last executing test programs: 3.037339574s ago: executing program 2 (id=93): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = accept(r1, &(0x7f0000000040)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000140)=0x80) bind$rds(r2, &(0x7f0000000180)={0x2, 0x4e24, @empty}, 0x10) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x401, 0x3f000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40240, 0x18676}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x3c}, 0x1, 0xd}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x403, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20101, 0x900}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MTU={0x8, 0x4, 0x66af}]}, 0x44}, 0x1, 0xba01, 0x0, 0x4010}, 0x4810) 2.897430815s ago: executing program 2 (id=99): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095", @ANYRESDEC, @ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x2b, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x1, 0x5, 0x6, 0xc, 0x4}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x35}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2cf}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000140)=""/119, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0x2, 0x8000, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x8, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000002c0)='kfree\x00', r0}, 0x18) r2 = socket(0x10, 0x3, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000f5ffffff0000c99466509ab9e31e8bac5f31a7a40900fff903efbf4349f3da4d456e116147a6777947740658db43547f9cc9620433c3d7bc394539f97e643d012ebfc982092faaf47c714e2adc362c398308d9f04c7965c5e8c6540f8c97d0ff2367448076899498b8ff92e7b994d203aa524c7de6dbb3a9e4e506e38ebee31cc518f33b"], 0x50) read(r0, &(0x7f00000005c0)=""/132, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000005a00010000000000000000000000000008000180044dbdb1"], 0x1c}}, 0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) r5 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) ioctl$VFAT_IOCTL_READDIR_SHORT(r1, 0x82307202, &(0x7f0000000740)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(r5) 2.879206306s ago: executing program 2 (id=100): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x467473f0}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}]}]}], {0x14}}, 0x88}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @notrack={{0xc}, @void}}, {0x2c, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0xc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "c4"}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x9}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x94}}, 0x0) r2 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) mq_notify(r2, &(0x7f0000000300)={0x0, 0x38}) r3 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) mq_timedsend(r3, 0x0, 0x0, 0x6, 0x0) 2.838504689s ago: executing program 2 (id=101): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000f40), r0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x34, r1, 0x1, 0x7ffffc, 0x1000000, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_TYPE={0x5}]}, 0x34}}, 0x0) 2.644822424s ago: executing program 2 (id=104): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x8041}, 0x62004080) 2.27954755s ago: executing program 2 (id=105): socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010600000000106a052503000000000001090224000100000004090400000203000000092100000201220556050581030000000000"], 0x0) gettid() timer_create(0x0, &(0x7f0000000540)={0x0, 0x24, 0x800000000004, @thr={&(0x7f0000000200)="604aeea29e2b9d5231a17e5686186eb3063c4fe8c13f37b805325052bd2a", &(0x7f0000000640)="dde34990c85ac363b80f6b93d79e76396d4fcae029b0c5fe34a40ecba7a1dd90b0c18a0b58165d762e466587be60e9432ede4900bde51ad56a70ae2a0c01cc3a6f92b620440388d5841e22f2f166c9340f4838ea37b05d0ce0b85bf6dabfd9218fecb950489281868f681dd3b978fb202860587225e6a6e7d613ac36f12fe401396cff8a879a29920a3227ab"}}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2000000, 0x300) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x2, 0x800800000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xff7b, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x8, 0x0, 0xf77}]}, 0x10) close(r2) 1.662849457s ago: executing program 1 (id=128): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf38, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) io_setup(0x8, &(0x7f0000004200)=0x0) io_pgetevents(r2, 0x1, 0x1, &(0x7f0000000440)=[{}], &(0x7f0000000200)={0x0, 0x3938700}, 0x0) (fail_nth: 6) 1.446027333s ago: executing program 0 (id=130): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) capget(&(0x7f0000000d40)={0x20071026, 0xffffffffffffffff}, &(0x7f0000004100)={0x81, 0x1, 0x6, 0x7, 0x200, 0xf6}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) getrusage(0xffffffffffffffff, &(0x7f00000011c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) 1.383832557s ago: executing program 0 (id=131): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x467473f0}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}]}]}], {0x14}}, 0x88}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @notrack={{0xc}, @void}}, {0x2c, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0xc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "c4"}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x9}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x94}}, 0x0) r2 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000540)=ANY=[@ANYBLOB='dots,dots,dmask=000000000200000,nodots,discard,nfs=nostale_ro,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c646f733178666c6f70707900000000000000003030ffffffff303030303031373737373737373756c0f39fdb37372c004c0f1208ec0c34b7df4ba1c1e6b76697434db8574db9bcaef6a61a12c3f260bebc7ac5b1b11361119b83f1cf9f686b715b8e58fd37cea6623dc422c2ddbcefe94e5c255b5e8c90613e6b598b3b7a2c05de53dab7"], 0x1, 0x291, &(0x7f0000000280)="$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") syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000100)='.\x00', 0x1a4243c, &(0x7f0000000640)=ANY=[@ANYRES64=r2, @ANYRES16=r2, @ANYRESOCT=r2, @ANYBLOB="f1bcca05ed588d63a576cc3afd51baf29cde2400000092f4e66ff7ef22aa9af727ceae8a8ec95fc1b73083de2de825a0cb2b0be774fdb33650d7dace27c16bc23b2f7c7fb72585445838158f280d138aa9255a8a924008f8477e82ba11cdb11efd5ca2f1ab049ce2cc7815d2daf8daea25533a558d561654faf5e0924f1376174f374d664fad4a6ab24ec000ccace822e7f9426e8e5de1fe58085a0ae86fd02a118b9365961834d46208b9fb4c91a1fa962a8b00a9717fcbb46c2400dc2e319379ea1e5a07aeb3f9cd4e648df445a1b4213e732300000000000010000758027a472e7d263ef567a84166f26ee56e701c63a8863787889bf1c90fccf31954a940c8b584ca89a512f28edec08eb1c0823c028840eeaf3f5d8769023c01ac63f7f959571e8e899b43c293bc21a2b833e5c9c703c4cfa063dd050045706bde3d7ac373ab04b62b4111b59eabd436dd97e788a36ef25bad99beec474e667589d37100ec36292c15c6", @ANYRESHEX=r2, @ANYRESHEX=r2, @ANYRES64, @ANYRES32, @ANYRES64, @ANYRES8=0x0], 0x5, 0x0, &(0x7f0000000000)) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) pwritev2(r3, &(0x7f0000000580)=[{&(0x7f0000000340)="14", 0xff8c}], 0x1, 0x1000000, 0x0, 0x0) r4 = open(&(0x7f00000005c0)='./bus\x00', 0x66842, 0x19) pwritev2(r4, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0xffffffe4}], 0x1, 0x1400, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00', r5}, 0x10) r6 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) epoll_create(0x2) mq_notify(r6, &(0x7f0000000300)={0x0, 0x38}) r7 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) mq_timedsend(r7, 0x0, 0x0, 0x6, 0x0) 1.383614537s ago: executing program 1 (id=132): r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmsg$inet6(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) r5 = io_uring_setup(0x1694, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x1000000, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) 1.349292149s ago: executing program 1 (id=133): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba9432}) io_setup(0xdb0, &(0x7f0000000740)=0x0) r2 = eventfd(0x7) io_submit(r1, 0x3, &(0x7f00000009c0)=[&(0x7f0000000880)={0x0, 0x0, 0x0, 0x3, 0x200, r0, &(0x7f0000000780)="6974f82244a5e9fcd43f48da7d8eec9c77c10f16c5528ffbb1bfbe80ac3bba66fd86880d3d91918c353472bdf28883444e6b9d0a08292809c1fecaf9275a10dc760a6452daea42bbbd6c38ebffd5fbf63978aa204fb1355ab49cb409530ff5661fc501167d545b0e964a88b7342e6d27c20271e9b35460c95082d96e9cef82271de29ff17df3551423f86e3a8987b9d188d179e4dbc5ef17b07b077eca25fe1a8ba11492dfff85f2a0f46e2cfbf3632280e2e9d2a6e949872ad9751553233f7fe7d693338ab876041d9883bfd7e884063af3366edbd6928e1a0f9f467f", 0xdd, 0x8b, 0x0, 0x3}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x2, 0xda59, r0, &(0x7f00000008c0)="71f32861c850502ca5f60e2cc6868d7f52154218d5cc484c", 0x18, 0x1, 0x0, 0x1}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x6, 0x7, r0, &(0x7f0000000940)="04914e0e9f4e855dbb65d32b0252c3b55d0d0882bb67c68c3cce0649dd60ec07909fafcf0e15", 0x26, 0xa8, 0x0, 0x3, r2}]) rmdir(&(0x7f00000040c0)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0/file0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000d7c90000"], 0x48) syz_mount_image$ext4(&(0x7f0000000500)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x0, &(0x7f00000021c0)={[{@dioread_nolock}, {@minixdf}, {@nolazytime}, {}]}, 0x1, 0x783, &(0x7f0000002200)="$eJzs3M9rXOUaAOD3nGaa/si9kwt3ce+mCi20UDpJmk27Mm7ETaFQcFtDMgkhJ5mSmdQkFpq6E4TabFQE0b1Lt0Kpf4A7KSi4F0RrXKibkTOZTNt0Zjptk04bnwdO5vvOfN9533dm8uUcyJkA/rFezX8kEUMRcTEiis39aUQcbLQORaxvjdu8d20q35Ko1y/9kuTTYrNebB0raT4ejcaU+F9E3ClEnH7v0bjV1bX5ySwrLzX7I7WFKyPV1bUzcwuTs+XZ8uLY+PnRc+Pj50bHd63WE2+dP3zr2zc2Nr77qnbz2MCZJCYadUeztl0L9ICt16QQEzv2L+5FsD5Kehgz8BzyAACgu/w8/0Dz3KwQxTjQ7SzNCRwAAAC8lOqD9V792fNIAAAA4AWTRL8zAAAAAPbW9v8BbN/bu1f3wXby8+sRMdwu/kDjHuKIQ1GIiCObyUO3HyRb0+CZrN+IiNsTbT5/vdzR3N3o/ebh3Tkiu+12vv5MtFt/0tb6E23Wn4Ht7054Rp3Xv/vxD3RY/y72GOPrz/5f6Bj/RnXl/WPt4iet+EmH+G/3GP/mxge3Oj1X/yLiZNu/P8lDsbp8P8TIzFzW7lerle6dv07d7Vx/xJFH4idJI2rSvf4rPdb/7uZv8+td4p863v3934o/+NC8/DPxYTOPNCJuNR/z/saOGMcXvv/m0cjJ+nb86Q6vf/v3/81W/Z/3WP+PXw6u9DgUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGtKIGIokLbXaaVoqRRyNiP/GkTSrVGunZyrLi9P5cxHDUUhn5rLyaEQUt/pJ3h9rtO/3z+7oj0fEf344vBV0LiuXpirZdL+LBwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoOVoRAxFkpYiIo2I34tpWir1OysAAABg1w33OwEAAABgz7n+BwAAgP3vaa//k13OAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANjXLl64kG/1zXvXpvL+9NXV5fnK1TPT5ep8aWF5qjRVWbpSmq1UZrNyaaqy8LjjpRExdj6WV0Zq5WptpLq6dnmhsrxYuzy3MDlbvlwuPJeqAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeFJDjS1JSxGRNtppWipF/CsihqOQzMxl5dGI+HdE3C0WBvP+WL+TBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYNdVV9fmJ7OsvPRyN+r7q5yeG5FEvABpdGh80nxXuo1J1iP6nmraTPRZjhPxJLOuP+Zl6XfjlT6tRwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA9Fd1dW1+MsvKS9V+ZwIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEB/pT8lEZFvJ4snhnY+ezD5o9h4jIh3Pr300cpkrbY0lu//tbW/9nFz/9kHJl5/njUAAADAvvfakwzevk7fvo4HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVXV1bX4yy8pLe9iIG/2uEgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeBp/BwAA//9Js7nR") syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x248, &(0x7f0000000300)={[{@jqfmt_vfsv1}, {@dax_inode}, {@i_version}, {@data_writeback}, {@debug}, {@lazytime}]}, 0xfd, 0x49e, &(0x7f0000000e00)="$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") r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000f00)=@raw={'raw\x00', 0x8, 0x3, 0x2e0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x210, 0xffffffff, 0xffffffff, 0x210, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev, [], [], 'batadv0\x00', 'wg1\x00', {}, {}, 0x6}, 0x0, 0xd8, 0x100, 0x0, {0x0, 0x4c00}, [@common=@inet=@tcp={{0x30}, {[], [], 0x0, 0x0, 0x2, 0x4}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x110, 0x0, {}, [@common=@dst={{0x48}, {0x9, 0x6, 0x1, [0x7, 0xf, 0x246, 0x3, 0x0, 0x8, 0xb, 0x5, 0xc, 0x3, 0x9, 0x2, 0x0, 0x2, 0x1, 0x3], 0xb}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x340) bpf$MAP_CREATE(0x0, 0x0, 0x0) unshare(0x6a040600) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0xfffe, @remote}, {0x2, 0x4e23, @rand_addr=0x64010102}, 0x107, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000003, 0x400}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000000)={0x0, 0xa004}, 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xfffd, 0x0, 0x11, 0x0, @loopback, @empty}, {0x0, 0x4e1c, 0x8}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x5, 0xb68, 0x6, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 1.187877752s ago: executing program 0 (id=135): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)={0x44, r1, 0x607, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x2}]}, 0x44}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r3) sendmsg$IEEE802154_ADD_IFACE(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01000000ecffffffffff2000000005002000000000000c001f0070687930"], 0x28}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_DEV(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r4, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x2}, 0x840) r5 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ae4885, 0x0, 0x1e, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES16=r5, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r7, {0x1ff}}, './file0\x00'}) r9 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ANNOUNCE(r8, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x6c, r9, 0x4, 0x70bd26, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x3}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x80000001}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @remote}}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x10}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x24}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1a}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x10}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x24000000}, 0x20004096) 1.187585872s ago: executing program 3 (id=136): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x14081, &(0x7f0000000000), 0x25, 0x4b6, &(0x7f0000000540)="$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") r2 = socket$unix(0x1, 0x1, 0x0) sendfile(r1, r0, &(0x7f0000000080)=0x9, 0xa) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 1.136800725s ago: executing program 0 (id=137): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x10, 0x2, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x2, 0x4, 0x0, 0x1, 0x15}, @jmp={0x5, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffe88}], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c003d000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x24}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x15, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x4000801) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r5) sendmsg$DEVLINK_CMD_RATE_NEW(r5, &(0x7f0000002780)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x44094) sendmsg$nl_route(r2, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[@ANYBLOB="200000006a000100307b747aefdb01a43fc00e00000a0000000000", @ANYRES32=r4, @ANYBLOB], 0x20}}, 0x0) (fail_nth: 4) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e8500000007"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xc00000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r10 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r9, r10, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r9}, &(0x7f00000006c0), &(0x7f0000000700)=r8}, 0x20) sendmsg$inet(r7, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) fchmodat(0xffffffffffffff9c, 0x0, 0xfffffed3) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) 481.003084ms ago: executing program 3 (id=139): r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000003c0)="aebc7d4aa1", 0x5, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000140)=@keyring={'key_or_keyring:', r1}) (fail_nth: 4) 468.788835ms ago: executing program 3 (id=140): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYBLOB="01030000000000000000320000000c009900000000000000000007001801"], 0x28}}, 0x0) 451.091697ms ago: executing program 4 (id=141): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x549, &(0x7f0000001800)="$eJzs3c9vI1cdAPDvTH65222zCz1ABewChQWt1t5421XVS8sFhKpKiIoD4rANiTcKseMQO6UJkUj/BpBA4gR/AgckDkg9ceDGEYkDQpQDUoEItEHiYDRjJ+smNmtqx+7Gn480O/Pmzcz3PWdn3vNz4hfA1LoeEQcRMR8Rb0TEYmd/0lnilfaSHffgcH/l6HB/JYlW6/W/J3l+ti+6zsk82blmISK+/pWIbydn4zZ29zaWq9XKdiddata2So3dvVvrteW1ylpls1y+u3T39ot3XiiPrK7Xar9478vrr37j17/65Lu/O/ji97NiXe7kdddjlNpVnzuJk5mNiFfPI9gEzHTW8xMuBx9MGhEfiYjP5Pf/Yszk/zsBgIus1VqM1mJ3GgC46NJ8DCxJixGRpp1OQLE9hvdMXEqr9Ubz5v36zuZqe6zsSsyl99erldtXF/7w3fzguSRLL+V5eX6eLp9K34mIqxHxo4Un8nRxpV5dnUyXBwCm3pPd7X9E/GshTYvFgU7t8akeAPDYKEy6AADA2Gn/AWD6aP8BYPoM0P53Puw/OPeyAADj4f0/AEwf7T8ATB/tPwBMla+99lq2tI4633+9+ubuzkb9zVurlcZGsbazUlypb28V1+r1tfw7e2qPul61Xt9aej523io1K41mqbG7d69W39ls3su/1/teZW4stQIA/per1975fRIRBy89kS/RNZeDthoutnSERwGPl5lhTtZBgMea2b5geg3UhOedhN+ee1mAyej5Zd6Fnpvv95P/I4jfM4IPlRsfH3z83xzPcLEY2Yfp9cHG/18eeTmA8TP+D9Or1UpOz/k/f5IFAFxIQ/wKX+sHo+qEABP1qMm8R/L5PwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFwwlyPiO5GkxXwu8DT7Ny0WI56KiCsxl9xfr1ZuR8TTcS0i5hay9NKkCw0ADCn9a9KZ/+vG4nOXT+fOJ/9eyNcR8b2fvv7jt5abze2lbP8/TvYvHE8fVn543hDzCgIAg/vzIAfl7Xe5s+56I//gcH/leDnHMp7x3pdOJh9dOTrcz5d2zmy0Wq1WRCHvS1z6ZxKznXMKEfFsRMyMIP7B2xHxsV71T/KxkSudmU+740cn9lNjjZ++L36a57XX2cv30RGUBabNO9nz55Ve918a1/N17/u/kD+hhpc//woRx8++o674s51IMz3iZ/f89UFjPP+br57Z2Vps570d8exsr/jJSfykT/znBoz/x0986ocv98lr/SziRvSO3x2r1KxtlRq7e7fWa8trlbXKZrl8d+nu7RfvvFAu5WPUpeOR6rP+9tLNp/uVLav/pT7xCz3rP39y7ucGrP/P//PGtz79MLlwOv4XPtv75/9Mz/htWZv4+QHjL1/6Zd/pu7P4q33q/6if/80B47/7l73VAQ8FAMagsbu3sVytVraH2sjehY7iOmc2siIOdvBxd3G4oH+KfGNEL0ufjawzNsjBc+f1qp77xuxJX3G0V/5mdsUxVycdeS2G2ngwrliTeyYB4/Hwpp90SQAAAAAAAAAAAAAAgH7G8adLk64jAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF9d/AwAA//8+JMPM") symlink(&(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_io_uring_setup(0x1e1e, &(0x7f0000000200)={0x0, 0x86f7, 0x10100}, &(0x7f0000002000)=0x0, &(0x7f0000000000)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x2, 0x0, @fd_index=0x4, 0x4, &(0x7f0000000280)=""/222, 0x8b, 0x4, 0x1, {0x0, r3}}) io_uring_enter(r0, 0x48e9, 0x0, 0x2, 0x0, 0x0) creat(&(0x7f0000000100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1a2) 428.423038ms ago: executing program 3 (id=142): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r0}, 0x9) fdatasync(r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x2000000000000069, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a5"], 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000600)=@IORING_OP_RECVMSG={0xa, 0x3b, 0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0, 0x80002101, 0x1}) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) connect$netlink(r4, &(0x7f0000000280)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x0) io_uring_enter(0xffffffffffffffff, 0x678, 0x5, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000002c0), 0x3) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000400)={'#! ', './file0', [{0x20, 'GPL\x00'}, {0x20, 'GPL\x00'}, {0x20, 'syzkaller\x00'}, {0x20, 'sys_enter\x00'}, {0x20, 'syzkaller\x00'}, {0x20, 'syzkaller\x00'}, {0x20, '.}@)]'}, {0x20, 'tls\x00'}, {0x20, 'sys_enter\x00'}, {}], 0xa, "5e3f996c499d9dd3fa9e4de77c5a63aaaa08d7ebff52778e904acc0002169113aad03b4fda31661be4ac78d1fa5775c5de2bc6ab3461a26295528116320198d336b858be56711dbd3a71bcf11d6f1c74f598b9db493f6618ccc78adc87e9537c84ccdf913022514b36d46aab34d9df870a5ba91a6c7cdc77edcac3a1"}, 0xd4) r7 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r7, &(0x7f0000000140)=[{&(0x7f00000001c0)="580000001400192340834b80040d8c560a067f0202ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100060c10000000010000000000", 0x58}], 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x27}, 0x74) 344.751194ms ago: executing program 1 (id=143): r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0xffffffffffffffff, 0x400080) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {0x1d, 0x1, 0x6}, [@CGW_MOD_SET={0x15, 0x4, {{{}, 0x0, 0x0, 0x0, 0x0, "38023cf227b17d48"}, 0x6}}, @CGW_CS_CRC8={0x11e, 0x6, {0x47, 0x0, 0x21, 0x0, 0x0, "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", 0x0, "5c8d586b2a88d81866930fca15c8a95d29e5b2ea"}}]}, 0x14c}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0xffffffffffffffff}, 0x13) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) ioctl$USBDEVFS_ALLOC_STREAMS(r0, 0x8008551c, &(0x7f0000000040)={0x385b, 0xd, [{0x3}, {0xd}, {0x6}, {0x9, 0x1}, {0xb, 0x1}, {0x6, 0x1}, {0x7, 0x1}, {0xc}, {0xf}, {0x5, 0x1}, {0x1, 0x1}, {0x8}, {0xb, 0x1}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='devpts\x00', 0x2014800, 0x0) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x11) umount2(&(0x7f0000000280)='./file0\x00', 0x200000000000000) 344.287284ms ago: executing program 3 (id=144): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="02000000040000000700000002"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) io_getevents(0x0, 0x101, 0x0, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x23) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) (async, rerun: 64) fspick(0xffffffffffffffff, &(0x7f0000000400)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1) (async, rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000200)={&(0x7f0000000180)=""/114, 0x72, 0x0, 0x0}}, 0x10) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000770000000e000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r4}, 0x10) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) write$selinux_user(r6, &(0x7f0000000200)=ANY=[@ANYBLOB='system_u:object_r:auth_cache_t root'], 0x27) r7 = socket(0x40000000015, 0x5, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x40, &(0x7f0000000340)={0xa, 0x4e24, 0x4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, 0x4}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800, &(0x7f0000000880)={[{@errors_remount}, {@bsdgroups}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5e}}, {@noauto_da_alloc}, {@bsdgroups}, {@oldalloc}, {@nojournal_checksum}]}, 0x2, 0x44a, &(0x7f0000000400)="$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") 287.914509ms ago: executing program 3 (id=145): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) unshare(0x20000400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x2) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000080), 0x12) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x1c}, 0x10}, 0x1c) 287.582709ms ago: executing program 1 (id=146): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x467473f0}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}]}]}], {0x14}}, 0x88}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @notrack={{0xc}, @void}}, {0x2c, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0xc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "c4"}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x9}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x94}}, 0x0) r2 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000540)=ANY=[@ANYBLOB='dots,dots,dmask=000000000200000,nodots,discard,nfs=nostale_ro,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c646f733178666c6f70707900000000000000003030ffffffff303030303031373737373737373756c0f39fdb37372c004c0f1208ec0c34b7df4ba1c1e6b76697434db8574db9bcaef6a61a12c3f260bebc7ac5b1b11361119b83f1cf9f686b715b8e58fd37cea6623dc422c2ddbcefe94e5c255b5e8c90613e6b598b3b7a2c05de53dab7"], 0x1, 0x291, &(0x7f0000000280)="$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") syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000100)='.\x00', 0x1a4243c, &(0x7f0000000640)=ANY=[@ANYRES64=r2, @ANYRES16=r2, @ANYRESOCT=r2, @ANYBLOB="f1bcca05ed588d63a576cc3afd51baf29cde2400000092f4e66ff7ef22aa9af727ceae8a8ec95fc1b73083de2de825a0cb2b0be774fdb33650d7dace27c16bc23b2f7c7fb72585445838158f280d138aa9255a8a924008f8477e82ba11cdb11efd5ca2f1ab049ce2cc7815d2daf8daea25533a558d561654faf5e0924f1376174f374d664fad4a6ab24ec000ccace822e7f9426e8e5de1fe58085a0ae86fd02a118b9365961834d46208b9fb4c91a1fa962a8b00a9717fcbb46c2400dc2e319379ea1e5a07aeb3f9cd4e648df445a1b4213e732300000000000010000758027a472e7d263ef567a84166f26ee56e701c63a8863787889bf1c90fccf31954a940c8b584ca89a512f28edec08eb1c0823c028840eeaf3f5d8769023c01ac63f7f959571e8e899b43c293bc21a2b833e5c9c703c4cfa063dd050045706bde3d7ac373ab04b62b4111b59eabd436dd97e788a36ef25bad99beec474e667589d37100ec36292c15c6", @ANYRESHEX=r2, @ANYRESHEX=r2, @ANYRES64, @ANYRES32, @ANYRES64, @ANYRES8=0x0], 0x5, 0x0, &(0x7f0000000000)) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) pwritev2(r3, &(0x7f0000000580)=[{&(0x7f0000000340)="14", 0xff8c}], 0x1, 0x1000000, 0x0, 0x0) r4 = open(&(0x7f00000005c0)='./bus\x00', 0x66842, 0x19) pwritev2(r4, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0xffffffe4}], 0x1, 0x1400, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) epoll_create(0x2) mq_notify(r5, &(0x7f0000000300)={0x0, 0x38}) r6 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) mq_timedsend(r6, 0x0, 0x0, 0x6, 0x0) 239.898132ms ago: executing program 0 (id=147): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x467473f0}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}]}]}], {0x14}}, 0x88}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @notrack={{0xc}, @void}}, {0x2c, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0xc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "c4"}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x9}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x94}}, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000540)=ANY=[@ANYBLOB='dots,dots,dmask=000000000200000,nodots,discard,nfs=nostale_ro,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c646f733178666c6f70707900000000000000003030ffffffff303030303031373737373737373756c0f39fdb37372c004c0f1208ec0c34b7df4ba1c1e6b76697434db8574db9bcaef6a61a12c3f260bebc7ac5b1b11361119b83f1cf9f686b715b8e58fd37cea6623dc422c2ddbcefe94e5c255b5e8c90613e6b598b3b7a2c05de53dab7"], 0x1, 0x291, &(0x7f0000000280)="$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") syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000100)='.\x00', 0x1a4243c, &(0x7f0000000640)=ANY=[@ANYRES64=r1, @ANYRES16=r1, @ANYRESOCT=r1, @ANYBLOB="f1bcca05ed588d63a576cc3afd51baf29cde2400000092f4e66ff7ef22aa9af727ceae8a8ec95fc1b73083de2de825a0cb2b0be774fdb33650d7dace27c16bc23b2f7c7fb72585445838158f280d138aa9255a8a924008f8477e82ba11cdb11efd5ca2f1ab049ce2cc7815d2daf8daea25533a558d561654faf5e0924f1376174f374d664fad4a6ab24ec000ccace822e7f9426e8e5de1fe58085a0ae86fd02a118b9365961834d46208b9fb4c91a1fa962a8b00a9717fcbb46c2400dc2e319379ea1e5a07aeb3f9cd4e648df445a1b4213e732300000000000010000758027a472e7d263ef567a84166f26ee56e701c63a8863787889bf1c90fccf31954a940c8b584ca89a512f28edec08eb1c0823c028840eeaf3f5d8769023c01ac63f7f959571e8e899b43c293bc21a2b833e5c9c703c4cfa063dd050045706bde3d7ac373ab04b62b4111b59eabd436dd97e788a36ef25bad99beec474e667589d37100ec36292c15c6", @ANYRESHEX=r1, @ANYRESHEX=r1, @ANYRES64, @ANYRES32, @ANYRES64, @ANYRES8=0x0], 0x5, 0x0, &(0x7f0000000000)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) pwritev2(r2, &(0x7f0000000580)=[{&(0x7f0000000340)="14", 0xff8c}], 0x1, 0x1000000, 0x0, 0x0) r3 = open(&(0x7f00000005c0)='./bus\x00', 0x66842, 0x19) pwritev2(r3, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0xffffffe4}], 0x1, 0x1400, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00'}, 0x10) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1, 0xc}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVex:Di', 0x0) 239.177912ms ago: executing program 4 (id=148): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x467473f0}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}]}]}], {0x14}}, 0x88}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @notrack={{0xc}, @void}}, {0x2c, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0xc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "c4"}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x9}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x94}}, 0x0) r2 = syz_mount_image$msdos(&(0x7f0000000200), &(0x7f0000000240)='./file1\x00', 0x80c406, &(0x7f0000000540)=ANY=[@ANYBLOB='dots,dots,dmask=000000000200000,nodots,discard,nfs=nostale_ro,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c646f733178666c6f70707900000000000000003030ffffffff303030303031373737373737373756c0f39fdb37372c004c0f1208ec0c34b7df4ba1c1e6b76697434db8574db9bcaef6a61a12c3f260bebc7ac5b1b11361119b83f1cf9f686b715b8e58fd37cea6623dc422c2ddbcefe94e5c255b5e8c90613e6b598b3b7a2c05de53dab7"], 0x1, 0x291, &(0x7f0000000280)="$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") syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000100)='.\x00', 0x1a4243c, &(0x7f0000000640)=ANY=[@ANYRES64=r2, @ANYRES16=r2, @ANYRESOCT=r2, @ANYBLOB="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", @ANYRESHEX=r2, @ANYRESHEX=r2, @ANYRES64, @ANYRES32, @ANYRES64, @ANYRES8=0x0], 0x5, 0x0, &(0x7f0000000000)) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) pwritev2(r3, &(0x7f0000000580)=[{&(0x7f0000000340)="14", 0xff8c}], 0x1, 0x1000000, 0x0, 0x0) r4 = open(&(0x7f00000005c0)='./bus\x00', 0x66842, 0x19) pwritev2(r4, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0xffffffe4}], 0x1, 0x1400, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00', r5}, 0x10) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') epoll_create(0x2) mq_notify(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x38}) r6 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) mq_timedsend(r6, 0x0, 0x0, 0x6, 0x0) 196.493505ms ago: executing program 4 (id=149): bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[], 0x38}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000001800090000000000000000001c140000fe"], 0x24}}, 0x0) getpgrp(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, 0x0) getitimer(0x2, &(0x7f0000000180)) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0x0, 0x0) 150.972959ms ago: executing program 4 (id=150): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a3200000000140000001100"], 0x7c}}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x1}, 0x1320, 0xffffffff, 0x3, 0x5, 0x4, 0x1088f109, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a40)={{0x14}, [@NFT_MSG_NEWRULE={0x2c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x54}}, 0x0) close(r0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000001c0)='timer_start\x00'}, 0x18) socket$packet(0x11, 0x3, 0x300) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37438e486dd6317ce22080000"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c80)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000009c0)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 75.844854ms ago: executing program 4 (id=151): r0 = socket(0x10, 0x2, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r2}, 0x10) r3 = memfd_create(&(0x7f0000000880)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc90\xb9voI\xa5/\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\x81\x00V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93\x9c5\xcf\t\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\x94\x13^\x13\xaf\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0x0) io_submit(r9, 0x2, &(0x7f00000000c0)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0xfffd, r6, 0x0, 0x0, 0x0, 0x0, 0x3, r8}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r6, 0x0}]) shutdown(r6, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002a40)={0x2c, r1, 0xe7d02281b1d40d47, 0x0, 0x25dfdbfb, {}, [@ETHTOOL_A_WOL_HEADER={0x4}, @ETHTOOL_A_WOL_MODES={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xd, 0x4, "1fd025cfb15fa717c5"}]}]}, 0x2c}}, 0x0) 75.460114ms ago: executing program 1 (id=152): r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$cgroup_int(r0, 0x0, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'osx.', '\x00'}, &(0x7f0000000540)='\'\x00', 0x2, 0x1) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x7ff, 0x18}, 0xc) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x3, 0x1, 0x8, 0x8100, r1, 0x4, '\x00', 0x0, r2, 0x1, 0x3, 0x3, 0xf, @value=r3, @void, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000280)={'batadv0\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x24}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kmem_cache_free\x00', r9}, 0x18) setreuid(0x0, r8) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000440)={0x80, 0xfffffffe, 0xfffffffe, 0x10000000, 0x0, 0x5}) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000200)=0x9, 0x8, 0x0) 74.136345ms ago: executing program 0 (id=153): r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f1, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000240)=@ethtool_perm_addr={0x20, 0x4d, "dfa34c81ad7d26d1a5462667eb322151dbeb3f085cec492dd120d160d4cd50424cfd68d413e1f5f4267075d39835a47d4e6b7ce289aab15c0eedded107b59b02a8936e63c1ef0b000000000000"}}) r1 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000300)={'vxcan1\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r5, &(0x7f0000000200)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="0100000003ece1e40ad8871461ab0800", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="3bf81bb9f9"], 0x20000600}}, 0x0) sendmsg$can_bcm(r5, &(0x7f0000000080)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[], 0x4640}, 0x2}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800"], 0x48) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) syz_clone3(&(0x7f0000000280)={0x10b822000, 0x0, 0x0, 0x0, {0x2b}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0x0], 0x1}, 0x58) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000003c0)="aebc7d4aa1", 0x5, r7) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r7, &(0x7f0000000200)='asymmetric\x00', &(0x7f00000000c0)=@chain={'key_or_keyring:', r8}) 0s ago: executing program 4 (id=154): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r0}, 0x18) pivot_root(0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000001100), 0x8) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x80000006, 0x0, 0x0, 0xffffff3d}]}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000380)=ANY=[], 0x0) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000440)={r3, r1}, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0xe}, 0x45ff5eb5c5b462aa, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[], 0x0, 0x96, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r4 = openat$incfs(0xffffffffffffff9c, 0x0, 0x1a10c1, 0x9c37611dc13d0d83) fchown(r4, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000580)={0x1, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000ff01000000000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) recvmmsg(r6, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/3, 0x3}, 0xa}], 0x1, 0x2040, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) lsm_set_self_attr(0x66, 0x0, 0x40, 0x0) kernel console output (not intermixed with test programs): [ 23.527716][ T29] audit: type=1400 audit(1739163559.390:81): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.0.24' (ED25519) to the list of known hosts. [ 29.569473][ T29] audit: type=1400 audit(1739163565.420:82): avc: denied { mounton } for pid=3289 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 29.570477][ T3289] cgroup: Unknown subsys name 'net' [ 29.592241][ T29] audit: type=1400 audit(1739163565.420:83): avc: denied { mount } for pid=3289 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.619614][ T29] audit: type=1400 audit(1739163565.460:84): avc: denied { unmount } for pid=3289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.773642][ T3289] cgroup: Unknown subsys name 'cpuset' [ 29.779811][ T3289] cgroup: Unknown subsys name 'rlimit' [ 29.891352][ T29] audit: type=1400 audit(1739163565.740:85): avc: denied { setattr } for pid=3289 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 29.914684][ T29] audit: type=1400 audit(1739163565.740:86): avc: denied { create } for pid=3289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.935187][ T29] audit: type=1400 audit(1739163565.740:87): avc: denied { write } for pid=3289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.955604][ T29] audit: type=1400 audit(1739163565.740:88): avc: denied { read } for pid=3289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.962604][ T3291] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 29.975914][ T29] audit: type=1400 audit(1739163565.740:89): avc: denied { mounton } for pid=3289 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 30.009248][ T29] audit: type=1400 audit(1739163565.740:90): avc: denied { mount } for pid=3289 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 30.032721][ T29] audit: type=1400 audit(1739163565.840:91): avc: denied { relabelto } for pid=3291 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 30.062703][ T3289] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 31.245516][ T3301] chnl_net:caif_netlink_parms(): no params data found [ 31.262253][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 31.275640][ T3298] chnl_net:caif_netlink_parms(): no params data found [ 31.353834][ T3299] chnl_net:caif_netlink_parms(): no params data found [ 31.364831][ T3301] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.371994][ T3301] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.379298][ T3301] bridge_slave_0: entered allmulticast mode [ 31.385699][ T3301] bridge_slave_0: entered promiscuous mode [ 31.423287][ T3301] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.430421][ T3301] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.437893][ T3301] bridge_slave_1: entered allmulticast mode [ 31.444455][ T3301] bridge_slave_1: entered promiscuous mode [ 31.463104][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.470183][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.477385][ T3310] bridge_slave_0: entered allmulticast mode [ 31.483876][ T3310] bridge_slave_0: entered promiscuous mode [ 31.494889][ T3298] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.502024][ T3298] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.509177][ T3298] bridge_slave_0: entered allmulticast mode [ 31.515470][ T3298] bridge_slave_0: entered promiscuous mode [ 31.536758][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.543933][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.551064][ T3310] bridge_slave_1: entered allmulticast mode [ 31.557700][ T3310] bridge_slave_1: entered promiscuous mode [ 31.568825][ T3298] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.575934][ T3298] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.583243][ T3298] bridge_slave_1: entered allmulticast mode [ 31.589578][ T3298] bridge_slave_1: entered promiscuous mode [ 31.598230][ T3303] chnl_net:caif_netlink_parms(): no params data found [ 31.617702][ T3301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.643422][ T3299] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.650560][ T3299] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.657909][ T3299] bridge_slave_0: entered allmulticast mode [ 31.664312][ T3299] bridge_slave_0: entered promiscuous mode [ 31.671853][ T3301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.686921][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.704194][ T3299] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.711351][ T3299] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.718710][ T3299] bridge_slave_1: entered allmulticast mode [ 31.725585][ T3299] bridge_slave_1: entered promiscuous mode [ 31.737951][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.747698][ T3301] team0: Port device team_slave_0 added [ 31.755034][ T3298] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.778347][ T3301] team0: Port device team_slave_1 added [ 31.789684][ T3298] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.802036][ T3299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.828915][ T3299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.843302][ T3310] team0: Port device team_slave_0 added [ 31.849214][ T3301] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.856366][ T3301] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.882638][ T3301] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.905012][ T3310] team0: Port device team_slave_1 added [ 31.910925][ T3301] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.917916][ T3301] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.943986][ T3301] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.955346][ T3298] team0: Port device team_slave_0 added [ 31.978352][ T3298] team0: Port device team_slave_1 added [ 31.988691][ T3299] team0: Port device team_slave_0 added [ 31.999843][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.006863][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.032855][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.048605][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.055760][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.063227][ T3303] bridge_slave_0: entered allmulticast mode [ 32.069704][ T3303] bridge_slave_0: entered promiscuous mode [ 32.076951][ T3299] team0: Port device team_slave_1 added [ 32.082896][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.089963][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.097107][ T3303] bridge_slave_1: entered allmulticast mode [ 32.103662][ T3303] bridge_slave_1: entered promiscuous mode [ 32.110666][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.117671][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.143654][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.175454][ T3298] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.182465][ T3298] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.208858][ T3298] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.235940][ T3301] hsr_slave_0: entered promiscuous mode [ 32.241943][ T3301] hsr_slave_1: entered promiscuous mode [ 32.254502][ T3298] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.261483][ T3298] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.287541][ T3298] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.299619][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.311204][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.318202][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.344183][ T3299] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.355506][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.362498][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.388685][ T3299] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.410365][ T3310] hsr_slave_0: entered promiscuous mode [ 32.416531][ T3310] hsr_slave_1: entered promiscuous mode [ 32.422287][ T3310] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.429890][ T3310] Cannot create hsr debugfs directory [ 32.436956][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.491933][ T3298] hsr_slave_0: entered promiscuous mode [ 32.498222][ T3298] hsr_slave_1: entered promiscuous mode [ 32.504315][ T3298] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.511883][ T3298] Cannot create hsr debugfs directory [ 32.517993][ T3303] team0: Port device team_slave_0 added [ 32.530824][ T3299] hsr_slave_0: entered promiscuous mode [ 32.537082][ T3299] hsr_slave_1: entered promiscuous mode [ 32.543013][ T3299] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.550588][ T3299] Cannot create hsr debugfs directory [ 32.562217][ T3303] team0: Port device team_slave_1 added [ 32.621817][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.628930][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.654964][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.668283][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.675281][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.701347][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.808348][ T3303] hsr_slave_0: entered promiscuous mode [ 32.814435][ T3303] hsr_slave_1: entered promiscuous mode [ 32.820163][ T3303] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.827785][ T3303] Cannot create hsr debugfs directory [ 32.852719][ T3301] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 32.863708][ T3301] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 32.884171][ T3301] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 32.899892][ T3301] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 32.922532][ T3310] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 32.940391][ T3310] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 32.951941][ T3310] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 32.961670][ T3310] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 32.987272][ T3298] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 32.999186][ T3298] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 33.008504][ T3298] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 33.017284][ T3298] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 33.057974][ T3299] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 33.067855][ T3299] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 33.076892][ T3299] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 33.086158][ T3299] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 33.144259][ T3303] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 33.153798][ T3303] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 33.162787][ T3303] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 33.172639][ T3303] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 33.183860][ T3301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.201822][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.215421][ T3301] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.241692][ T28] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.248802][ T28] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.259791][ T3298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.273372][ T3298] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.282330][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.292574][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.299735][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.313059][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.320146][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.333093][ T56] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.340180][ T56] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.363765][ T1799] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.370988][ T1799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.379976][ T1799] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.387045][ T1799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.414774][ T3298] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.442677][ T3301] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 33.453138][ T3301] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.517285][ T3298] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.529542][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.548359][ T3299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.562425][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.571831][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.585224][ T999] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.592323][ T999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.601231][ T999] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.608337][ T999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.625082][ T3299] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.637932][ T3301] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.654819][ T1799] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.662277][ T1799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.684915][ T1799] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.691997][ T1799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.743873][ T3298] veth0_vlan: entered promiscuous mode [ 33.774694][ T3310] veth0_vlan: entered promiscuous mode [ 33.781000][ T3298] veth1_vlan: entered promiscuous mode [ 33.796376][ T3310] veth1_vlan: entered promiscuous mode [ 33.831998][ T3301] veth0_vlan: entered promiscuous mode [ 33.840115][ T3298] veth0_macvtap: entered promiscuous mode [ 33.857880][ T3310] veth0_macvtap: entered promiscuous mode [ 33.868626][ T3299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.880967][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.893312][ T3298] veth1_macvtap: entered promiscuous mode [ 33.902290][ T3301] veth1_vlan: entered promiscuous mode [ 33.909294][ T3310] veth1_macvtap: entered promiscuous mode [ 33.920886][ T3298] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.931102][ T3298] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.951510][ T3298] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.960383][ T3298] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.969177][ T3298] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.977961][ T3298] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.002234][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.012788][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.023867][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.035531][ T3301] veth0_macvtap: entered promiscuous mode [ 34.048062][ T3301] veth1_macvtap: entered promiscuous mode [ 34.055381][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.066495][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.077288][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.086032][ T3310] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.094941][ T3310] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.103797][ T3310] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.112523][ T3310] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.152238][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.162755][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.172675][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.183191][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.195082][ T3301] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.235567][ T3310] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 34.247690][ T3299] veth0_vlan: entered promiscuous mode [ 34.261740][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.272251][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.282092][ T3301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.292662][ T3301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.304349][ T3301] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.315669][ T3303] veth0_vlan: entered promiscuous mode [ 34.328785][ T3299] veth1_vlan: entered promiscuous mode [ 34.340349][ T3301] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.349189][ T3301] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.358073][ T3301] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.366919][ T3301] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.381371][ T3303] veth1_vlan: entered promiscuous mode [ 34.429655][ T3303] veth0_macvtap: entered promiscuous mode [ 34.466654][ T3303] veth1_macvtap: entered promiscuous mode [ 34.476093][ T3299] veth0_macvtap: entered promiscuous mode [ 34.487951][ T3299] veth1_macvtap: entered promiscuous mode [ 34.495627][ T3446] netlink: 3 bytes leftover after parsing attributes in process `+}[@'. [ 34.499922][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.514452][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.524353][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.534937][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.544765][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.555292][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.567458][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.576201][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.586767][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.596665][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.607148][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.617271][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.627738][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.637580][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 34.648051][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.651130][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 34.651147][ T29] audit: type=1400 audit(1739163570.500:136): avc: denied { name_bind } for pid=3447 comm="syz.1.2" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 34.659505][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.664105][ T29] audit: type=1400 audit(1739163570.500:137): avc: denied { node_bind } for pid=3447 comm="syz.1.2" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 34.688165][ T3446] 0ªX¹¦À: renamed from caif0 [ 34.720030][ T3446] 0ªX¹¦À: entered allmulticast mode [ 34.725483][ T3446] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 34.745611][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.756173][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.766100][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.776618][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.786458][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.797073][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.813859][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.822477][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.833147][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.843040][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.853616][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.863464][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.874012][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.883860][ T3303] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 34.894314][ T3303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 34.905989][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.919841][ T3299] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.928727][ T3299] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.937626][ T3299] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.937707][ T29] audit: type=1400 audit(1739163570.770:138): avc: denied { map_create } for pid=3447 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 34.946462][ T3299] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.965473][ T3303] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.973858][ T29] audit: type=1400 audit(1739163570.770:139): avc: denied { map_read map_write } for pid=3447 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 34.982552][ T3303] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.982584][ T3303] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.982652][ T3303] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.028795][ T3457] FAULT_INJECTION: forcing a failure. [ 35.028795][ T3457] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 35.042079][ T3457] CPU: 0 UID: 0 PID: 3457 Comm: syz.0.8 Not tainted 6.14.0-rc1-syzkaller-00276-g69b54314c975 #0 [ 35.042164][ T3457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 35.042187][ T3457] Call Trace: [ 35.042194][ T3457] [ 35.042204][ T3457] dump_stack_lvl+0xf2/0x150 [ 35.042314][ T3457] dump_stack+0x15/0x1a [ 35.042348][ T3457] should_fail_ex+0x24a/0x260 [ 35.042385][ T3457] should_fail+0xb/0x10 [ 35.042436][ T3457] should_fail_usercopy+0x1a/0x20 [ 35.042493][ T3457] _copy_from_user+0x1c/0xa0 [ 35.042524][ T3457] restore_sigcontext+0x64/0x220 [ 35.042568][ T3457] __do_sys_rt_sigreturn+0xfd/0x160 [ 35.042662][ T3457] x64_sys_call+0x2982/0x2dc0 [ 35.042699][ T3457] do_syscall_64+0xc9/0x1c0 [ 35.042765][ T3457] ? clear_bhb_loop+0x55/0xb0 [ 35.042801][ T3457] ? clear_bhb_loop+0x55/0xb0 [ 35.042836][ T3457] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 35.042918][ T3457] RIP: 0033:0x7f2436c38fb9 [ 35.042942][ T3457] Code: 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 90 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 c7 c0 0f 00 00 00 0f 05 <0f> 1f 80 00 00 00 00 48 81 ec 48 01 00 00 49 89 d0 64 48 8b 04 25 [ 35.042961][ T3457] RSP: 002b:00007f2435306a80 EFLAGS: 00000202 ORIG_RAX: 000000000000000f [ 35.042981][ T3457] RAX: ffffffffffffffda RBX: 00007f2436eb5fa0 RCX: 00007f2436c38fb9 [ 35.042997][ T3457] RDX: 00007f2435306a80 RSI: 00007f2435306bb0 RDI: 0000000000000021 [ 35.043012][ T3457] RBP: 00007f2435307090 R08: 00000000000025a5 R09: 0000000000000000 [ 35.043105][ T3457] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 35.043120][ T3457] R13: 0000000000000000 R14: 00007f2436eb5fa0 R15: 00007fff6f3e2bb8 [ 35.043179][ T3457] [ 35.305979][ T3462] loop1: detected capacity change from 0 to 128 [ 35.321662][ T3465] loop4: detected capacity change from 0 to 1024 [ 35.329950][ T3465] EXT4-fs: Ignoring removed bh option [ 35.347013][ T3462] vfat: Unknown parameter '0xffffffffffffffff0xffffffffffffffffÿÿÿÿÿÿÿÿ' [ 35.360285][ T29] audit: type=1326 audit(1739163571.210:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3466 comm="syz.2.3" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7b1d9fcde9 code=0x7ffc0000 [ 35.383578][ T29] audit: type=1326 audit(1739163571.210:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3466 comm="syz.2.3" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f7b1d9fcde9 code=0x7ffc0000 [ 35.406899][ T29] audit: type=1326 audit(1739163571.210:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3466 comm="syz.2.3" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7b1d9fcde9 code=0x7ffc0000 [ 35.430620][ T29] audit: type=1326 audit(1739163571.210:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3466 comm="syz.2.3" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7b1d9fcde9 code=0x7ffc0000 [ 35.454147][ T29] audit: type=1326 audit(1739163571.210:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3466 comm="syz.2.3" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7b1d9fcde9 code=0x7ffc0000 [ 35.477401][ T29] audit: type=1326 audit(1739163571.210:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3466 comm="syz.2.3" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7b1d9fcde9 code=0x7ffc0000 [ 35.528198][ T3478] loop1: detected capacity change from 0 to 128 [ 35.549750][ T3479] netlink: 8 bytes leftover after parsing attributes in process `syz.2.14'. [ 35.557709][ T3465] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-001000000000 r/w without journal. Quota mode: none. [ 35.599223][ T3479] netlink: 'syz.2.14': attribute type 3 has an invalid length. [ 35.599240][ T3465] FAULT_INJECTION: forcing a failure. [ 35.599240][ T3465] name failslab, interval 1, probability 0, space 0, times 1 [ 35.619662][ T3465] CPU: 1 UID: 0 PID: 3465 Comm: syz.4.5 Not tainted 6.14.0-rc1-syzkaller-00276-g69b54314c975 #0 [ 35.619692][ T3465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 35.619704][ T3465] Call Trace: [ 35.619710][ T3465] [ 35.619718][ T3465] dump_stack_lvl+0xf2/0x150 [ 35.619817][ T3465] dump_stack+0x15/0x1a [ 35.619843][ T3465] should_fail_ex+0x24a/0x260 [ 35.619885][ T3465] should_failslab+0x8f/0xb0 [ 35.619913][ T3465] __kmalloc_noprof+0xab/0x3f0 [ 35.619960][ T3465] ? ext4_expand_extra_isize_ea+0x7c9/0xf70 [ 35.619985][ T3465] ext4_expand_extra_isize_ea+0x7c9/0xf70 [ 35.620022][ T3465] __ext4_expand_extra_isize+0x243/0x280 [ 35.620064][ T3465] __ext4_mark_inode_dirty+0x2c5/0x440 [ 35.620126][ T3465] ext4_dirty_inode+0x91/0xb0 [ 35.620160][ T3465] ? __pfx_ext4_dirty_inode+0x10/0x10 [ 35.620203][ T3465] __mark_inode_dirty+0x166/0x7e0 [ 35.620235][ T3465] file_modified_flags+0x2ec/0x320 [ 35.620293][ T3465] file_modified+0x17/0x20 [ 35.620329][ T3465] ext4_buffered_write_iter+0x1cf/0x3c0 [ 35.620383][ T3465] ext4_file_write_iter+0x383/0xf20 [ 35.620482][ T3465] ? 0xffffffff81000000 [ 35.620494][ T3465] ? selinux_file_permission+0x22a/0x360 [ 35.620515][ T3465] ? __rcu_read_unlock+0x4e/0x70 [ 35.620536][ T3465] ? avc_policy_seqno+0x15/0x20 [ 35.620566][ T3465] ? selinux_file_permission+0x22a/0x360 [ 35.620632][ T3465] vfs_write+0x77b/0x920 [ 35.620656][ T3465] ? __pfx_ext4_file_write_iter+0x10/0x10 [ 35.620692][ T3465] __x64_sys_pwrite64+0xf6/0x150 [ 35.620721][ T3465] x64_sys_call+0xab0/0x2dc0 [ 35.620802][ T3465] do_syscall_64+0xc9/0x1c0 [ 35.620832][ T3465] ? clear_bhb_loop+0x55/0xb0 [ 35.620864][ T3465] ? clear_bhb_loop+0x55/0xb0 [ 35.620890][ T3465] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 35.620984][ T3465] RIP: 0033:0x7fbde250cde9 [ 35.621001][ T3465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 35.621019][ T3465] RSP: 002b:00007fbde0b77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 35.621037][ T3465] RAX: ffffffffffffffda RBX: 00007fbde2725fa0 RCX: 00007fbde250cde9 [ 35.621051][ T3465] RDX: 00000000200000c1 RSI: 00004000000000c0 RDI: 0000000000000004 [ 35.621079][ T3465] RBP: 00007fbde0b77090 R08: 0000000000000000 R09: 0000000000000000 [ 35.621091][ T3465] R10: 0000000000009000 R11: 0000000000000246 R12: 0000000000000002 [ 35.621103][ T3465] R13: 0000000000000000 R14: 00007fbde2725fa0 R15: 00007ffd99785458 [ 35.621123][ T3465] [ 35.621134][ T3465] EXT4-fs warning (device loop4): ext4_expand_extra_isize_ea:2863: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 35.660013][ T3478] syz.1.12: attempt to access beyond end of device [ 35.660013][ T3478] loop1: rw=2049, sector=145, nr_sectors = 896 limit=128 [ 35.821111][ T3490] capability: warning: `syz.3.19' uses deprecated v2 capabilities in a way that may be insecure [ 35.932326][ T3494] loop2: detected capacity change from 0 to 128 [ 35.940107][ T3299] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-001000000000. [ 35.970668][ T3478] syz.1.12: attempt to access beyond end of device [ 35.970668][ T3478] loop1: rw=524288, sector=145, nr_sectors = 544 limit=128 [ 36.002186][ T3478] syz.1.12: attempt to access beyond end of device [ 36.002186][ T3478] loop1: rw=524288, sector=697, nr_sectors = 344 limit=128 [ 36.072635][ T36] kworker/u8:2: attempt to access beyond end of device [ 36.072635][ T36] loop1: rw=1, sector=689, nr_sectors = 8 limit=128 [ 36.086096][ T3501] loop2: detected capacity change from 0 to 128 [ 36.103113][ T3506] loop1: detected capacity change from 0 to 128 [ 36.119047][ T3497] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.126411][ T3497] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.147782][ T3510] netlink: 8 bytes leftover after parsing attributes in process `syz.4.17'. [ 36.160240][ T3508] loop2: detected capacity change from 0 to 128 [ 36.234010][ T3512] loop3: detected capacity change from 0 to 4096 [ 36.255007][ T3497] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 36.266227][ T3512] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.280423][ T3497] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 36.337537][ T3310] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.400353][ T3523] loop3: detected capacity change from 0 to 512 [ 36.420717][ T3523] ======================================================= [ 36.420717][ T3523] WARNING: The mand mount option has been deprecated and [ 36.420717][ T3523] and is ignored by this kernel. Remove the mand [ 36.420717][ T3523] option from the mount to silence this warning. [ 36.420717][ T3523] ======================================================= [ 36.445779][ T3497] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.460080][ T3523] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 36.464659][ T3497] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.482107][ T3497] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.485499][ T3523] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.491135][ T3497] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 36.505208][ T3523] ext4 filesystem being mounted at /8/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 36.528807][ T3523] mmap: syz.3.31 (3523) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 36.580160][ T3510] netlink: 8 bytes leftover after parsing attributes in process `syz.4.17'. [ 36.635200][ T3496] syz.4.17 (3496) used greatest stack depth: 10672 bytes left [ 36.654155][ T3497] syz.4.17 (3497) used greatest stack depth: 10512 bytes left [ 36.702057][ T3310] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.742450][ T3538] loop2: detected capacity change from 0 to 128 [ 36.786555][ T3542] loop0: detected capacity change from 0 to 128 [ 36.801613][ T3544] loop2: detected capacity change from 0 to 128 [ 36.809865][ T3547] loop1: detected capacity change from 0 to 128 [ 36.879543][ T3544] syz.2.38: attempt to access beyond end of device [ 36.879543][ T3544] loop2: rw=2049, sector=145, nr_sectors = 896 limit=128 [ 36.920587][ T3557] netlink: 8 bytes leftover after parsing attributes in process `syz.0.43'. [ 36.944015][ T3544] syz.2.38: attempt to access beyond end of device [ 36.944015][ T3544] loop2: rw=524288, sector=145, nr_sectors = 544 limit=128 [ 36.992402][ T3544] syz.2.38: attempt to access beyond end of device [ 36.992402][ T3544] loop2: rw=524288, sector=697, nr_sectors = 344 limit=128 [ 36.993776][ T3562] process 'syz.0.45' launched '/dev/fd/3' with NULL argv: empty string added [ 37.089719][ T3566] Illegal XDP return value 4294967274 on prog (id 30) dev N/A, expect packet loss! [ 37.103940][ T999] kworker/u8:5: attempt to access beyond end of device [ 37.103940][ T999] loop2: rw=1, sector=689, nr_sectors = 8 limit=128 [ 37.135693][ T3568] netlink: 'syz.2.47': attribute type 3 has an invalid length. [ 37.162335][ T3568] netlink: 4 bytes leftover after parsing attributes in process `syz.2.47'. [ 37.191155][ T3572] x_tables: (null)_tables: SNAT target: only valid in nat table, not syz0 [ 37.313956][ T3587] loop3: detected capacity change from 0 to 128 [ 37.358966][ T3589] loop2: detected capacity change from 0 to 2048 [ 37.375196][ T3589] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 37.396694][ T3596] Zero length message leads to an empty skb [ 37.403012][ T3589] ext4 filesystem being mounted at /14/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 37.476467][ T3602] xt_TCPMSS: Only works on TCP SYN packets [ 37.592783][ T3611] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 37.637375][ T3610] netlink: 8 bytes leftover after parsing attributes in process `syz.3.62'. [ 37.737665][ T3620] FAULT_INJECTION: forcing a failure. [ 37.737665][ T3620] name failslab, interval 1, probability 0, space 0, times 0 [ 37.750365][ T3620] CPU: 0 UID: 0 PID: 3620 Comm: syz.1.64 Not tainted 6.14.0-rc1-syzkaller-00276-g69b54314c975 #0 [ 37.750394][ T3620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 37.750470][ T3620] Call Trace: [ 37.750476][ T3620] [ 37.750483][ T3620] dump_stack_lvl+0xf2/0x150 [ 37.750511][ T3620] dump_stack+0x15/0x1a [ 37.750531][ T3620] should_fail_ex+0x24a/0x260 [ 37.750568][ T3620] should_failslab+0x8f/0xb0 [ 37.750617][ T3620] kmem_cache_alloc_noprof+0x52/0x320 [ 37.750652][ T3620] ? skb_clone+0x154/0x1f0 [ 37.750749][ T3620] skb_clone+0x154/0x1f0 [ 37.750862][ T3620] netlink_broadcast_filtered+0x4de/0xbe0 [ 37.751035][ T3620] ? skb_put+0xba/0x100 [ 37.751060][ T3620] netlink_broadcast+0x39/0x50 [ 37.751089][ T3620] kobject_uevent_net_broadcast+0x2a8/0x420 [ 37.751128][ T3620] kobject_uevent_env+0x415/0x550 [ 37.751206][ T3620] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 37.751245][ T3620] ? device_pm_check_callbacks+0x632/0x650 [ 37.751275][ T3620] kobject_uevent+0x1c/0x30 [ 37.751292][ T3620] device_del+0x6fa/0x780 [ 37.751386][ T3620] ? mntput+0x49/0x70 [ 37.751409][ T3620] device_unregister+0x15/0x40 [ 37.751434][ T3620] bdi_unregister+0x307/0x3a0 [ 37.751512][ T3620] del_gendisk+0x2f4/0x5f0 [ 37.751550][ T3620] loop_control_ioctl+0x3ae/0x440 [ 37.751580][ T3620] ? __pfx_loop_control_ioctl+0x10/0x10 [ 37.751677][ T3620] __se_sys_ioctl+0xc9/0x140 [ 37.751697][ T3620] __x64_sys_ioctl+0x43/0x50 [ 37.751718][ T3620] x64_sys_call+0x1690/0x2dc0 [ 37.751744][ T3620] do_syscall_64+0xc9/0x1c0 [ 37.751767][ T3620] ? clear_bhb_loop+0x55/0xb0 [ 37.751807][ T3620] ? clear_bhb_loop+0x55/0xb0 [ 37.751832][ T3620] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.751881][ T3620] RIP: 0033:0x7f979da4cde9 [ 37.751898][ T3620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 37.751918][ T3620] RSP: 002b:00007f979c0b1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 37.751936][ T3620] RAX: ffffffffffffffda RBX: 00007f979dc65fa0 RCX: 00007f979da4cde9 [ 37.751947][ T3620] RDX: 0000000000000001 RSI: 0000000000004c81 RDI: 0000000000000003 [ 37.751958][ T3620] RBP: 00007f979c0b1090 R08: 0000000000000000 R09: 0000000000000000 [ 37.752026][ T3620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 37.752039][ T3620] R13: 0000000000000000 R14: 00007f979dc65fa0 R15: 00007ffc4cb77ad8 [ 37.752060][ T3620] [ 38.065548][ T3626] loop4: detected capacity change from 0 to 128 [ 38.153560][ T3629] loop3: detected capacity change from 0 to 128 [ 38.216593][ T3635] loop4: detected capacity change from 0 to 1024 [ 38.226569][ T3641] loop3: detected capacity change from 0 to 164 [ 38.233409][ T3639] FAULT_INJECTION: forcing a failure. [ 38.233409][ T3639] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 38.244249][ T3635] EXT4-fs: Ignoring removed nobh option [ 38.246499][ T3639] CPU: 1 UID: 0 PID: 3639 Comm: syz.0.74 Not tainted 6.14.0-rc1-syzkaller-00276-g69b54314c975 #0 [ 38.246550][ T3639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 38.246565][ T3639] Call Trace: [ 38.246574][ T3639] [ 38.246584][ T3639] dump_stack_lvl+0xf2/0x150 [ 38.246619][ T3639] dump_stack+0x15/0x1a [ 38.246694][ T3639] should_fail_ex+0x24a/0x260 [ 38.246736][ T3639] should_fail+0xb/0x10 [ 38.246772][ T3639] should_fail_usercopy+0x1a/0x20 [ 38.246811][ T3639] _copy_from_iter+0xd5/0xd00 [ 38.246835][ T3639] ? kmalloc_reserve+0x16e/0x190 [ 38.246866][ T3639] ? __build_skb_around+0x196/0x1f0 [ 38.246896][ T3639] ? __alloc_skb+0x21f/0x310 [ 38.246925][ T3639] ? __virt_addr_valid+0x1ed/0x250 [ 38.246999][ T3639] ? __check_object_size+0x364/0x520 [ 38.247043][ T3639] netlink_sendmsg+0x460/0x6e0 [ 38.247090][ T3639] ? __pfx_netlink_sendmsg+0x10/0x10 [ 38.247173][ T3639] __sock_sendmsg+0x140/0x180 [ 38.247198][ T3639] ____sys_sendmsg+0x312/0x410 [ 38.247237][ T3639] __sys_sendmsg+0x19d/0x230 [ 38.247289][ T3639] __x64_sys_sendmsg+0x46/0x50 [ 38.247406][ T3639] x64_sys_call+0x2734/0x2dc0 [ 38.247438][ T3639] do_syscall_64+0xc9/0x1c0 [ 38.247576][ T3639] ? clear_bhb_loop+0x55/0xb0 [ 38.247610][ T3639] ? clear_bhb_loop+0x55/0xb0 [ 38.247643][ T3639] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 38.247676][ T3639] RIP: 0033:0x7f2436c9cde9 [ 38.247694][ T3639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 38.247735][ T3639] RSP: 002b:00007f2435307038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 38.247757][ T3639] RAX: ffffffffffffffda RBX: 00007f2436eb5fa0 RCX: 00007f2436c9cde9 [ 38.247772][ T3639] RDX: 0000000000000000 RSI: 0000400000000040 RDI: 0000000000000004 [ 38.247787][ T3639] RBP: 00007f2435307090 R08: 0000000000000000 R09: 0000000000000000 [ 38.247801][ T3639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 38.247816][ T3639] R13: 0000000000000000 R14: 00007f2436eb5fa0 R15: 00007fff6f3e2bb8 [ 38.247837][ T3639] [ 38.327106][ T3641] Unable to read rock-ridge attributes [ 38.332244][ T3635] EXT4-fs: Ignoring removed bh option [ 38.349585][ T3641] FAULT_INJECTION: forcing a failure. [ 38.349585][ T3641] name failslab, interval 1, probability 0, space 0, times 0 [ 38.425791][ T3635] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 38.426841][ T3641] CPU: 1 UID: 0 PID: 3641 Comm: syz.3.73 Not tainted 6.14.0-rc1-syzkaller-00276-g69b54314c975 #0 [ 38.426871][ T3641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 38.426948][ T3641] Call Trace: [ 38.426957][ T3641] [ 38.426967][ T3641] dump_stack_lvl+0xf2/0x150 [ 38.427002][ T3641] dump_stack+0x15/0x1a [ 38.427027][ T3641] should_fail_ex+0x24a/0x260 [ 38.427123][ T3641] should_failslab+0x8f/0xb0 [ 38.427211][ T3641] kmem_cache_alloc_noprof+0x52/0x320 [ 38.427274][ T3641] ? alloc_empty_file+0xd0/0x200 [ 38.427316][ T3641] alloc_empty_file+0xd0/0x200 [ 38.427355][ T3641] path_openat+0x6a/0x1fc0 [ 38.427382][ T3641] ? mntput+0x49/0x70 [ 38.427404][ T3641] ? terminate_walk+0x260/0x280 [ 38.427445][ T3641] ? path_openat+0x1a78/0x1fc0 [ 38.427468][ T3641] ? _parse_integer_limit+0x167/0x180 [ 38.427527][ T3641] do_filp_open+0x107/0x230 [ 38.427579][ T3641] do_open_execat+0xd0/0x280 [ 38.427653][ T3641] alloc_bprm+0x2a/0x680 [ 38.427681][ T3641] do_execveat_common+0x12b/0x7e0 [ 38.427715][ T3641] __x64_sys_execve+0x5a/0x70 [ 38.427789][ T3641] x64_sys_call+0x1333/0x2dc0 [ 38.427828][ T3641] do_syscall_64+0xc9/0x1c0 [ 38.427852][ T3641] ? clear_bhb_loop+0x55/0xb0 [ 38.427954][ T3641] ? clear_bhb_loop+0x55/0xb0 [ 38.427988][ T3641] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 38.428076][ T3641] RIP: 0033:0x7f06d782cde9 [ 38.428102][ T3641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 38.428124][ T3641] RSP: 002b:00007f06d5e97038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 38.428147][ T3641] RAX: ffffffffffffffda RBX: 00007f06d7a45fa0 RCX: 00007f06d782cde9 [ 38.428162][ T3641] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000400000000000 [ 38.428176][ T3641] RBP: 00007f06d5e97090 R08: 0000000000000000 R09: 0000000000000000 [ 38.428191][ T3641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 38.428205][ T3641] R13: 0000000000000000 R14: 00007f06d7a45fa0 R15: 00007ffe4860be68 [ 38.428296][ T3641] [ 38.730442][ T3647] netlink: 8 bytes leftover after parsing attributes in process `syz.0.76'. [ 38.873306][ T3655] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3655 comm=syz.4.69 [ 38.917626][ T3659] loop3: detected capacity change from 0 to 128 [ 38.967319][ T3589] syz.2.55 (3589) used greatest stack depth: 7208 bytes left [ 38.975299][ T3299] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.975705][ T3303] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.008428][ T3665] loop4: detected capacity change from 0 to 512 [ 39.036768][ T3665] EXT4-fs: Ignoring removed oldalloc option [ 39.049399][ T3665] EXT4-fs error (device loop4): ext4_xattr_inode_iget:436: comm syz.4.82: Parent and EA inode have the same ino 15 [ 39.064893][ T3665] EXT4-fs (loop4): Remounting filesystem read-only [ 39.071648][ T3665] EXT4-fs warning (device loop4): ext4_evict_inode:259: couldn't mark inode dirty (err -5) [ 39.096834][ T3665] EXT4-fs (loop4): 1 orphan inode deleted [ 39.103203][ T3665] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.115358][ T3665] SELinux: (dev loop4, type ext4) getxattr errno 5 [ 39.124356][ T3665] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.136668][ T3678] FAULT_INJECTION: forcing a failure. [ 39.136668][ T3678] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 39.149878][ T3678] CPU: 0 UID: 0 PID: 3678 Comm: syz.2.89 Not tainted 6.14.0-rc1-syzkaller-00276-g69b54314c975 #0 [ 39.149956][ T3678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 39.149970][ T3678] Call Trace: [ 39.149976][ T3678] [ 39.149985][ T3678] dump_stack_lvl+0xf2/0x150 [ 39.150067][ T3678] dump_stack+0x15/0x1a [ 39.150093][ T3678] should_fail_ex+0x24a/0x260 [ 39.150193][ T3678] should_fail+0xb/0x10 [ 39.150239][ T3678] should_fail_usercopy+0x1a/0x20 [ 39.150260][ T3678] strncpy_from_user+0x25/0x210 [ 39.150301][ T3678] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 39.150334][ T3678] ? getname_flags+0x81/0x3b0 [ 39.150425][ T3678] getname_flags+0xb0/0x3b0 [ 39.150461][ T3678] user_path_at+0x26/0x120 [ 39.150481][ T3678] __x64_sys_chmod+0x68/0x110 [ 39.150509][ T3678] x64_sys_call+0x1487/0x2dc0 [ 39.150536][ T3678] do_syscall_64+0xc9/0x1c0 [ 39.150661][ T3678] ? clear_bhb_loop+0x55/0xb0 [ 39.150689][ T3678] ? clear_bhb_loop+0x55/0xb0 [ 39.150720][ T3678] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.150876][ T3678] RIP: 0033:0x7f7b1d9fcde9 [ 39.150894][ T3678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.150914][ T3678] RSP: 002b:00007f7b1c067038 EFLAGS: 00000246 ORIG_RAX: 000000000000005a [ 39.150933][ T3678] RAX: ffffffffffffffda RBX: 00007f7b1dc15fa0 RCX: 00007f7b1d9fcde9 [ 39.150982][ T3678] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000400000000040 [ 39.150995][ T3678] RBP: 00007f7b1c067090 R08: 0000000000000000 R09: 0000000000000000 [ 39.151007][ T3678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 39.151020][ T3678] R13: 0000000000000000 R14: 00007f7b1dc15fa0 R15: 00007ffdc71a7ad8 [ 39.151041][ T3678] [ 39.152325][ T3665] netlink: 28 bytes leftover after parsing attributes in process `syz.4.82'. [ 39.461048][ T3698] ipvlan2: entered promiscuous mode [ 39.478058][ T3700] netlink: 144 bytes leftover after parsing attributes in process `syz.1.98'. [ 39.618066][ T3710] loop3: detected capacity change from 0 to 512 [ 39.627318][ T3710] EXT4-fs: Ignoring removed oldalloc option [ 39.648777][ T3710] EXT4-fs error (device loop3): ext4_xattr_inode_iget:436: comm syz.3.102: Parent and EA inode have the same ino 15 [ 39.726287][ T3710] EXT4-fs (loop3): Remounting filesystem read-only [ 39.733190][ T3710] EXT4-fs warning (device loop3): ext4_evict_inode:259: couldn't mark inode dirty (err -5) [ 40.088063][ T3710] EXT4-fs (loop3): 1 orphan inode deleted [ 40.100264][ T3710] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.116711][ T3710] SELinux: (dev loop3, type ext4) getxattr errno 5 [ 40.128141][ T3710] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.146176][ T3719] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 40.153178][ T29] kauditd_printk_skb: 394 callbacks suppressed [ 40.153207][ T29] audit: type=1400 audit(1739163576.000:540): avc: denied { read write } for pid=3716 comm="syz.2.105" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.161219][ T3719] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 40.184432][ T29] audit: type=1400 audit(1739163576.000:541): avc: denied { open } for pid=3716 comm="syz.2.105" path="/dev/raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.215368][ T29] audit: type=1400 audit(1739163576.000:542): avc: denied { ioctl } for pid=3716 comm="syz.2.105" path="/dev/raw-gadget" dev="devtmpfs" ino=142 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.249506][ T3710] netlink: 28 bytes leftover after parsing attributes in process `syz.3.102'. [ 40.285203][ T29] audit: type=1400 audit(1739163576.140:543): avc: denied { write } for pid=3728 comm="syz.3.111" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 40.325188][ T29] audit: type=1400 audit(1739163576.180:544): avc: denied { setopt } for pid=3724 comm="syz.0.109" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 40.392545][ T3736] IPVS: sync thread started: state = MASTER, mcast_ifn = wg1, syncid = 262145, id = 0 [ 40.394813][ T3725] IPVS: stopping master sync thread 3736 ... [ 40.403502][ T29] audit: type=1400 audit(1739163576.230:545): avc: denied { write } for pid=3716 comm="syz.2.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 40.446173][ T29] audit: type=1400 audit(1739163576.300:546): avc: denied { ioctl } for pid=3739 comm="syz.4.115" path="socket:[5705]" dev="sockfs" ino=5705 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 40.556355][ T29] audit: type=1326 audit(1739163576.380:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3748 comm="syz.0.118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2436c9cde9 code=0x7ffc0000 [ 40.579772][ T29] audit: type=1326 audit(1739163576.380:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3748 comm="syz.0.118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=98 compat=0 ip=0x7f2436c9cde9 code=0x7ffc0000 [ 40.603345][ T29] audit: type=1326 audit(1739163576.380:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3748 comm="syz.0.118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2436c9cde9 code=0x7ffc0000 [ 40.659359][ T3760] netlink: 28 bytes leftover after parsing attributes in process `syz.1.121'. [ 40.739055][ T3773] FAULT_INJECTION: forcing a failure. [ 40.739055][ T3773] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 40.752331][ T3773] CPU: 0 UID: 0 PID: 3773 Comm: syz.1.128 Not tainted 6.14.0-rc1-syzkaller-00276-g69b54314c975 #0 [ 40.752362][ T3773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 40.752434][ T3773] Call Trace: [ 40.752442][ T3773] [ 40.752451][ T3773] dump_stack_lvl+0xf2/0x150 [ 40.752480][ T3773] dump_stack+0x15/0x1a [ 40.752506][ T3773] should_fail_ex+0x24a/0x260 [ 40.752596][ T3773] should_fail+0xb/0x10 [ 40.752628][ T3773] should_fail_usercopy+0x1a/0x20 [ 40.752650][ T3773] _copy_from_user+0x1c/0xa0 [ 40.752717][ T3773] get_timespec64+0x49/0x140 [ 40.752754][ T3773] __se_sys_io_pgetevents+0x77/0x2e0 [ 40.752806][ T3773] __x64_sys_io_pgetevents+0x78/0x90 [ 40.752839][ T3773] x64_sys_call+0x2d06/0x2dc0 [ 40.752867][ T3773] do_syscall_64+0xc9/0x1c0 [ 40.752894][ T3773] ? clear_bhb_loop+0x55/0xb0 [ 40.752924][ T3773] ? clear_bhb_loop+0x55/0xb0 [ 40.753008][ T3773] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 40.753080][ T3773] RIP: 0033:0x7f979da4cde9 [ 40.753095][ T3773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.753112][ T3773] RSP: 002b:00007f979c0b1038 EFLAGS: 00000246 ORIG_RAX: 000000000000014d [ 40.753143][ T3773] RAX: ffffffffffffffda RBX: 00007f979dc65fa0 RCX: 00007f979da4cde9 [ 40.753157][ T3773] RDX: 0000000000000001 RSI: 0000000000000001 RDI: 00007f979dc3f000 [ 40.753219][ T3773] RBP: 00007f979c0b1090 R08: 0000400000000200 R09: 0000000000000000 [ 40.753233][ T3773] R10: 0000400000000440 R11: 0000000000000246 R12: 0000000000000001 [ 40.753245][ T3773] R13: 0000000000000000 R14: 00007f979dc65fa0 R15: 00007ffc4cb77ad8 [ 40.753262][ T3773] [ 41.139534][ T3786] xt_TCPMSS: Only works on TCP SYN packets [ 41.282336][ T3795] FAULT_INJECTION: forcing a failure. [ 41.282336][ T3795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 41.295514][ T3795] CPU: 0 UID: 0 PID: 3795 Comm: syz.0.137 Not tainted 6.14.0-rc1-syzkaller-00276-g69b54314c975 #0 [ 41.295573][ T3795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 41.295585][ T3795] Call Trace: [ 41.295591][ T3795] [ 41.295599][ T3795] dump_stack_lvl+0xf2/0x150 [ 41.295650][ T3795] dump_stack+0x15/0x1a [ 41.295703][ T3795] should_fail_ex+0x24a/0x260 [ 41.295742][ T3795] should_fail+0xb/0x10 [ 41.295774][ T3795] should_fail_usercopy+0x1a/0x20 [ 41.295796][ T3795] _copy_from_iter+0xd5/0xd00 [ 41.295822][ T3795] ? kmalloc_reserve+0x16e/0x190 [ 41.295907][ T3795] ? __build_skb_around+0x196/0x1f0 [ 41.295945][ T3795] ? __alloc_skb+0x21f/0x310 [ 41.296018][ T3795] ? __virt_addr_valid+0x1ed/0x250 [ 41.296048][ T3795] ? __check_object_size+0x364/0x520 [ 41.296112][ T3795] netlink_sendmsg+0x460/0x6e0 [ 41.296151][ T3795] ? __pfx_netlink_sendmsg+0x10/0x10 [ 41.296243][ T3795] __sock_sendmsg+0x140/0x180 [ 41.296269][ T3795] ____sys_sendmsg+0x312/0x410 [ 41.296306][ T3795] __sys_sendmsg+0x19d/0x230 [ 41.296347][ T3795] __x64_sys_sendmsg+0x46/0x50 [ 41.296451][ T3795] x64_sys_call+0x2734/0x2dc0 [ 41.296480][ T3795] do_syscall_64+0xc9/0x1c0 [ 41.296510][ T3795] ? clear_bhb_loop+0x55/0xb0 [ 41.296544][ T3795] ? clear_bhb_loop+0x55/0xb0 [ 41.296577][ T3795] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.296647][ T3795] RIP: 0033:0x7f2436c9cde9 [ 41.296665][ T3795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.296686][ T3795] RSP: 002b:00007f2435307038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 41.296708][ T3795] RAX: ffffffffffffffda RBX: 00007f2436eb5fa0 RCX: 00007f2436c9cde9 [ 41.296798][ T3795] RDX: 0000000000000000 RSI: 0000400000000940 RDI: 0000000000000006 [ 41.296812][ T3795] RBP: 00007f2435307090 R08: 0000000000000000 R09: 0000000000000000 [ 41.296826][ T3795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.296857][ T3795] R13: 0000000000000000 R14: 00007f2436eb5fa0 R15: 00007fff6f3e2bb8 [ 41.296878][ T3795] [ 41.364032][ C1] hrtimer: interrupt took 46810 ns [ 41.591974][ T3791] loop3: detected capacity change from 0 to 512 [ 41.600782][ T3791] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 41.680800][ T3310] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.698847][ T3804] FAULT_INJECTION: forcing a failure. [ 41.698847][ T3804] name failslab, interval 1, probability 0, space 0, times 0 [ 41.711541][ T3804] CPU: 1 UID: 0 PID: 3804 Comm: syz.3.139 Not tainted 6.14.0-rc1-syzkaller-00276-g69b54314c975 #0 [ 41.711567][ T3804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 41.711734][ T3804] Call Trace: [ 41.711740][ T3804] [ 41.711748][ T3804] dump_stack_lvl+0xf2/0x150 [ 41.711779][ T3804] dump_stack+0x15/0x1a [ 41.711854][ T3804] should_fail_ex+0x24a/0x260 [ 41.711891][ T3804] should_failslab+0x8f/0xb0 [ 41.711926][ T3804] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 41.712042][ T3804] ? down_read+0x171/0x4b0 [ 41.712066][ T3804] ? asymmetric_lookup_restriction+0x7c/0x370 [ 41.712092][ T3804] kstrndup+0x3f/0x90 [ 41.712131][ T3804] asymmetric_lookup_restriction+0x7c/0x370 [ 41.712155][ T3804] ? __pfx_asymmetric_lookup_restriction+0x10/0x10 [ 41.712220][ T3804] keyring_restrict+0xf7/0x280 [ 41.712245][ T3804] keyctl_restrict_keyring+0x103/0x1b0 [ 41.712274][ T3804] __se_sys_keyctl+0x20f/0xbb0 [ 41.712308][ T3804] ? __fget_files+0x17c/0x1c0 [ 41.712351][ T3804] ? fput+0x1c4/0x200 [ 41.712383][ T3804] ? ksys_write+0x176/0x1b0 [ 41.712429][ T3804] __x64_sys_keyctl+0x67/0x80 [ 41.712459][ T3804] x64_sys_call+0x163d/0x2dc0 [ 41.712531][ T3804] do_syscall_64+0xc9/0x1c0 [ 41.712560][ T3804] ? clear_bhb_loop+0x55/0xb0 [ 41.712593][ T3804] ? clear_bhb_loop+0x55/0xb0 [ 41.712622][ T3804] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.712665][ T3804] RIP: 0033:0x7f06d782cde9 [ 41.712687][ T3804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.712704][ T3804] RSP: 002b:00007f06d5e97038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 41.712722][ T3804] RAX: ffffffffffffffda RBX: 00007f06d7a45fa0 RCX: 00007f06d782cde9 [ 41.712733][ T3804] RDX: 0000400000000200 RSI: 000000002a1cc809 RDI: 000000000000001d [ 41.712747][ T3804] RBP: 00007f06d5e97090 R08: 0000000000000000 R09: 0000000000000000 [ 41.712820][ T3804] R10: 0000400000000140 R11: 0000000000000246 R12: 0000000000000001 [ 41.712833][ T3804] R13: 0000000000000000 R14: 00007f06d7a45fa0 R15: 00007ffe4860be68 [ 41.712885][ T3804] [ 41.968846][ T3808] loop4: detected capacity change from 0 to 512 [ 41.984681][ T3808] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.999227][ T3808] ext4 filesystem being mounted at /15/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 42.012763][ T3808] EXT4-fs error (device loop4): ext4_do_update_inode:5154: inode #2: comm syz.4.141: corrupted inode contents [ 42.034504][ T3808] EXT4-fs error (device loop4): ext4_dirty_inode:6042: inode #2: comm syz.4.141: mark_inode_dirty error [ 42.047383][ T3808] EXT4-fs error (device loop4): ext4_do_update_inode:5154: inode #2: comm syz.4.141: corrupted inode contents [ 42.061019][ T3808] EXT4-fs error (device loop4): __ext4_ext_dirty:207: inode #2: comm syz.4.141: mark_inode_dirty error [ 42.147694][ T3299] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.175795][ T3829] loop4: detected capacity change from 0 to 128 [ 42.227358][ T3833] netlink: 8 bytes leftover after parsing attributes in process `syz.4.149'. [ 42.360712][ T3839] netlink: 4 bytes leftover after parsing attributes in process `syz.1.152'. [ 42.371797][ T3839] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 42.379299][ T3839] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 42.387498][ T3839] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 42.394988][ T3839] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 42.455718][ C1] ================================================================== [ 42.463889][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 42.470638][ C1] [ 42.472969][ C1] read-write to 0xffff888106cda668 of 8 bytes by interrupt on cpu 0: [ 42.481051][ C1] can_receive+0x62/0x1f0 [ 42.485489][ C1] canfd_rcv+0xe7/0x180 [ 42.489660][ C1] __netif_receive_skb+0x123/0x280 [ 42.494795][ C1] process_backlog+0x22e/0x440 [ 42.499579][ C1] __napi_poll+0x63/0x3c0 [ 42.503926][ C1] net_rx_action+0x3a1/0x7f0 [ 42.508533][ C1] handle_softirqs+0xbf/0x280 [ 42.513216][ C1] run_ksoftirqd+0x1c/0x30 [ 42.517647][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 42.522593][ C1] kthread+0x4ae/0x520 [ 42.526792][ C1] ret_from_fork+0x4b/0x60 [ 42.531221][ C1] ret_from_fork_asm+0x1a/0x30 [ 42.535998][ C1] [ 42.538322][ C1] read-write to 0xffff888106cda668 of 8 bytes by interrupt on cpu 1: [ 42.546386][ C1] can_receive+0x62/0x1f0 [ 42.550727][ C1] canfd_rcv+0xe7/0x180 [ 42.554902][ C1] __netif_receive_skb+0x123/0x280 [ 42.560036][ C1] process_backlog+0x22e/0x440 [ 42.564821][ C1] __napi_poll+0x63/0x3c0 [ 42.569162][ C1] net_rx_action+0x3a1/0x7f0 [ 42.573767][ C1] handle_softirqs+0xbf/0x280 [ 42.578451][ C1] __irq_exit_rcu+0x3a/0xc0 [ 42.583055][ C1] sysvec_apic_timer_interrupt+0x37/0x80 [ 42.588708][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 42.594961][ C1] [ 42.597281][ C1] value changed: 0x0000000000000cf2 -> 0x0000000000000cf4 [ 42.604389][ C1] [ 42.606709][ C1] Reported by Kernel Concurrency Sanitizer on: [ 42.612860][ C1] CPU: 1 UID: 0 PID: 3844 Comm: syz.1.152 Not tainted 6.14.0-rc1-syzkaller-00276-g69b54314c975 #0 [ 42.623460][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 42.633808][ C1] ================================================================== [ 42.750176][ C1] ================================================================== [ 42.758329][ C1] BUG: KCSAN: data-race in can_receive / can_receive [ 42.765059][ C1] [ 42.767396][ C1] read-write to 0xffff888106cda608 of 8 bytes by interrupt on cpu 0: [ 42.775559][ C1] can_receive+0x4e/0x1f0 [ 42.779920][ C1] canfd_rcv+0xe7/0x180 [ 42.784096][ C1] __netif_receive_skb+0x123/0x280 [ 42.789243][ C1] process_backlog+0x22e/0x440 [ 42.794041][ C1] __napi_poll+0x63/0x3c0 [ 42.798402][ C1] net_rx_action+0x3a1/0x7f0 [ 42.803017][ C1] handle_softirqs+0xbf/0x280 [ 42.807700][ C1] do_softirq+0x5e/0x90 [ 42.811861][ C1] __local_bh_enable_ip+0x6e/0x70 [ 42.816980][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 42.821947][ C1] batadv_nc_purge_paths+0x220/0x270 [ 42.827250][ C1] batadv_nc_mesh_free+0x93/0xb0 [ 42.832301][ C1] batadv_mesh_free+0x4d/0xd0 [ 42.837156][ C1] batadv_softif_free+0x15/0x20 [ 42.842027][ C1] netdev_run_todo+0x6ae/0x7f0 [ 42.846829][ C1] rtnl_dellink+0x4cb/0x590 [ 42.851362][ C1] rtnetlink_rcv_msg+0x651/0x710 [ 42.856309][ C1] netlink_rcv_skb+0x12c/0x230 [ 42.861181][ C1] rtnetlink_rcv+0x1c/0x30 [ 42.865606][ C1] netlink_unicast+0x599/0x670 [ 42.870381][ C1] netlink_sendmsg+0x5cc/0x6e0 [ 42.875165][ C1] __sock_sendmsg+0x140/0x180 [ 42.879843][ C1] ____sys_sendmsg+0x312/0x410 [ 42.884617][ C1] __sys_sendmsg+0x19d/0x230 [ 42.889219][ C1] __x64_sys_sendmsg+0x46/0x50 [ 42.893993][ C1] x64_sys_call+0x2734/0x2dc0 [ 42.898686][ C1] do_syscall_64+0xc9/0x1c0 [ 42.903196][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.909210][ C1] [ 42.911539][ C1] read-write to 0xffff888106cda608 of 8 bytes by interrupt on cpu 1: [ 42.919604][ C1] can_receive+0x4e/0x1f0 [ 42.923949][ C1] canfd_rcv+0xe7/0x180 [ 42.928117][ C1] __netif_receive_skb+0x123/0x280 [ 42.933334][ C1] process_backlog+0x22e/0x440 [ 42.938203][ C1] __napi_poll+0x63/0x3c0 [ 42.942570][ C1] net_rx_action+0x3a1/0x7f0 [ 42.947180][ C1] handle_softirqs+0xbf/0x280 [ 42.951880][ C1] __irq_exit_rcu+0x3a/0xc0 [ 42.956476][ C1] sysvec_apic_timer_interrupt+0x73/0x80 [ 42.962134][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 42.968329][ C1] __sanitizer_cov_trace_pc+0x31/0x70 [ 42.973829][ C1] kthread_should_stop+0x3f/0x90 [ 42.978798][ C1] smpboot_thread_fn+0x35c/0x4c0 [ 42.983776][ C1] kthread+0x4ae/0x520 [ 42.987853][ C1] ret_from_fork+0x4b/0x60 [ 42.992278][ C1] ret_from_fork_asm+0x1a/0x30 [ 42.997065][ C1] [ 42.999415][ C1] value changed: 0x0000000000002ce3 -> 0x0000000000002ce5 [ 43.006516][ C1] [ 43.008834][ C1] Reported by Kernel Concurrency Sanitizer on: [ 43.014997][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.14.0-rc1-syzkaller-00276-g69b54314c975 #0 [ 43.025746][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 43.035806][ C1] ==================================================================