}, {@nodioread_nolock}, {@data_err_abort}, {@init_itable}, {@nodelalloc}]}, 0x3, 0x584, &(0x7f0000000c00)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x2}, 0x18) socket$kcm(0xa, 0x3, 0x3a) syz_emit_ethernet(0x5e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60cb763e00283afffe800000000000000000000000000041ff0200"], 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x800, 0x50) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x40, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, r2, 0xe27, 0x70bd28, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x4000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r4, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') getdents(r1, &(0x7f0000001fc0)=""/184, 0xb8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.914890845s ago: executing program 3 (id=298): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000580)={[{@init_itable}, {@abort}, {@nodioread_nolock}, {@data_err_abort}, {@init_itable}, {@nodelalloc}]}, 0x3, 0x584, &(0x7f0000000c00)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x2}, 0x18) socket$kcm(0xa, 0x3, 0x3a) syz_emit_ethernet(0x5e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60cb763e00283afffe800000000000000000000000000041ff0200"], 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x800, 0x50) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x40, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, r2, 0xe27, 0x70bd28, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x4000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r4, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') getdents(r1, &(0x7f0000001fc0)=""/184, 0xb8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.667435949s ago: executing program 0 (id=299): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000580)={[{@init_itable}, {@abort}, {@nodioread_nolock}, {@data_err_abort}, {@init_itable}, {@nodelalloc}]}, 0x3, 0x584, &(0x7f0000000c00)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000400180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x2}, 0x18) socket$kcm(0xa, 0x3, 0x3a) syz_emit_ethernet(0x5e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60cb763e00283afffe800000000000000000000000000041ff020000000000000000000000000001"], 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x800, 0x50) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x40, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, r2, 0xe27, 0x70bd28, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x4000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r4, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') getdents(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000008c00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.134618339s ago: executing program 1 (id=300): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) unshare(0x28000000) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.124624829s ago: executing program 3 (id=301): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, 0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x4136}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) readv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/133, 0x85}], 0x1) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x0, 0x2}], 0x37) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x360, &(0x7f0000000b00)="$eJzs3c1rO0UYwPEnaZImKW1yEEVBOtiLXpY2ehaDtCAELG0jtoKwbTcasiYlG6oRse3Jq3j3JHgovVnwUND+A71404sI3noRPFhBXdm3ZPPWl5g0/trvB0omM/PszmQn5dm0m718+/MPKiVLK+kNiSaVRERErkSyEpVAxH+MuuWEhB3KSzO///j8+mYx6VWolfzGyzml1Nz8dx9+kvK7nU3LRfbdy99yv148ffHs5T8b75ctVbZUtdZQutqu/dzQt01D7ZatiqbUqmnolqHKVcuoe+3f+Nsxa3t7TaVXd2fTe3XDspRebaqK0VSNmmrUm0p/Ty9XlaZpajYtuEnxeG1Nzw8ZvDPiwWBM6vW8PiUiqZ6W4vFEBgQAACaqO/+POin9MPn/lswVCstryunczv9PXjhvzLx1Oufn/2eJfvn/Kz952+rI/53TiXb+X/POD0o35/9fyh3y/96M6HEZOv/PjmEwGM58oqcq0vHMyf/T/vvXdfTOyaJbIP8HAAAAAAAAAAAAAAAAAAAAAOBJcGXbGdu2M8Fj8NO+hMB/jgdp0PGfFpGkc/Rtjv9Dtr65JUn3wj3nGJuf7Rf3i96j3+FcREwx/ra7OWsjuPJIObLyvXngxx/sF6fclnxJyk68LElGsu56CsXb9sobheUl5fHjW5cppcPxOcnIU+H4b93V6cTnOuP9/SfkxYVQvCYZ+WFHamLKrhvZ3v+nS0q9/mahKz7l9hORX+79oAAAAAAAMGKaaul7/q5pg9q9bxnJl9yPiQxZlIz81f/8frHv+Xks81xs0rMHAAAAAOBxsJofV3SJGnW3YJr9CikZ2DSCQqyjJi4ifTsnumri1215KjTD244nId4dTP7rvL4KXtW7RAX/SOEMvNXk31FFhhtPMH+3JhJrNf1513lFDsVdAIfhpqjcIjzWPfh5p0L17bwwcDtH/kRaNcHHRokBr7Os9m4nes1KiPfU2JHhFsAzX3z9x+jeIK+e+ivgo5s7H5mGfSC3OShdBWcXvU3xsf/iAQAAAHDv2kl/UPNauDl8I5HwzXL4yz0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAACM0lq/06ypMeo4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA/8W/AQAA//9/d/Qh") r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x2, {0xa, 0x4e20, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}}, 0x32) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[], 0x32600) 1.034601801s ago: executing program 0 (id=302): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x4136}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) readv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/133, 0x85}], 0x1) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x0, 0x2}], 0x37) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x360, &(0x7f0000000b00)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) connect$pppl2tp(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x2, {0xa, 0x4e20, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}}, 0x32) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[], 0x32600) 624.546408ms ago: executing program 3 (id=303): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000580)={[{@init_itable}, {@abort}, {@nodioread_nolock}, {@data_err_abort}, {@init_itable}, {@nodelalloc}]}, 0x3, 0x584, &(0x7f0000000c00)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000400180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x2}, 0x18) socket$kcm(0xa, 0x3, 0x3a) syz_emit_ethernet(0x5e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60cb763e00283afffe800000000000000000000000000041ff020000000000000000000000000001"], 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x800, 0x50) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x40, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, r2, 0xe27, 0x70bd28, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x4000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r4, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') getdents(r1, &(0x7f0000001fc0)=""/184, 0xb8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0xb, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 623.762689ms ago: executing program 4 (id=304): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000580)={[{@init_itable}, {@abort}, {@nodioread_nolock}, {@data_err_abort}, {@init_itable}, {@nodelalloc}]}, 0x3, 0x584, &(0x7f0000000c00)="$eJzs3c1rHOUfAPDvbF76+vs1hVJURAI9WKndNIkvFQTrUbRY0Htdkmmo2XRLdlOaWGh7sBcvUgQRC6J37x6L/4B/RUELRUrQg5fIbGaabbKbpMm2Sd3PB6Z9npnZPPPsM98n39nZzQbQs4azf0oRL8aN+DqJONSyrT/yjcPL+y0+vDaRLUksLX3yZxJJvq7YP8n/P5BXXoiIX7+MOFFa2259fmG6Uq2ms3l9pDFzeaQ+v3Dy4kxlKp1KL42Nj59+c3zsnbff6lpfXzv393cf3/3g9FfHFr/9+f7h20mciYP5ttZ+bMON1spwDOfPyUCcWbXjaBca202SnT4AtqQvj/OByOaAQ9GXRz3w33c9IpaAHpVsMv5/etoHAjxjRR5QXNt36Tr4ufHg/eULoLX9719+bST2Nq+N9i8mj10ZZde7Q11oP2vjlz/u3M6W2OB1iOtdaA+gcONmRJzq7187/yX5/Ld1p5ovHq9vdRu99vsHdtLdLP95vV3+U3qU/0Sb/OdAm9jdio3jv3S/C810lOV/77bNfx9NXUN9ee1/zZxvILlwsZqeioj/R8TxGNiT1de7n3N68d5Sp22t+V+2ZO0XuWB+HPf79zz+mMlKo7KdPrd6cDPipZX8N4k18//eZq67evyz5+PcJts4mt55pdO2jfvfqvsZ8NKPEa+2Hf+VO1rJ+vcnR5rnw0hxVqz1162jv3Vq/8n6333Z+O9fv/9DSev92vqTt/HD3n/STtu2ev4PJp82y4P5uquVRmN2NGIw+Wjt+rGVxxb1Yv+s/8ePrT//tTv/90XEZ5vs/60jtzruuhvGf/KJxn+jQvEsray59+EX3xc/bHBV+5sb/zeapeP5ms3Mf5s50q2dzQAAAAAAALB7lSLiYCSl8qNyqVQuL7+/40jsL1Vr9caJC7W5S5PR/KzsUAyUijvdh1reDzGavx+2qI+tqo9HxOGI+KZvX7NenqhVJ3e68wAAAAAAAAAAAAAAAAAAALBLHGj7+f/lv9L9e99OHx3w1PnKb+hdG8Z/N77pCdiV/P6H3tUh/k0L0AMEOvQu8Q+9S/xD7xL/0LvEP/Qu8Q8AAAAAAAAAAAAAAAAAAAAAAAAAAABdde7s2WxZWnx4bSKrT16Zn5uuXTk5mdanyzNzE+WJ2uzl8lStNlVNyxO1mY1+XrVWuzw6FnNXRxppvTFSn184P1Obu9Q4f3GmMpWeTweeSa8AAAAAAAAAAAAAAAAAAADg+VKfX5iuVKvprELHwnux04fx+cvbeXjSfpSTlg4u21IT/btlmBS6WtjhiQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWvwbAAD//4mbL8A=") bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000400180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x2}, 0x18) socket$kcm(0xa, 0x3, 0x3a) syz_emit_ethernet(0x5e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60cb763e00283afffe800000000000000000000000000041ff020000000000000000000000000001"], 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x800, 0x50) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x40, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, r2, 0xe27, 0x70bd28, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x4000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r4, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') getdents(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000008c00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 303.305565ms ago: executing program 2 (id=305): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000580)={[{@init_itable}, {@abort}, {@nodioread_nolock}, {@data_err_abort}, {@init_itable}, {@nodelalloc}]}, 0x3, 0x584, &(0x7f0000000c00)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x2}, 0x18) socket$kcm(0xa, 0x3, 0x3a) syz_emit_ethernet(0x5e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60cb763e00283afffe800000000000000000000000000041ff0200"], 0x0) r1 = open(&(0x7f00000000c0)='.\x00', 0x800, 0x50) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x40, r2, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, r2, 0xe27, 0x70bd28, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x4000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) pwrite64(r4, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') getdents(r1, &(0x7f0000001fc0)=""/184, 0xb8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 72.080609ms ago: executing program 1 (id=306): syz_init_net_socket$x25(0x9, 0x5, 0x0) unshare(0xc020680) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000000)={{0x27, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x2, 'wlc\x00', 0x10, 0x7, 0x5d}, {@multicast2, 0x4e20, 0x4, 0x9, 0x9, 0x8603}}, 0x44) r1 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00'/15, @ANYBLOB], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0xee01, @ANYBLOB="020000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB, @ANYBLOB], 0x5c, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001bc0)=@newtaction={0x88c, 0x30, 0xffff, 0x3, 0x0, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x2, 0x4, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xe6e, 0x4629, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x1, 0x2c7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x3, 0x0, 0x100000, 0x0, 0x400, 0x400, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x10001, 0x0, 0x0, 0x1, 0x8, 0x0, 0xfffffffc, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8001, 0x3, 0x0, 0x0, 0x0, 0x40, 0x0, 0x33cabbbe, 0x40000000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x6b40, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffc, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1a6d, 0x4, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800, 0x0, 0x40000, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffd]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x9, 0x8, 0x0, 0x0, 0xfffffffe, {0x4, 0x0, 0x0, 0x0, 0xb, 0x3}, {0x4, 0x2, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x3, 0x2}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3179, 0x0, 0x1000000, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0xffffffff, 0x0, 0x0, 0x3, 0x200, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x0, 0x0, 0xfffffffc, 0x6, 0x2, 0x4, 0x0, 0x0, 0x0, 0x1, 0x25d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x0, 0x801, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x2, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x80000, 0x0, 0x0, 0x0, 0xf9, 0xfffffffc, 0x0, 0x20000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0xffffffff, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0xffffff81, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9130, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x576, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x7, 0x3, 0x0, 0x0, 0x1, 0x4, 0x2, 0x8]}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x2}}}}]}]}, 0x88c}}, 0x0) openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_io_uring_setup(0x186, &(0x7f0000000080)={0x0, 0x3416, 0x13120, 0x2, 0x4}, 0x0, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x400ad80, &(0x7f0000000080)={0xa, 0x4621, 0x0, @local}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000006780)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="b3ab706204ee39c9dae21a1718ee351ebc92d2f0d482a863ae5c0b4d768ffe745af2c53a083d9b761b", 0xfff7}], 0x1}, 0xb00}], 0x1, 0x0) 0s ago: executing program 1 (id=307): openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1f, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) read(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.254' (ED25519) to the list of known hosts. [ 33.450493][ T29] audit: type=1400 audit(1757841421.356:62): avc: denied { mounton } for pid=3294 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.451686][ T3294] cgroup: Unknown subsys name 'net' [ 33.473328][ T29] audit: type=1400 audit(1757841421.356:63): avc: denied { mount } for pid=3294 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.500692][ T29] audit: type=1400 audit(1757841421.386:64): avc: denied { unmount } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.634139][ T3294] cgroup: Unknown subsys name 'cpuset' [ 33.640608][ T3294] cgroup: Unknown subsys name 'rlimit' [ 33.831756][ T29] audit: type=1400 audit(1757841421.736:65): avc: denied { setattr } for pid=3294 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.858769][ T29] audit: type=1400 audit(1757841421.746:66): avc: denied { create } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.879279][ T29] audit: type=1400 audit(1757841421.746:67): avc: denied { write } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.899672][ T29] audit: type=1400 audit(1757841421.746:68): avc: denied { read } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 33.919963][ T29] audit: type=1400 audit(1757841421.756:69): avc: denied { mounton } for pid=3294 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 33.927359][ T3297] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 33.944898][ T29] audit: type=1400 audit(1757841421.756:70): avc: denied { mount } for pid=3294 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 33.973065][ T3294] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 33.976660][ T29] audit: type=1400 audit(1757841421.866:71): avc: denied { relabelto } for pid=3297 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 35.940293][ T3309] chnl_net:caif_netlink_parms(): no params data found [ 35.974030][ T3305] chnl_net:caif_netlink_parms(): no params data found [ 36.007066][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 36.045548][ T3309] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.052629][ T3309] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.060043][ T3309] bridge_slave_0: entered allmulticast mode [ 36.066539][ T3309] bridge_slave_0: entered promiscuous mode [ 36.073211][ T3309] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.080327][ T3309] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.087504][ T3309] bridge_slave_1: entered allmulticast mode [ 36.094023][ T3309] bridge_slave_1: entered promiscuous mode [ 36.123438][ T3307] chnl_net:caif_netlink_parms(): no params data found [ 36.144563][ T3309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.157091][ T3309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.185757][ T3304] chnl_net:caif_netlink_parms(): no params data found [ 36.216721][ T3305] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.223832][ T3305] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.230948][ T3305] bridge_slave_0: entered allmulticast mode [ 36.237308][ T3305] bridge_slave_0: entered promiscuous mode [ 36.244560][ T3309] team0: Port device team_slave_0 added [ 36.264959][ T3305] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.272083][ T3305] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.279389][ T3305] bridge_slave_1: entered allmulticast mode [ 36.285846][ T3305] bridge_slave_1: entered promiscuous mode [ 36.292750][ T3309] team0: Port device team_slave_1 added [ 36.305425][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.312980][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.320142][ T3312] bridge_slave_0: entered allmulticast mode [ 36.326552][ T3312] bridge_slave_0: entered promiscuous mode [ 36.350398][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.357512][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.364669][ T3312] bridge_slave_1: entered allmulticast mode [ 36.371020][ T3312] bridge_slave_1: entered promiscuous mode [ 36.405969][ T3305] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.415401][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.422353][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.448419][ T3309] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.459339][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.466500][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.473780][ T3307] bridge_slave_0: entered allmulticast mode [ 36.480210][ T3307] bridge_slave_0: entered promiscuous mode [ 36.490240][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.505219][ T3305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.520034][ T3304] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.527204][ T3304] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.534425][ T3304] bridge_slave_0: entered allmulticast mode [ 36.540769][ T3304] bridge_slave_0: entered promiscuous mode [ 36.547536][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.554523][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.580525][ T3309] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.591373][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.598536][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.605721][ T3307] bridge_slave_1: entered allmulticast mode [ 36.612129][ T3307] bridge_slave_1: entered promiscuous mode [ 36.619428][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.638612][ T3304] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.645720][ T3304] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.652996][ T3304] bridge_slave_1: entered allmulticast mode [ 36.659449][ T3304] bridge_slave_1: entered promiscuous mode [ 36.689739][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.705046][ T3305] team0: Port device team_slave_0 added [ 36.711926][ T3305] team0: Port device team_slave_1 added [ 36.723371][ T3312] team0: Port device team_slave_0 added [ 36.729965][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.748863][ T3312] team0: Port device team_slave_1 added [ 36.761216][ T3304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.790907][ T3304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.800674][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.807657][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.833652][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.851758][ T3309] hsr_slave_0: entered promiscuous mode [ 36.858430][ T3309] hsr_slave_1: entered promiscuous mode [ 36.864687][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.871645][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.897600][ T3305] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.918708][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.925730][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.951739][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.968269][ T3307] team0: Port device team_slave_0 added [ 36.975003][ T3307] team0: Port device team_slave_1 added [ 36.987009][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.993991][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.019916][ T3305] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.031300][ T3304] team0: Port device team_slave_0 added [ 37.037911][ T3304] team0: Port device team_slave_1 added [ 37.056744][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.063760][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.089790][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.113867][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.120859][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.146982][ T3304] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.163463][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.170430][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.196367][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.217242][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.224357][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.250431][ T3304] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.293982][ T3312] hsr_slave_0: entered promiscuous mode [ 37.300087][ T3312] hsr_slave_1: entered promiscuous mode [ 37.306107][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 37.311835][ T3312] Cannot create hsr debugfs directory [ 37.319309][ T3307] hsr_slave_0: entered promiscuous mode [ 37.326411][ T3307] hsr_slave_1: entered promiscuous mode [ 37.332231][ T3307] debugfs: 'hsr0' already exists in 'hsr' [ 37.337992][ T3307] Cannot create hsr debugfs directory [ 37.378171][ T3305] hsr_slave_0: entered promiscuous mode [ 37.384433][ T3305] hsr_slave_1: entered promiscuous mode [ 37.390343][ T3305] debugfs: 'hsr0' already exists in 'hsr' [ 37.396150][ T3305] Cannot create hsr debugfs directory [ 37.440088][ T3304] hsr_slave_0: entered promiscuous mode [ 37.446187][ T3304] hsr_slave_1: entered promiscuous mode [ 37.451978][ T3304] debugfs: 'hsr0' already exists in 'hsr' [ 37.457784][ T3304] Cannot create hsr debugfs directory [ 37.530940][ T3309] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 37.558556][ T3309] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 37.569451][ T3309] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 37.580215][ T3309] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 37.661054][ T3307] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 37.669772][ T3307] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 37.683622][ T3307] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 37.695928][ T3307] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 37.719192][ T3305] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 37.731518][ T3305] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 37.740662][ T3305] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 37.754245][ T3305] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 37.782784][ T3312] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 37.791930][ T3312] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 37.806891][ T3312] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 37.815921][ T3312] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 37.831034][ T3309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.862113][ T3304] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.883889][ T3304] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.893142][ T3304] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.902019][ T3304] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.923327][ T3309] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.949290][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.956441][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.966043][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.973220][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.990752][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.020314][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.029386][ T3307] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.045392][ T3309] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.058191][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.065261][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.078523][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.089923][ T3305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.106254][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.113361][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.134868][ T59] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.141993][ T59] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.157267][ T59] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.164351][ T59] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.174239][ T3305] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.189541][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.196635][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.221473][ T3312] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.232114][ T3312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.246101][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.253233][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.280910][ T3309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.309984][ T3304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.349107][ T3305] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.380090][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.390995][ T3304] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.426578][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.441347][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.448472][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.480198][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.487320][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.501042][ T3305] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.520516][ T3309] veth0_vlan: entered promiscuous mode [ 38.534123][ T3309] veth1_vlan: entered promiscuous mode [ 38.583974][ T3309] veth0_macvtap: entered promiscuous mode [ 38.604733][ T3304] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.625247][ T3309] veth1_macvtap: entered promiscuous mode [ 38.640161][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.655807][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.668755][ T3307] veth0_vlan: entered promiscuous mode [ 38.698666][ T3305] veth0_vlan: entered promiscuous mode [ 38.705193][ T3307] veth1_vlan: entered promiscuous mode [ 38.720490][ T3305] veth1_vlan: entered promiscuous mode [ 38.729355][ T292] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.748027][ T3312] veth0_vlan: entered promiscuous mode [ 38.767703][ T3312] veth1_vlan: entered promiscuous mode [ 38.774284][ T292] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.787891][ T3305] veth0_macvtap: entered promiscuous mode [ 38.799554][ T292] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.811462][ T3307] veth0_macvtap: entered promiscuous mode [ 38.819868][ T3305] veth1_macvtap: entered promiscuous mode [ 38.830536][ T292] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.840493][ T3307] veth1_macvtap: entered promiscuous mode [ 38.850665][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 38.850677][ T29] audit: type=1400 audit(1757841426.756:81): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/root/syzkaller.J1fkIG/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 38.867252][ T3304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.881888][ T29] audit: type=1400 audit(1757841426.756:82): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 38.897953][ T3312] veth0_macvtap: entered promiscuous mode [ 38.909752][ T29] audit: type=1400 audit(1757841426.766:83): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/root/syzkaller.J1fkIG/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 38.918000][ T3312] veth1_macvtap: entered promiscuous mode [ 38.940666][ T29] audit: type=1400 audit(1757841426.766:84): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 38.955254][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.968205][ T29] audit: type=1400 audit(1757841426.766:85): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/root/syzkaller.J1fkIG/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 38.988130][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.002036][ T29] audit: type=1400 audit(1757841426.766:86): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/root/syzkaller.J1fkIG/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4043 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 39.017466][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.036756][ T29] audit: type=1400 audit(1757841426.766:87): avc: denied { unmount } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 39.077280][ T29] audit: type=1400 audit(1757841426.796:88): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 39.078538][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.100192][ T29] audit: type=1400 audit(1757841426.796:89): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="gadgetfs" ino=4055 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 39.111557][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.143720][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.144450][ T3309] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 39.172219][ T37] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.187509][ T29] audit: type=1400 audit(1757841427.096:90): avc: denied { read write } for pid=3309 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 39.197002][ T37] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.229998][ T37] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.239214][ T37] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.265574][ T37] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.284371][ T3472] loop0: detected capacity change from 0 to 1024 [ 39.301922][ T37] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.326419][ T37] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.345136][ T3304] veth0_vlan: entered promiscuous mode [ 39.355614][ T3304] veth1_vlan: entered promiscuous mode [ 39.361560][ T37] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.371103][ T3472] EXT4-fs (loop0): can't mount with data_err=abort, fs mounted w/o journal [ 39.401938][ T37] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.418907][ T3304] veth0_macvtap: entered promiscuous mode [ 39.430616][ T37] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.444004][ T3304] veth1_macvtap: entered promiscuous mode [ 39.455995][ T37] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.467117][ T3485] loop3: detected capacity change from 0 to 1024 [ 39.469344][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.493321][ T37] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.513273][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.513497][ T3485] EXT4-fs (loop3): can't mount with data_err=abort, fs mounted w/o journal [ 39.538561][ T292] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.566245][ T292] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.582441][ T3488] loop0: detected capacity change from 0 to 1024 [ 39.589094][ T292] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.632090][ T292] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.654300][ T3488] EXT4-fs (loop0): can't mount with data_err=abort, fs mounted w/o journal [ 39.673953][ T3488] smc: net device bond0 applied user defined pnetid SYZ0 [ 39.681382][ T3488] smc: net device bond0 erased user defined pnetid SYZ0 [ 39.727477][ T3499] IPVS: set_ctl: invalid protocol: 39 172.30.1.1:20004 [ 39.730601][ T3501] loop3: detected capacity change from 0 to 1024 [ 39.752809][ T3501] EXT4-fs (loop3): can't mount with data_err=abort, fs mounted w/o journal [ 39.776345][ T3501] smc: net device bond0 applied user defined pnetid SYZ0 [ 39.789464][ T3501] smc: net device bond0 erased user defined pnetid SYZ0 [ 39.801001][ T3506] IPVS: set_ctl: invalid protocol: 39 172.30.1.3:20004 [ 39.822500][ T3509] IPVS: set_ctl: invalid protocol: 39 172.30.1.4:20004 [ 40.341887][ T3525] loop1: detected capacity change from 0 to 1024 [ 40.469606][ T3525] EXT4-fs (loop1): can't mount with data_err=abort, fs mounted w/o journal [ 40.568792][ T3528] veth0: mtu less than device minimum [ 40.686182][ T3537] loop4: detected capacity change from 0 to 1024 [ 40.707581][ T3537] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 40.718051][ T3540] loop2: detected capacity change from 0 to 1024 [ 40.753537][ T3540] EXT4-fs (loop2): can't mount with data_err=abort, fs mounted w/o journal [ 40.762407][ T3537] smc: net device bond0 applied user defined pnetid SYZ0 [ 40.770075][ T3537] smc: net device bond0 erased user defined pnetid SYZ0 [ 40.880452][ T3540] smc: net device bond0 applied user defined pnetid SYZ0 [ 40.892225][ T3540] smc: net device bond0 erased user defined pnetid SYZ0 [ 40.974694][ T3559] Zero length message leads to an empty skb [ 41.001608][ T3561] loop1: detected capacity change from 0 to 1024 [ 41.025031][ T3561] EXT4-fs (loop1): can't mount with data_err=abort, fs mounted w/o journal [ 41.035166][ T3563] loop3: detected capacity change from 0 to 1024 [ 41.058066][ T3563] EXT4-fs (loop3): can't mount with data_err=abort, fs mounted w/o journal [ 41.091990][ T3567] loop2: detected capacity change from 0 to 1024 [ 41.115177][ T3567] EXT4-fs (loop2): can't mount with data_err=abort, fs mounted w/o journal [ 41.116575][ T3563] smc: net device bond0 applied user defined pnetid SYZ0 [ 41.136348][ T3563] smc: net device bond0 erased user defined pnetid SYZ0 [ 41.179133][ T3567] smc: net device bond0 applied user defined pnetid SYZ0 [ 41.200629][ T3567] smc: net device bond0 erased user defined pnetid SYZ0 [ 41.207764][ T3572] loop3: detected capacity change from 0 to 1024 [ 41.244172][ T3572] EXT4-fs (loop3): can't mount with data_err=abort, fs mounted w/o journal [ 41.252801][ T3575] IPVS: set_ctl: invalid protocol: 39 172.30.1.3:20004 [ 41.270062][ T3572] smc: net device bond0 applied user defined pnetid SYZ0 [ 41.283377][ T3572] smc: net device bond0 erased user defined pnetid SYZ0 [ 41.318687][ T3578] IPVS: set_ctl: invalid protocol: 39 172.30.1.3:20004 [ 41.351624][ T3580] loop3: detected capacity change from 0 to 1024 [ 41.375360][ T3580] EXT4-fs (loop3): can't mount with data_err=abort, fs mounted w/o journal [ 41.381884][ T3582] loop2: detected capacity change from 0 to 1024 [ 41.403328][ T3582] EXT4-fs (loop2): can't mount with data_err=abort, fs mounted w/o journal [ 41.415241][ T3580] smc: net device bond0 applied user defined pnetid SYZ0 [ 41.429561][ T3580] smc: net device bond0 erased user defined pnetid SYZ0 [ 41.440214][ T3582] smc: net device bond0 applied user defined pnetid SYZ0 [ 41.453342][ T3582] smc: net device bond0 erased user defined pnetid SYZ0 [ 41.616076][ T3590] loop0: detected capacity change from 0 to 1024 [ 41.644509][ T3590] EXT4-fs (loop0): can't mount with data_err=abort, fs mounted w/o journal [ 41.876086][ T3590] smc: net device bond0 applied user defined pnetid SYZ0 [ 42.126552][ T3599] loop4: detected capacity change from 0 to 1024 [ 42.183704][ T3599] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 42.481465][ T3610] loop4: detected capacity change from 0 to 1024 [ 42.533569][ T3610] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 42.602067][ T3610] smc: net device bond0 erased user defined pnetid SYZ0 [ 42.743146][ T3614] netlink: 'syz.4.46': attribute type 10 has an invalid length. [ 42.775835][ T3614] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 42.795945][ T3614] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 43.068256][ T3622] loop2: detected capacity change from 0 to 1024 [ 43.113380][ T3622] EXT4-fs (loop2): can't mount with data_err=abort, fs mounted w/o journal [ 43.427083][ T3634] loop1: detected capacity change from 0 to 1024 [ 43.447970][ T3634] EXT4-fs (loop1): can't mount with data_err=abort, fs mounted w/o journal [ 43.955804][ T3614] syz.4.46 (3614) used greatest stack depth: 9984 bytes left [ 44.109946][ T3650] IPVS: set_ctl: invalid protocol: 39 172.30.1.1:20004 [ 44.207318][ T3654] loop2: detected capacity change from 0 to 1024 [ 44.233933][ T3654] EXT4-fs (loop2): can't mount with data_err=abort, fs mounted w/o journal [ 44.309061][ T3658] IPVS: set_ctl: invalid protocol: 39 172.30.1.3:20004 [ 44.405212][ T3662] IPVS: set_ctl: invalid protocol: 39 172.30.1.4:20004 [ 44.466767][ T3665] loop3: detected capacity change from 0 to 1024 [ 44.483665][ T3665] EXT4-fs (loop3): can't mount with data_err=abort, fs mounted w/o journal [ 44.970467][ T3676] loop4: detected capacity change from 0 to 1024 [ 44.984723][ T3676] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 44.998737][ T3676] smc_pnet_add_eth: 4 callbacks suppressed [ 44.998755][ T3676] smc: net device bond0 applied user defined pnetid SYZ0 [ 45.030488][ T3676] smc_pnet_remove_by_pnetid: 4 callbacks suppressed [ 45.030505][ T3676] smc: net device bond0 erased user defined pnetid SYZ0 [ 45.043350][ T3680] IPVS: set_ctl: invalid protocol: 39 172.30.1.1:20004 [ 45.076672][ T3682] loop4: detected capacity change from 0 to 1024 [ 45.102145][ T3684] smc: net device bond0 applied user defined pnetid SYZ0 [ 45.109602][ T3682] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 45.110461][ T3684] smc: net device bond0 erased user defined pnetid SYZ0 [ 45.149406][ T3682] smc: net device bond0 applied user defined pnetid SYZ0 [ 45.158533][ T3682] smc: net device bond0 erased user defined pnetid SYZ0 [ 45.274665][ T3690] IPVS: set_ctl: invalid protocol: 39 172.30.1.3:20004 [ 45.489362][ T3698] loop3: detected capacity change from 0 to 1024 [ 45.520670][ T3698] EXT4-fs (loop3): can't mount with data_err=abort, fs mounted w/o journal [ 45.936383][ T3698] smc: net device bond0 applied user defined pnetid SYZ0 [ 46.067512][ T3705] loop3: detected capacity change from 0 to 1024 [ 46.103353][ T3705] EXT4-fs (loop3): can't mount with data_err=abort, fs mounted w/o journal [ 46.140282][ T3711] loop4: detected capacity change from 0 to 1024 [ 46.149071][ T3705] smc: net device bond0 erased user defined pnetid SYZ0 [ 46.191116][ T3709] smc: net device bond0 applied user defined pnetid SYZ0 [ 46.198651][ T3709] smc: net device bond0 erased user defined pnetid SYZ0 [ 46.254566][ T3711] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 46.288709][ T3717] loop2: detected capacity change from 0 to 1024 [ 46.314536][ T3717] EXT4-fs (loop2): can't mount with data_err=abort, fs mounted w/o journal [ 46.325632][ T3711] smc: net device bond0 applied user defined pnetid SYZ0 [ 46.344278][ T3717] smc: net device bond0 erased user defined pnetid SYZ0 [ 46.394890][ T3721] IPVS: set_ctl: invalid protocol: 39 172.30.1.5:20004 [ 46.451535][ T29] kauditd_printk_skb: 104 callbacks suppressed [ 46.451553][ T29] audit: type=1400 audit(1757841434.356:195): avc: denied { read write } for pid=3726 comm="syz.4.81" name="event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 46.512774][ T29] audit: type=1400 audit(1757841434.356:196): avc: denied { open } for pid=3726 comm="syz.4.81" path="/dev/input/event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 46.898914][ T3737] loop2: detected capacity change from 0 to 1024 [ 47.012981][ T3737] EXT4-fs (loop2): can't mount with data_err=abort, fs mounted w/o journal [ 47.132963][ T3737] smc: net device bond0 applied user defined pnetid SYZ0 [ 47.180931][ T29] audit: type=1400 audit(1757841435.086:197): avc: denied { open } for pid=3726 comm="syz.4.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 47.210206][ T3737] smc: net device bond0 erased user defined pnetid SYZ0 [ 47.255137][ T29] audit: type=1400 audit(1757841435.086:198): avc: denied { kernel } for pid=3726 comm="syz.4.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 47.274480][ T29] audit: type=1400 audit(1757841435.086:199): avc: denied { tracepoint } for pid=3726 comm="syz.4.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 47.292878][ T3730] loop4: detected capacity change from 0 to 128 [ 47.342911][ T29] audit: type=1400 audit(1757841435.236:200): avc: denied { mount } for pid=3726 comm="syz.4.81" name="/" dev="loop4" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 47.394384][ T3740] smc: net device bond0 applied user defined pnetid SYZ0 [ 47.404286][ T3740] smc: net device bond0 erased user defined pnetid SYZ0 [ 47.553819][ T3750] smc: net device bond0 applied user defined pnetid SYZ0 [ 47.760091][ T29] audit: type=1400 audit(1757841435.666:201): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 47.811034][ T29] audit: type=1400 audit(1757841435.696:202): avc: denied { create } for pid=3759 comm="syz.4.93" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 47.832118][ T29] audit: type=1400 audit(1757841435.696:203): avc: denied { map } for pid=3759 comm="syz.4.93" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6240 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 47.856159][ T29] audit: type=1400 audit(1757841435.696:204): avc: denied { read write } for pid=3759 comm="syz.4.93" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6240 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 47.930232][ T3763] IPVS: set_ctl: invalid protocol: 39 172.30.1.4:20004 [ 48.136367][ T3771] loop4: detected capacity change from 0 to 1024 [ 48.155752][ T3771] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 48.177045][ T3773] loop3: detected capacity change from 0 to 1024 [ 48.190364][ T3771] smc: net device bond0 erased user defined pnetid SYZ0 [ 48.213326][ T3773] EXT4-fs (loop3): can't mount with data_err=abort, fs mounted w/o journal [ 48.690368][ T3773] smc: net device bond0 applied user defined pnetid SYZ0 [ 48.716317][ T3773] smc: net device bond0 erased user defined pnetid SYZ0 [ 49.164780][ T3795] loop3: detected capacity change from 0 to 1024 [ 49.205032][ T3795] EXT4-fs (loop3): can't mount with data_err=abort, fs mounted w/o journal [ 49.605810][ T3806] IPVS: set_ctl: invalid protocol: 39 172.30.1.5:20004 [ 49.679337][ T3808] loop4: detected capacity change from 0 to 1024 [ 49.725097][ T3808] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 49.906255][ T3813] IPVS: set_ctl: invalid protocol: 39 172.30.1.1:20004 [ 50.175298][ T3825] loop3: detected capacity change from 0 to 1024 [ 50.234538][ T3825] EXT4-fs (loop3): can't mount with data_err=abort, fs mounted w/o journal [ 50.255659][ T3825] smc_pnet_add_eth: 3 callbacks suppressed [ 50.255683][ T3825] smc: net device bond0 applied user defined pnetid SYZ0 [ 50.270234][ T3825] smc_pnet_remove_by_pnetid: 3 callbacks suppressed [ 50.270281][ T3825] smc: net device bond0 erased user defined pnetid SYZ0 [ 50.342367][ T3830] smc: net device bond0 applied user defined pnetid SYZ0 [ 50.349862][ T3830] smc: net device bond0 erased user defined pnetid SYZ0 [ 50.581919][ T3832] loop3: detected capacity change from 0 to 128 [ 50.807376][ T3844] IPVS: set_ctl: invalid protocol: 39 172.30.1.1:20004 [ 50.835750][ T3846] loop4: detected capacity change from 0 to 1024 [ 50.890592][ T3846] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 50.936477][ T3846] smc: net device bond0 applied user defined pnetid SYZ0 [ 50.951595][ T3850] smc: net device bond0 erased user defined pnetid SYZ0 [ 51.151095][ T3855] loop4: detected capacity change from 0 to 128 [ 51.358593][ T3855] syz.4.124: attempt to access beyond end of device [ 51.358593][ T3855] loop4: rw=0, sector=2072, nr_sectors = 1 limit=128 [ 51.463009][ T3863] netlink: 16 bytes leftover after parsing attributes in process `syz.4.126'. [ 51.524408][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 51.524423][ T29] audit: type=1326 audit(1757841439.436:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6625d3eba9 code=0x7ffc0000 [ 51.584958][ T29] audit: type=1326 audit(1757841439.476:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6625d3eba9 code=0x7ffc0000 [ 51.608331][ T29] audit: type=1326 audit(1757841439.476:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6625d3eba9 code=0x7ffc0000 [ 51.631747][ T29] audit: type=1326 audit(1757841439.476:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6625d3eba9 code=0x7ffc0000 [ 51.634585][ T3869] IPVS: set_ctl: invalid protocol: 39 172.30.1.3:20004 [ 51.655039][ T29] audit: type=1326 audit(1757841439.476:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=447 compat=0 ip=0x7f6625d3eba9 code=0x7ffc0000 [ 51.655076][ T29] audit: type=1326 audit(1757841439.476:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6625d3eba9 code=0x7ffc0000 [ 51.655107][ T29] audit: type=1326 audit(1757841439.476:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6625d3eba9 code=0x7ffc0000 [ 51.731827][ T29] audit: type=1326 audit(1757841439.476:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f6625d3eba9 code=0x7ffc0000 [ 51.755121][ T29] audit: type=1326 audit(1757841439.476:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6625d3eba9 code=0x7ffc0000 [ 51.778430][ T29] audit: type=1326 audit(1757841439.476:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f6625d3eba9 code=0x7ffc0000 [ 51.782904][ T3871] smc: net device bond0 applied user defined pnetid SYZ0 [ 51.821851][ T3871] smc: net device bond0 erased user defined pnetid SYZ0 [ 51.887314][ T3873] smc: net device bond0 applied user defined pnetid SYZ0 [ 51.915959][ T3875] smc: net device bond0 erased user defined pnetid SYZ0 [ 52.031257][ T3886] IPVS: set_ctl: invalid protocol: 39 172.30.1.3:20004 [ 52.335676][ T3896] smc: net device bond0 applied user defined pnetid SYZ0 [ 52.349900][ T3896] smc: net device bond0 erased user defined pnetid SYZ0 [ 52.392710][ T3899] loop4: detected capacity change from 0 to 1024 [ 52.413326][ T3894] loop3: detected capacity change from 0 to 128 [ 52.436718][ T3899] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 52.437866][ T3903] random: crng reseeded on system resumption [ 52.474910][ T3899] smc: net device bond0 applied user defined pnetid SYZ0 [ 52.490134][ T3899] smc: net device bond0 erased user defined pnetid SYZ0 [ 52.507692][ T3903] netlink: 14 bytes leftover after parsing attributes in process `syz.2.140'. [ 52.518091][ T3901] smc: net device bond0 applied user defined pnetid SYZ0 [ 52.584669][ T3903] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 52.600160][ T3916] loop4: detected capacity change from 0 to 1024 [ 52.623139][ T3903] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 52.634283][ T3916] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 52.655911][ T3903] bond0 (unregistering): Released all slaves [ 52.688948][ T3916] smc: net device bond0 erased user defined pnetid SYZ0 [ 53.097696][ T3926] smc: net device bond0 applied user defined pnetid SYZ0 [ 53.117168][ T3926] smc: net device bond0 erased user defined pnetid SYZ0 [ 53.266293][ T3923] loop4: detected capacity change from 0 to 128 [ 53.348258][ T3923] syz.4.145: attempt to access beyond end of device [ 53.348258][ T3923] loop4: rw=0, sector=2072, nr_sectors = 1 limit=128 [ 53.629815][ T3934] smc: net device bond0 applied user defined pnetid SYZ0 [ 53.637419][ T3934] smc: net device bond0 erased user defined pnetid SYZ0 [ 53.798904][ T3941] IPVS: set_ctl: invalid protocol: 39 172.30.1.4:20004 [ 54.013340][ T3936] loop4: detected capacity change from 0 to 128 [ 54.275414][ T3943] loop3: detected capacity change from 0 to 128 [ 54.536634][ T3936] syz.4.148: attempt to access beyond end of device [ 54.536634][ T3936] loop4: rw=0, sector=2072, nr_sectors = 1 limit=128 [ 54.584991][ T3952] loop3: detected capacity change from 0 to 1024 [ 54.634438][ T3952] EXT4-fs (loop3): can't mount with data_err=abort, fs mounted w/o journal [ 55.828579][ T3958] loop3: detected capacity change from 0 to 128 [ 56.359938][ T3974] loop4: detected capacity change from 0 to 1024 [ 56.373994][ T3974] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 56.415965][ T3974] smc_pnet_add_eth: 1 callbacks suppressed [ 56.415982][ T3974] smc: net device bond0 applied user defined pnetid SYZ0 [ 56.442310][ T3974] smc_pnet_remove_by_pnetid: 1 callbacks suppressed [ 56.442329][ T3974] smc: net device bond0 erased user defined pnetid SYZ0 [ 56.960058][ T3977] loop4: detected capacity change from 0 to 1024 [ 57.000868][ T3981] IPVS: set_ctl: invalid protocol: 39 172.30.1.3:20004 [ 57.004504][ T3977] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 57.066267][ T3977] smc: net device bond0 applied user defined pnetid SYZ0 [ 57.164301][ T3971] loop3: detected capacity change from 0 to 128 [ 57.228728][ T3992] loop4: detected capacity change from 0 to 1024 [ 57.283384][ T3992] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 57.310238][ T3992] smc: net device bond0 erased user defined pnetid SYZ0 [ 57.481521][ T3971] syz.3.159: attempt to access beyond end of device [ 57.481521][ T3971] loop3: rw=0, sector=2072, nr_sectors = 1 limit=128 [ 57.635941][ T4001] IPVS: set_ctl: invalid protocol: 39 172.30.1.4:20004 [ 57.803344][ T4006] smc: net device bond0 applied user defined pnetid SYZ0 [ 57.810796][ T4006] smc: net device bond0 erased user defined pnetid SYZ0 [ 57.931694][ T4013] IPVS: set_ctl: invalid protocol: 39 172.30.1.1:20004 [ 58.441158][ T4019] loop4: detected capacity change from 0 to 1024 [ 58.613536][ T4019] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 58.639950][ T4019] smc: net device bond0 applied user defined pnetid SYZ0 [ 58.647646][ T4019] smc: net device bond0 erased user defined pnetid SYZ0 [ 58.891121][ T4027] IPVS: set_ctl: invalid protocol: 39 172.30.1.2:20004 [ 59.056487][ T4030] IPVS: set_ctl: invalid protocol: 39 172.30.1.2:20004 [ 59.181556][ T4032] smc: net device bond0 applied user defined pnetid SYZ0 [ 59.204512][ T4032] smc: net device bond0 erased user defined pnetid SYZ0 [ 59.266569][ T4034] smc: net device bond0 applied user defined pnetid SYZ0 [ 59.274127][ T4034] smc: net device bond0 erased user defined pnetid SYZ0 [ 59.282456][ T4024] loop4: detected capacity change from 0 to 128 [ 59.645036][ T4024] syz.4.177: attempt to access beyond end of device [ 59.645036][ T4024] loop4: rw=0, sector=2072, nr_sectors = 1 limit=128 [ 59.848982][ T4021] loop3: detected capacity change from 0 to 128 [ 60.036546][ T4021] syz.3.176: attempt to access beyond end of device [ 60.036546][ T4021] loop3: rw=0, sector=2072, nr_sectors = 1 limit=128 [ 61.737505][ T4066] loop3: detected capacity change from 0 to 128 [ 62.319681][ T4066] syz.3.189: attempt to access beyond end of device [ 62.319681][ T4066] loop3: rw=0, sector=2072, nr_sectors = 1 limit=128 [ 62.797713][ T4088] loop3: detected capacity change from 0 to 128 [ 63.041967][ T4088] syz.3.197: attempt to access beyond end of device [ 63.041967][ T4088] loop3: rw=0, sector=2072, nr_sectors = 1 limit=128 [ 63.178182][ T4090] smc: net device bond0 applied user defined pnetid SYZ0 [ 63.209510][ T4094] smc: net device bond0 erased user defined pnetid SYZ0 [ 63.234053][ T4096] smc: net device bond0 applied user defined pnetid SYZ0 [ 63.241424][ T4096] smc: net device bond0 erased user defined pnetid SYZ0 [ 63.377707][ T4081] loop4: detected capacity change from 0 to 128 [ 63.678011][ T4081] syz.4.193: attempt to access beyond end of device [ 63.678011][ T4081] loop4: rw=0, sector=2072, nr_sectors = 1 limit=128 [ 63.964367][ T4109] IPVS: set_ctl: invalid protocol: 39 172.30.1.2:20004 [ 64.045645][ T4112] IPVS: set_ctl: invalid protocol: 39 172.30.1.2:20004 [ 64.130160][ T4114] smc: net device bond0 applied user defined pnetid SYZ0 [ 64.148509][ T4114] smc: net device bond0 erased user defined pnetid SYZ0 [ 64.184258][ T4116] IPVS: set_ctl: invalid protocol: 39 172.30.1.2:20004 [ 64.318621][ T4120] IPVS: set_ctl: invalid protocol: 39 172.30.1.2:20004 [ 64.717419][ T4135] IPVS: set_ctl: invalid protocol: 39 172.30.1.5:20004 [ 64.765481][ T4137] loop4: detected capacity change from 0 to 1024 [ 64.798280][ T4137] EXT4-fs (loop4): can't mount with data_err=abort, fs mounted w/o journal [ 64.837787][ T4137] smc: net device bond0 applied user defined pnetid SYZ0 [ 64.845417][ T4137] smc: net device bond0 erased user defined pnetid SYZ0 [ 70.618611][ T4171] smc: net device bond0 applied user defined pnetid SYZ0 [ 70.681897][ T4171] smc: net device bond0 erased user defined pnetid SYZ0 [ 72.011285][ T4190] smc: net device bond0 applied user defined pnetid SYZ0 [ 72.018743][ T4190] smc: net device bond0 erased user defined pnetid SYZ0 [ 73.393157][ T4207] smc: net device bond0 applied user defined pnetid SYZ0 [ 73.413041][ T4207] smc: net device bond0 erased user defined pnetid SYZ0 [ 73.465458][ T4212] IPVS: set_ctl: invalid protocol: 39 172.30.1.5:20004 [ 74.298002][ T4230] smc: net device bond0 applied user defined pnetid SYZ0 [ 74.309099][ T4230] smc: net device bond0 erased user defined pnetid SYZ0 [ 74.325446][ T4228] smc: net device bond0 applied user defined pnetid SYZ0 [ 74.333233][ T4228] smc: net device bond0 erased user defined pnetid SYZ0 [ 74.401477][ T4234] smc: net device bond0 applied user defined pnetid SYZ0 [ 74.410098][ T4234] smc: net device bond0 erased user defined pnetid SYZ0 [ 75.005924][ T4244] smc: net device bond0 applied user defined pnetid SYZ0 [ 75.028690][ T4244] smc: net device bond0 erased user defined pnetid SYZ0 [ 76.038107][ T4260] smc: net device bond0 applied user defined pnetid SYZ0 [ 76.053292][ T4260] smc: net device bond0 erased user defined pnetid SYZ0 [ 76.907443][ T4265] smc: net device bond0 applied user defined pnetid SYZ0 [ 76.947578][ T4265] smc: net device bond0 erased user defined pnetid SYZ0 [ 77.248339][ T4273] smc: net device bond0 applied user defined pnetid SYZ0 [ 77.274953][ T4273] smc: net device bond0 erased user defined pnetid SYZ0 [ 77.526572][ T4281] smc: net device bond0 applied user defined pnetid SYZ0 [ 77.534054][ T4281] smc: net device bond0 erased user defined pnetid SYZ0 [ 78.947519][ T4301] IPVS: set_ctl: invalid protocol: 39 172.30.1.2:20004 [ 79.572949][ T4307] smc: net device bond0 applied user defined pnetid SYZ0 [ 79.655888][ T4310] smc: net device bond0 erased user defined pnetid SYZ0 [ 79.979871][ T4321] smc: net device bond0 applied user defined pnetid SYZ0 [ 80.851501][ T4334] smc: net device bond0 erased user defined pnetid SYZ0 [ 83.524304][ T4367] smc: net device bond0 applied user defined pnetid SYZ0 [ 83.626098][ T4368] smc: net device bond0 erased user defined pnetid SYZ0 [ 84.035279][ T4372] smc: net device bond0 applied user defined pnetid SYZ0 [ 84.064168][ T4372] smc: net device bond0 erased user defined pnetid SYZ0 [ 85.963236][ T4391] IPVS: set_ctl: invalid protocol: 39 172.30.1.3:20004 [ 87.426630][ T4410] smc: net device bond0 applied user defined pnetid SYZ0 [ 87.445630][ T4410] smc: net device bond0 erased user defined pnetid SYZ0 [ 88.187993][ T4416] smc: net device bond0 applied user defined pnetid SYZ0 [ 88.399333][ T4421] smc: net device bond0 erased user defined pnetid SYZ0 [ 88.892171][ T29] kauditd_printk_skb: 188 callbacks suppressed [ 88.892190][ T29] audit: type=1326 audit(1757841476.796:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4427 comm="syz.3.292" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1e5af8eba9 code=0x7ffc0000 [ 88.929764][ T29] audit: type=1326 audit(1757841476.796:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4427 comm="syz.3.292" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1e5af8eba9 code=0x7ffc0000 [ 89.563666][ T4436] smc: net device bond0 applied user defined pnetid SYZ0 [ 89.608301][ T4436] smc: net device bond0 erased user defined pnetid SYZ0 [ 90.772218][ T4448] smc: net device bond0 applied user defined pnetid SYZ0 [ 90.779602][ T4448] smc: net device bond0 erased user defined pnetid SYZ0 [ 90.934588][ T4451] smc: net device bond0 applied user defined pnetid SYZ0 [ 90.942287][ T4451] smc: net device bond0 erased user defined pnetid SYZ0 [ 91.043779][ T4455] smc: net device bond0 applied user defined pnetid SYZ0 [ 91.063266][ T4455] smc: net device bond0 erased user defined pnetid SYZ0 [ 92.309607][ T4476] smc: net device bond0 applied user defined pnetid SYZ0 [ 92.325931][ T4476] smc: net device bond0 erased user defined pnetid SYZ0 [ 92.374342][ T4475] smc: net device bond0 applied user defined pnetid SYZ0 [ 92.443221][ T4475] smc: net device bond0 erased user defined pnetid SYZ0 [ 92.461514][ T4479] smc: net device bond0 applied user defined pnetid SYZ0 [ 92.491245][ T4479] smc: net device bond0 erased user defined pnetid SYZ0 [ 92.613580][ T4485] IPVS: set_ctl: invalid protocol: 39 172.30.1.2:20004 [ 92.785493][ T4492] ================================================================== [ 92.793622][ T4492] BUG: KCSAN: data-race in __lru_add_drain_all / folio_add_lru [ 92.801193][ T4492] [ 92.803538][ T4492] read-write to 0xffff888237c25ea8 of 1 bytes by task 4475 on cpu 0: [ 92.811624][ T4492] folio_add_lru+0xa5/0x1f0 [ 92.816164][ T4492] shmem_get_folio_gfp+0x7ab/0xd60 [ 92.821323][ T4492] shmem_write_begin+0xa8/0x190 [ 92.826208][ T4492] generic_perform_write+0x181/0x490 [ 92.831549][ T4492] shmem_file_write_iter+0xc5/0xf0 [ 92.836703][ T4492] vfs_write+0x52a/0x960 [ 92.840973][ T4492] __x64_sys_pwrite64+0xfd/0x150 [ 92.845949][ T4492] x64_sys_call+0xc4d/0x2ff0 [ 92.850581][ T4492] do_syscall_64+0xd2/0x200 [ 92.855214][ T4492] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.861134][ T4492] [ 92.863480][ T4492] read to 0xffff888237c25ea8 of 1 bytes by task 4492 on cpu 1: [ 92.871046][ T4492] __lru_add_drain_all+0x12b/0x3f0 [ 92.876190][ T4492] lru_cache_disable+0x1f/0x30 [ 92.880988][ T4492] __se_sys_mbind+0x496/0xac0 [ 92.885702][ T4492] __x64_sys_mbind+0x78/0x90 [ 92.890325][ T4492] x64_sys_call+0x2932/0x2ff0 [ 92.895037][ T4492] do_syscall_64+0xd2/0x200 [ 92.899587][ T4492] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.905531][ T4492] [ 92.907874][ T4492] value changed: 0x00 -> 0x01 [ 92.912592][ T4492] [ 92.914943][ T4492] Reported by Kernel Concurrency Sanitizer on: [ 92.921124][ T4492] CPU: 1 UID: 0 PID: 4492 Comm: syz.1.307 Not tainted syzkaller #0 PREEMPT(voluntary) [ 92.930787][ T4492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 92.940867][ T4492] ==================================================================