last executing test programs: 4.885346525s ago: executing program 4 (id=44): ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x2, 0xd7, 0x90, 0x1ff, 0x61, @local, @mcast2, 0x40, 0x1, 0xfffffff9, 0x80000003}}) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa80a010100000004"], 0x57) r1 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) ioctl$PAGEMAP_SCAN(r1, 0xc0606610, &(0x7f0000000100)={0x60, 0x0, &(0x7f00001c9000/0x3000)=nil, &(0x7f0000729000/0x4000)=nil, 0x0, &(0x7f0000000040)=[{0x10000000000000, 0xfffffffffffffc00}], 0x1, 0x0, 0x44, 0x2, 0x0, 0xe}) 4.333095495s ago: executing program 4 (id=50): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000080)=[{0x4, 0x7, 0x3, 0x6}, {0x9, 0x7, 0x0, 0x2}]}) r2 = mq_open(&(0x7f0000000140)='*+@[^#^\x00', 0x40, 0x65, 0x0) mq_notify(r2, 0x0) r3 = creat(&(0x7f0000000240)='./file1\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='kfree\x00', r5, 0x0, 0x7}, 0x18) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r7}, 0x10) close(r6) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5393, &(0x7f0000000000)) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r8, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r8, 0x11b, 0x5, &(0x7f0000000440)=0x4000, 0x4) close_range(r3, 0xffffffffffffffff, 0x0) 3.545725391s ago: executing program 3 (id=55): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x67, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r3, 0x0, 0x2}, 0x18) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x0, 0xc}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVex:Di', 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, 0x0, &(0x7f0000000240)}, 0x2f) r5 = syz_io_uring_setup(0x53ec, &(0x7f0000000500)={0x0, 0x7d10, 0x80, 0x3, 0x1000034e}, &(0x7f0000000040)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r8 = socket(0x2a, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x30, 0x0, 0x1ee, 0x2, 0x0, 0x7ff, 0x0, 0x1, {0x1}}) io_uring_enter(r5, 0x46bc, 0x3, 0x20, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r10}, 0x10) socket$packet(0x11, 0xa, 0x300) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000300)={r3, r9, 0x25, 0x13, @void}, 0x10) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r11, 0x5, 0xb68, 0x2000, &(0x7f0000000000)='%', 0x0, 0xd01, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 3.011788051s ago: executing program 2 (id=59): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f0000000200)={[{@quota}, {@debug}]}, 0x1, 0x246, &(0x7f0000000ac0)="$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") 2.991799571s ago: executing program 1 (id=60): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) connect$inet(r0, &(0x7f00000006c0)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) sendmmsg$inet(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000700)="f6", 0x1}], 0x1, &(0x7f0000000c80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @multicast2}}}], 0x20}}], 0x1, 0x4008440) 2.861055434s ago: executing program 1 (id=62): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000a00)=ANY=[@ANYBLOB="0a000000c0000000b30000007f"], 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r1}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000a10000000000000000000010851000000600000018180000", @ANYRES32=r1, @ANYBLOB="0000000000000000660000007fffffff18000000f8ffffff00000000100002019500000000000000360a00000000001018010000202078250000000000202020db1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0xa, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000a0db000000000000000000850000000e000000c50000002a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='netlink_extack\x00', r3}, 0x10) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000dc0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="58010000100013070000000000000000fe80000000000000000000000000001e00000000000000000000ffff0a01010100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="e0000001000000000000000000000000000004d533000000e0000001000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000000000000020000000000000000000000000000000000000000000000000000002000000000000000000000000000000002000000000000000000000067001400636d61632861657329"], 0x158}}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/175, &(0x7f0000000140)=0xaf) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000180)=0x7, 0x4) connect$inet(r0, &(0x7f00000006c0)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) sendmmsg$inet(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000700)="f6", 0x1}], 0x1, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @multicast2}}}], 0x20}}], 0x1, 0x4008440) 2.801847015s ago: executing program 4 (id=63): r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x3a) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r1, 0x2, 0x70bd29, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004080}, 0x810) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)={{0x0, 0x3, 0x6e, 0xff, 0xfff, 0x5, 0x8000, 0x0, 0xad, 0x7, 0x1, 0x7, 0x2e2, 0x7f, 0x9}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000200)={{r2, 0xfff, 0x1, 0x100000001, 0x0, 0x8, 0x9, 0x80, 0xd, 0x7fffffff, 0x2, 0x4, 0xff, 0x9, 0x7}, 0x40, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(0xffffffffffffffff, 0x10, &(0x7f00000004c0)={0x5, 0x0, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/71, 0x47}, {&(0x7f0000000340)=""/255, 0xff}], &(0x7f0000000480)=[0x7, 0x7, 0x3], 0x2}, 0x20) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000500)={'caif0\x00', 0x0}) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r5, 0x24, '\x00', r4, 0xffffffffffffffff, 0x4, 0x2, 0x3}, 0x50) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r3, 0x6628) syz_open_dev$usbfs(&(0x7f0000000640), 0x5, 0x10000) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000680), 0x2a01, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r7, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x1c, r1, 0x100, 0x70bd2c, 0x25dfdbff, {{}, {@val={0x8, 0x3, r8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x48800) r9 = socket(0x2c, 0x80000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000800)={r7}) pwritev(r0, &(0x7f0000000940)=[{&(0x7f0000000840)="33009a1b702ac5cf83b2e46c6cf4ee95ac7a89f1e6849434d8d21e73595bafde118cab50f463d1f89e9f4b74d92c9ba1f724b19e398a6a0e345809b8b39869eb373cfb64ddd8c180ebee6c1f6837bd554e4539a387a0c55ca20d8ee80352c84d6468e2a5b240b16bfd454119660d3ec9f8b764cf9126c876ce246d4d7c67f6e1cd6c3335d6ab96762058bff2a9980cd7eacdd0edf5cd3d80fda222898d93634645c2b6c2537d80ed37", 0xa9}, {&(0x7f0000000900)="f6de1553d01d562774cc52709ec759b758", 0x11}], 0x2, 0x5, 0x2) syz_usb_connect$cdc_ecm(0x6, 0x7e, &(0x7f0000000980)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6c, 0x1, 0x1, 0x3, 0x20, 0x2, [{{0x9, 0x4, 0x0, 0xc, 0x2, 0x2, 0x6, 0x0, 0x19, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x651, 0x3, 0x9, 0xf}, [@mdlm={0x15, 0x24, 0x12, 0x5}, @network_terminal={0x7, 0x24, 0xa, 0x7, 0x7f, 0xa2, 0x7a}, @mbim={0xc, 0x24, 0x1b, 0x1ff, 0xfc6, 0x3, 0x6, 0x1, 0xf9}]}, {[{{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x4, 0x0, 0x7f}}], {{0x9, 0x5, 0x82, 0x2, 0x40, 0x3, 0x6, 0x5}}, {{0x9, 0x5, 0x3, 0x2, 0x10, 0x1, 0x6}}}}}]}}]}}, &(0x7f0000000c40)={0xa, &(0x7f0000000a00)={0xa, 0x6, 0x310, 0x3, 0xff, 0x7a, 0x8, 0x9}, 0xf, &(0x7f0000000a40)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xf, 0x3, 0x8e}]}, 0x3, [{0x6d, &(0x7f0000000a80)=@string={0x6d, 0x3, "8c2ff0a5e873dcfbf1374987cf120eb540f2f581cdc0fe301f4d12e8751bc9d5d29a479d42d35efc165f55a0d290f6a3e6053d4ae07668a37976f1e3f5b932d2a4bf7a0bbeda0cbe1f36ddfb0bb80825fd55e854b8bcaf27ddbe84a5ab2f5f806437decfa34670fe1cc33a"}}, {0xfc, &(0x7f0000000b00)=@string={0xfc, 0x3, "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"}}, {0x4, &(0x7f0000000c00)=@lang_id={0x4, 0x3, 0x411}}]}) ioctl$IMCTRLREQ(r7, 0x80044945, &(0x7f0000000c80)={0x4002, 0x9, 0x9, 0x80000001}) socket$nl_netfilter(0x10, 0x3, 0xc) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000cc0)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x91e53b0, '\x00', r4, 0xffffffffffffffff, 0x1, 0x5, 0xff}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d40)={0x1b, 0x0, 0x0, 0x3, 0x0, r10, 0x0, '\x00', r4}, 0x50) bind$can_j1939(r7, &(0x7f0000000dc0)={0x1d, r4, 0x2, {0x2, 0x1}, 0x2}, 0x18) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r7, 0xc0bc5310, &(0x7f0000000e00)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000f40)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000ec0), &(0x7f0000000f00)=r7}, 0x20) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x1b, 0x14, &(0x7f0000000f80)=@raw=[@exit, @alu={0x4, 0x1, 0x2, 0x2, 0x7, 0x80, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0xb, 0x1, 0x0, r7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000001040)='GPL\x00', 0x5, 0xc4, &(0x7f0000001080)=""/196, 0x41100, 0x0, '\x00', 0x0, @fallback=0x24, r12, 0x8, &(0x7f00000011c0)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000001200)=[r6, r7, r3, 0x1, r6], &(0x7f0000001240)=[{0x4, 0x3, 0xd, 0xb}, {0x0, 0x3, 0x8, 0x8}, {0x1, 0x5, 0x6, 0xa}], 0x10, 0x3}, 0x94) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r9, 0x84, 0x12, &(0x7f0000001340), &(0x7f0000001380)=0x4) 2.785372705s ago: executing program 2 (id=64): socket$netlink(0x10, 0x3, 0x4) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009e0000000b"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000", @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) 2.721611787s ago: executing program 0 (id=65): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r1}, 0x10) r2 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffc) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r2, &(0x7f0000000300)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x810) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000500)='./file2\x00', 0x62432, &(0x7f0000000700)={[{@nojournal_checksum}, {@bsdgroups}, {@nodelalloc}, {@auto_da_alloc}, {@prjquota}]}, 0xc1, 0x7da, &(0x7f0000000fc0)="$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") gettid() sendmsg$inet(r2, &(0x7f0000000f00)={&(0x7f00000001c0)={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000000d40)=[{&(0x7f00000006c0)}, {&(0x7f0000000740)="387f130a427cc16fb463a0cae6cfbe1399b260bd61b2f8846f1ffa0cd9a23ba221fad7433965c031", 0x28}, {&(0x7f00000007c0)="e1ef48f07e8284ab74ae785bd26d1f28deb34086523d615b4135f4c47a67a6f98999b69c84436480ac25f54bebac4dfed417ea43b7cfe817d49f855e44f44b7bda425e2be71fe9dcd9810ffd53201d360d5db11cb6366d91e146b875f30c896cb4597761d2d6ee2d43cc92bb681b0b281c", 0x71}, {&(0x7f0000000840)="6e0bf000a5afce5b6408fbfea843358f6db2b1b0096e693e72b9293091d04c3cdb653b057f7e5e894cb2e648cd87f128b8b2b4b23acee934b4a4b7cb69d6adb6c6b4b1f58d1845b8664e1dd9df36df16711dd64656ff93d63fee2a8a06597b30e5d25d28f6fc043cf852390ac767e43daabf9a10a0c88c6134a2", 0x7a}, {&(0x7f00000008c0)="066618f365d10d92bb2ae81cc5792dd53ed73861b4fab0de3e7e2d04c4295f682fa2992082d52679ae661b6cb654db5781df5f7dcaf336ac10ccff640a1f05bc766d107a0e49aef4557cc9d4e44bffa33cee334517331f7ac0d627f8c4bc6ba9fb3e7aa745932c4dce07c95f53ea5927a20da1d271c2bf8af9ab1f8d3b67633189f3e15af783086a82000614398bbee14473d511e8", 0x95}, {&(0x7f0000000bc0)="30554763977d3a4c237253b4994568f91597c1322254406e535192b07b5718e757eb6d0aa6f20cb5f95e261b188dd50d52f37d572e6f1fbcaf615d6b65090f315c751a4348f7236838816f20e71bfe824130a53d14ca93a83e0ca25037efa7f4ff50b44eb8969548dc7922a9b246acb8e891cd85275e66422321483e45fa4dd6f2784463098515e474664cc01e998411353bd492df1f9c5409354c6299dd2fb5e7cb1f4d4bfd7a4fc5560797fcdefd7829d23bb4c8abeaeb8c3480aa2c6f", 0xbe}, {&(0x7f0000000c80)="4d0038f4de57d84578905540ee7759df81074258359e5af2ecbcfc2cf107dbc62ada367e7bc90c682860df33cd04f47fbe25873435f0fce8267724be78302d5fcdebb261385fd6cb882ba5fa004d3c448e993baf12587dab4e59739e751eea0912eae25058629d1f6f08c91e0d395ea0ccde799412a6652d5b30fd0946d0a29f0e5b9863578cd4472ad0695b65aebf00b7da233f479f669ec8ef22d198256dec7fa25f67455c", 0xa6}], 0x7, &(0x7f0000000e00)=[@ip_ttl={{0x14, 0x0, 0x2, 0xf}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2b}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_int={{0x14}}, @ip_retopts={{0x80, 0x0, 0x7, {[@noop, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xca, 0x3, 0x0, [{@local, 0x10}]}, @timestamp={0x44, 0x10, 0x9f, 0x0, 0x9, [0xd, 0x2, 0x3]}, @lsrr={0x83, 0xb, 0x64, [@initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}, @timestamp_addr={0x44, 0x1c, 0x17, 0x1, 0x5, [{@empty, 0x101}, {@loopback, 0x9}, {@private=0xa010101, 0x4}]}, @lsrr={0x83, 0x1b, 0x29, [@local, @dev={0xac, 0x14, 0x14, 0x32}, @broadcast, @empty, @remote, @private=0xa010102]}, @lsrr={0x83, 0x7, 0xcf, [@local]}, @noop, @generic={0x89, 0x2}]}}}], 0x100}, 0x24004044) timer_settime(0x0, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r4, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='kfree\x00', r5, 0x0, 0x400000b}, 0x3b) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000004800000001"], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r6, &(0x7f0000000400)="2917e68191e426311b66459b8830f798785e1b02ba90a29b4809ef69dcb87f5b2567e428f93b6313f7855c45b1f7d5137077dac5d699524700be8f1b42c56e9a95380534e3366080eb9980384c9caa953300058eb5ce06d46829af19b40ef27bb7d111bd146816a02cdd17aa4b1c7d4166bc78037118e667e0e6c48545dac6e14ddbe5baf80acc"}, 0x20) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"/391], 0xec}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 2.721098637s ago: executing program 1 (id=66): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x67, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r3, 0x0, 0x2}, 0x18) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x0, 0xc}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVex:Di', 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, 0x0, &(0x7f0000000240)}, 0x2f) r5 = syz_io_uring_setup(0x53ec, &(0x7f0000000500)={0x0, 0x7d10, 0x80, 0x3, 0x1000034e}, &(0x7f0000000040)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r8 = socket(0x2a, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x30, 0x0, 0x1ee, 0x2, 0x0, 0x7ff, 0x0, 0x1, {0x1}}) io_uring_enter(r5, 0x46bc, 0x3, 0x20, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r10}, 0x10) socket$packet(0x11, 0xa, 0x300) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000300)={r3, r9, 0x25, 0x13, @void}, 0x10) r11 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r11, 0x5, 0xb68, 0x2000, &(0x7f0000000000)='%', 0x0, 0xd01, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) 2.720285517s ago: executing program 3 (id=67): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000080)=[{0x4, 0x7, 0x3, 0x6}, {0x9, 0x7, 0x0, 0x2}]}) r2 = mq_open(&(0x7f0000000140)='*+@[^#^\x00', 0x40, 0x65, 0x0) mq_notify(r2, 0x0) r3 = creat(&(0x7f0000000240)='./file1\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='kfree\x00', r5, 0x0, 0x7}, 0x18) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r7}, 0x10) close(r6) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5393, &(0x7f0000000000)) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r8, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r8, 0x11b, 0x5, &(0x7f0000000440)=0x4000, 0x4) close_range(r3, 0xffffffffffffffff, 0x0) 2.618952159s ago: executing program 2 (id=68): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) symlink(&(0x7f0000001640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') link(&(0x7f0000000680)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', 0x0) 2.572578649s ago: executing program 2 (id=69): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="01000000030000000400010005"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000080)=r3}, 0x20) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_GET(r7, &(0x7f0000000640)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000500)={&(0x7f0000001680)={0xa8, 0x0, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@pci={{0x8}, {0x11}}, @nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8}, {0x11}}, @pci={{0x8}, {0x11}}]}, 0xa8}}, 0xc4c1) r8 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000001000000000000000000000085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa108000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000180)='syzkaller\x00'}, 0x90) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r8, @ANYBLOB="79610000442b1ca3052d65df0096e1000000", @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x4008084}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}, 0x18) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x548}, 0x1, 0x0, 0x0, 0x24004004}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000000)={[{@i_version}, {@init_itable}, {@noblock_validity}]}, 0x1, 0x71e, &(0x7f0000000f40)="$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") io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r10, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0xe7030003, 0x82, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x100000, 0x3000}]) 2.112774649s ago: executing program 3 (id=70): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x6a000}], 0x1, 0x7000, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000008100000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000500004018210000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b70300000000000085000000c2000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22}, 0x94) ioctl$KDGKBDIACR(r0, 0x4bfb, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000100)='./bus\x00', 0x0, 0x4008}, 0x18) syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xf, 0x6, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) umount2(&(0x7f0000000580)='./file0\x00', 0x3) 2.099262799s ago: executing program 1 (id=71): socket$netlink(0x10, 0x3, 0x10) (async) r0 = socket$netlink(0x10, 0x3, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340)={0x0, r0}, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='./bus\x00', 0x19a) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x1}, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300", 0xffffffff}, 0x48, 0xffffffffffffffff) (async) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000003c0)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a318fcf966c3e795d03cfcad7f1546d2596a0982f8938cf38c052cd831bc62040000000000040400", 0x1d}, 0x48, 0xffffffffffffffff) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) (async) r3 = perf_event_open$cgroup(&(0x7f0000000640)={0x5, 0x80, 0x8, 0x52, 0x52, 0x3, 0x0, 0x3, 0x40, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={0x0, 0x2}, 0x100, 0xd63, 0x0, 0x5, 0x3ff, 0xccfd, 0x1, 0x0, 0x10000, 0x0, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000080)=0x100000000) (async) close(r3) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4, 0x0, 0x4}, 0x18) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r6 = socket$nl_route(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) (async) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0xfffc, 0x0, 0xc8d4}, 0x880) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000a00)=@newtaction={0x164, 0x30, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [{0x150, 0x1, [@m_tunnel_key={0x6c, 0x13, 0x0, 0x0, {{0xf}, {0x4}, {0x3b, 0x6, "766ab0291fbfe88fed13313660724cfd295bd47e912b0aa82544e89e7ca856eb56c4a8746040fa9ca61426653da60d7025afafe5f9521e"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_nat={0xe0, 0xa, 0x0, 0x0, {{0x8}, {0x54, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x7, 0x6, 0x5, 0x4, 0x2}, @multicast1, @rand_addr=0x64010101, 0xffffffff, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x9, 0x8, 0x10000000, 0x43, 0x8001}, @local, @remote, 0xffffffff, 0x1}}]}, {0x66, 0x6, "f9ab71b1cd9a771d80ea0d1c515d433204f5b2a73b584b84f0ac7ee94011b3bfa0ac7e5cc99b53467f2a24431f1b6c01558dbf83da4a7db225086d381e4fafbc692d7ec8540f263bad16ee2075e193c1f34b267a52d4fd7c94b3485ba92a37d6524c"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x4, 0x2}}}}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x10}, 0x0) (async) move_mount(0xffffffffffffffff, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0) setsockopt$MRT6_FLUSH(0xffffffffffffffff, 0x29, 0xd4, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.03165378s ago: executing program 4 (id=72): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1b000000000000000000000000000200000000002a1d146d13a815983e02827c613d5cee0360c92a2b4b4959cccfe27aa8f57f28d791fe16d8edffc4fade8a47a54dc575a5e1ec848e2b", @ANYRES32=0x0, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYBLOB='\x00'/27], 0x48) socket(0xa, 0x3, 0x3a) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = mq_open(&(0x7f0000000480)='!sel\x00\x00\x00\x10\x00\x00\x00\x00\xd7\\P\xc1\xde.O\xcb]0y\x00\x00\x00\x00\x00\x00\x00\x00', 0x6e93ebbbcc0884f2, 0x196, &(0x7f0000000440)={0x2000000000002000, 0x1, 0x56, 0x3}) mq_timedsend(r1, 0x0, 0x0, 0x9, 0x0) mq_timedreceive(r1, &(0x7f0000000880)=""/202, 0xca, 0x100000000000000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000003c0)=ANY=[@ANYRES8, @ANYBLOB="0000000000000008b70383ec72f3bbdd2a49b112000000000000850000001b000052b7"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB], 0xfc}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040), 0x208e24b) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002f40)={&(0x7f0000000c80)=ANY=[], &(0x7f0000002e40)=""/217, 0x45, 0xd9, 0x1, 0x6}, 0x28) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) 1.788911355s ago: executing program 1 (id=73): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000080)={[{@bsdgroups}]}, 0xfc, 0x574, &(0x7f0000001980)="$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") openat(0xffffffffffffff9c, &(0x7f0000000d80)='./file1\x00', 0x143042, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000200)='kmem_cache_free\x00', r2}, 0x18) readlinkat(r0, 0x0, &(0x7f0000000180)=""/10, 0xa) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x105042, 0x19) write$binfmt_format(r3, &(0x7f0000000000)='1\x00', 0xb000) 1.733444636s ago: executing program 0 (id=74): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8614, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x6, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x2, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x1, &(0x7f00000001c0)=[{0x6, 0x1, 0x6, 0x6}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48284b70043dc6124d877142a48448b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d4023f210fa34b63a715a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900000000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b6c7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48fc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f01000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb796ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab04000000ffe760e717a04becff0f719197724f4fce1093b62d7e8c7123d890decace0200f404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef29cd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9fdc75aaaf0100483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270bb29b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214d00000000d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ce21d69993e9960ff5f76015e6c354463d7d0917fc80e5009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab4000000000000000028df75cf43f8ecc8d37b126602111b40e761fd21081920382f14d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd63bed8d31c31c37a373d4efd89fa516dab183ee65744fb8fc4f9ce2242e0f00000000010000000000000000000057d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fa03b84f63e022fe755f4007a4a899eaf52c4f49198e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c716357d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c24936615ee68538e8fddd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba1c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63c41cbde2ba66ad81168070c8c6e18a6e452a31bde54ad3e16304d06a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c7340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85eff010000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f14eafe4b28ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1bfeef448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1099e40550a1cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab916a781b9912160a3fd2a2e74dd690c57bdfdc1f069f9491bca7a8c59363799be70018c25ece5ad7307dc7a95c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2cdfb7fea73ca18874664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677ec97c5c568a89d6e36b165c391339878b699644c96bd6ea589765ed2a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae2676384ff799783f55d7e5a1a092a01b965dc99cb7a9d98440c355927629f2bcf9dc2396eb2f5d25829715b24327642ac4741201014a95e0e65e12cdf27e19043e3c5d3e798375cead35b9a93190a52cdecaaccc854a1d41ef365303f0e9b4fc969c9dab6d00000000000000000000008f6555f3b7d5021dfc8eb504f1e4fef716d60f0d50b03fc014fd3dff46f56750f0ba4f1b9f7de5c17e7d1f18522897edab8e9e76b667ec6b01908400f55e16f0cfbf026be5f5acc681053f697d62b3545aec4606e190216c22c1d8807b6c43f0f0a4b53619fe5c9412821c3816194a5e29cf12cc7a197b5bdafb096d2d7f6be483814c92ef29c3a21c169794c7de3b4c706f4de5f4b93c831944c7b66fa49f317aa22dbc211e19f031c4f8bee14ecd5eb061a052044adc4dd1b63a1500a9c0e09dbba23f2726a55975efb4519d864d984dcb3a1dcafa1124a6b004029a706478df3be2438d2e35e6ca674dc190143a0b6f7db3408c0c08011e5d8f54711a0bd410ab53a15b1596cb77d2b58df2d8d8"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') syz_clone3(&(0x7f0000000740)={0x8180080, 0x0, 0x0, 0x0, {0x39}, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff], 0x1}, 0x58) pwrite64(r1, &(0x7f0000000040)="038fb97db741155b26cc977ed7ede8541275b148c837e240b5a581a33a456701f625b943595153b0f659451c6112", 0x2e, 0x3) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10) sendto$inet(r1, 0x0, 0x0, 0xc806, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000000100)='J', 0xfdbe, 0x4004084, 0x0, 0x11000a00) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) 929.060832ms ago: executing program 4 (id=75): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newtaction={0x78, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x64, 0x1, [@m_tunnel_key={0x60, 0x1, 0x0, 0x0, {{0xf}, {0x30, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x0, 0x0, 0x0, 0x0, 0x2}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0xe, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e22}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x78}}, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f00000005c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000080)={[{@bsdgroups}]}, 0xfc, 0x574, &(0x7f0000001980)="$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") openat(0xffffffffffffff9c, &(0x7f0000000d80)='./file1\x00', 0x143042, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000580)={'veth0_to_team\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000004c0)={r3, r5, 0x25, 0x0, @void}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', r5, @fallback=0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000200)='kmem_cache_free\x00', r6}, 0x18) readlinkat(r1, 0x0, &(0x7f0000000180)=""/10, 0xa) r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x105042, 0x19) write$binfmt_format(r7, &(0x7f0000000000)='1\x00', 0xb000) 888.301512ms ago: executing program 0 (id=76): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000200000000000000000000090400000000000000000000010500000008000000000000000000000300000000020000000200000012000000000000000000000b"], 0x0, 0x5a}, 0x20) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x8, 0x6}, 0x120, 0x10000, 0x33f8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r1, 0xa, 0x13) fcntl$setlease(r1, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r1, 0x400, 0x2) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', 0x0, r0, 0x4, 0x1}, 0x50) 659.650367ms ago: executing program 0 (id=77): r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x2, 0x4, 0x7ffc1ffb}]}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0xffffffffffffff5c, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r3}, 0x10) dup3(r0, r1, 0x0) 581.515898ms ago: executing program 0 (id=78): r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x2, 0x4, 0x7ffc1ffb}]}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0xffffffffffffff5c, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r3}, 0x10) dup3(r0, r1, 0x0) (fail_nth: 1) 528.749899ms ago: executing program 3 (id=79): r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x2, 0x4, 0x7ffc1ffb}]}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000700)='kmem_cache_free\x00', r3, 0x0, 0x9}, 0x18) dup3(r0, r1, 0x0) 293.995254ms ago: executing program 1 (id=80): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000080)=[{0x4, 0x7, 0x3, 0x6}, {0x9, 0x7, 0x0, 0x2}]}) r2 = mq_open(&(0x7f0000000140)='*+@[^#^\x00', 0x40, 0x65, 0x0) mq_notify(r2, 0x0) r3 = creat(&(0x7f0000000240)='./file1\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='kfree\x00', r5, 0x0, 0x7}, 0x18) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r7}, 0x10) close(r6) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5393, &(0x7f0000000000)) r8 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r8, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r8, 0x11b, 0x5, &(0x7f0000000440)=0x4000, 0x4) close_range(r3, 0xffffffffffffffff, 0x0) 231.834015ms ago: executing program 2 (id=81): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), &(0x7f0000000580)=r1}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000540), &(0x7f0000000580)='%pS \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r3}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r0, &(0x7f0000000780)}, 0x20) 230.038756ms ago: executing program 4 (id=82): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[], 0x50) r0 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[], 0x3c}, 0x1, 0x2}, 0x0) 222.436745ms ago: executing program 0 (id=83): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="01000000030000000400010005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000001000000000000000000000085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa108000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000180)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x548}, 0x1, 0x0, 0x0, 0x24004004}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000000)={[{@i_version}, {@init_itable}, {@noblock_validity}]}, 0x1, 0x71e, &(0x7f0000000f40)="$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") r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r5, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0xe7030003, 0x82, 0x1, 0x0, r4, &(0x7f0000000000), 0x100000, 0x3000}]) 179.704086ms ago: executing program 3 (id=84): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000240)=[{}], 0x1, 0x7000, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000008100000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000500004018210000", @ANYRES32=r1, @ANYBLOB], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22}, 0x94) ioctl$KDGKBDIACR(r0, 0x4bfb, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000100)='./bus\x00', 0x0, 0x4008}, 0x18) syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xf, 0x6, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x200000000000006}, 0x18) umount2(&(0x7f0000000580)='./file0\x00', 0x3) 71.953079ms ago: executing program 2 (id=85): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x67, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r3, 0x0, 0x2}, 0x18) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x0, 0xc}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVex:Di', 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, 0x0, &(0x7f0000000240)}, 0x2f) r5 = syz_io_uring_setup(0x53ec, &(0x7f0000000500)={0x0, 0x7d10, 0x80, 0x3, 0x1000034e}, &(0x7f0000000040)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r8 = socket(0x2a, 0x2, 0x0) getsockname$packet(r8, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x30, 0x0, 0x1ee, 0x2, 0x0, 0x7ff, 0x0, 0x1, {0x1}}) io_uring_enter(r5, 0x46bc, 0x3, 0x20, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r10}, 0x10) socket$packet(0x11, 0xa, 0x300) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000300)={r3, r9, 0x25, 0x13, @void}, 0x10) r11 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r11, 0x5, 0xb68, 0x2000, &(0x7f0000000000)='%', 0x0, 0xd01, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) 0s ago: executing program 3 (id=86): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1b000000000000000000000000000200000000002a1d146d13a815983e02827c613d5cee0360c92a2b4b4959cccfe27aa8f57f28d791fe16d8edffc4fade8a47a54dc575a5e1ec848e2b", @ANYRES32=0x0, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYBLOB='\x00'/27], 0x48) socket(0xa, 0x3, 0x3a) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = mq_open(&(0x7f0000000480)='!sel\x00\x00\x00\x10\x00\x00\x00\x00\xd7\\P\xc1\xde.O\xcb]0y\x00\x00\x00\x00\x00\x00\x00\x00', 0x6e93ebbbcc0884f2, 0x196, &(0x7f0000000440)={0x2000000000002000, 0x1, 0x56, 0x3}) mq_timedsend(r1, 0x0, 0x0, 0x9, 0x0) mq_timedreceive(r1, &(0x7f0000000880)=""/202, 0xca, 0x100000000000000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000003c0)=ANY=[@ANYRES8, @ANYBLOB="0000000000000008b70383ec72f3bbdd2a49b112000000000000850000001b000052b7"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB], 0xfc}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040), 0x208e24b) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002f40)={&(0x7f0000000c80)=ANY=[], &(0x7f0000002e40)=""/217, 0x45, 0xd9, 0x1, 0x6}, 0x28) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.125' (ED25519) to the list of known hosts. [ 27.614522][ T29] audit: type=1400 audit(1757798040.032:62): avc: denied { mounton } for pid=3291 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.615343][ T3291] cgroup: Unknown subsys name 'net' [ 27.637537][ T29] audit: type=1400 audit(1757798040.032:63): avc: denied { mount } for pid=3291 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.664910][ T29] audit: type=1400 audit(1757798040.062:64): avc: denied { unmount } for pid=3291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.803220][ T3291] cgroup: Unknown subsys name 'cpuset' [ 27.809664][ T3291] cgroup: Unknown subsys name 'rlimit' [ 27.998870][ T29] audit: type=1400 audit(1757798040.412:65): avc: denied { setattr } for pid=3291 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.024522][ T29] audit: type=1400 audit(1757798040.412:66): avc: denied { create } for pid=3291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.045044][ T29] audit: type=1400 audit(1757798040.412:67): avc: denied { write } for pid=3291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.062221][ T3294] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.065597][ T29] audit: type=1400 audit(1757798040.412:68): avc: denied { read } for pid=3291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 28.095349][ T29] audit: type=1400 audit(1757798040.422:69): avc: denied { mounton } for pid=3291 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.108263][ T3291] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.120140][ T29] audit: type=1400 audit(1757798040.422:70): avc: denied { mount } for pid=3291 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 28.120173][ T29] audit: type=1400 audit(1757798040.492:71): avc: denied { relabelto } for pid=3294 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 29.972662][ T3303] chnl_net:caif_netlink_parms(): no params data found [ 30.051046][ T3309] chnl_net:caif_netlink_parms(): no params data found [ 30.094114][ T3302] chnl_net:caif_netlink_parms(): no params data found [ 30.112279][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.119818][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.127144][ T3303] bridge_slave_0: entered allmulticast mode [ 30.133683][ T3303] bridge_slave_0: entered promiscuous mode [ 30.140322][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 30.164438][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.171701][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.179030][ T3303] bridge_slave_1: entered allmulticast mode [ 30.185432][ T3303] bridge_slave_1: entered promiscuous mode [ 30.233347][ T3309] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.240558][ T3309] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.248100][ T3309] bridge_slave_0: entered allmulticast mode [ 30.254809][ T3309] bridge_slave_0: entered promiscuous mode [ 30.264721][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.276883][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.290300][ T3309] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.297535][ T3309] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.304783][ T3309] bridge_slave_1: entered allmulticast mode [ 30.311280][ T3309] bridge_slave_1: entered promiscuous mode [ 30.319550][ T3301] chnl_net:caif_netlink_parms(): no params data found [ 30.356321][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.363495][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.371394][ T3306] bridge_slave_0: entered allmulticast mode [ 30.377974][ T3306] bridge_slave_0: entered promiscuous mode [ 30.392038][ T3309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.406118][ T3302] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.413198][ T3302] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.420333][ T3302] bridge_slave_0: entered allmulticast mode [ 30.427476][ T3302] bridge_slave_0: entered promiscuous mode [ 30.434788][ T3303] team0: Port device team_slave_0 added [ 30.440927][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.448193][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.455331][ T3306] bridge_slave_1: entered allmulticast mode [ 30.461917][ T3306] bridge_slave_1: entered promiscuous mode [ 30.469260][ T3309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.485177][ T3302] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.492302][ T3302] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.499526][ T3302] bridge_slave_1: entered allmulticast mode [ 30.506317][ T3302] bridge_slave_1: entered promiscuous mode [ 30.517792][ T3303] team0: Port device team_slave_1 added [ 30.549664][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.566817][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.581763][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.596436][ T3309] team0: Port device team_slave_0 added [ 30.607717][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.621649][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.628816][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.655014][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.671177][ T3309] team0: Port device team_slave_1 added [ 30.686514][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.693527][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.719617][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.733664][ T3306] team0: Port device team_slave_0 added [ 30.740955][ T3306] team0: Port device team_slave_1 added [ 30.751013][ T3301] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.758201][ T3301] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.765402][ T3301] bridge_slave_0: entered allmulticast mode [ 30.771773][ T3301] bridge_slave_0: entered promiscuous mode [ 30.778736][ T3302] team0: Port device team_slave_0 added [ 30.785593][ T3302] team0: Port device team_slave_1 added [ 30.805478][ T3301] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.812896][ T3301] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.820646][ T3301] bridge_slave_1: entered allmulticast mode [ 30.827407][ T3301] bridge_slave_1: entered promiscuous mode [ 30.848523][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.855611][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.882283][ T3309] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.903640][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.910609][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.936998][ T3302] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.949663][ T3303] hsr_slave_0: entered promiscuous mode [ 30.955905][ T3303] hsr_slave_1: entered promiscuous mode [ 30.961935][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.968927][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 30.995182][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.006247][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.013545][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.040068][ T3309] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.055813][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.062838][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.088929][ T3302] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.105852][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.112996][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.139383][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.159618][ T3301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.186323][ T3301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.225088][ T3302] hsr_slave_0: entered promiscuous mode [ 31.231075][ T3302] hsr_slave_1: entered promiscuous mode [ 31.237248][ T3302] debugfs: 'hsr0' already exists in 'hsr' [ 31.243019][ T3302] Cannot create hsr debugfs directory [ 31.250577][ T3309] hsr_slave_0: entered promiscuous mode [ 31.256629][ T3309] hsr_slave_1: entered promiscuous mode [ 31.262635][ T3309] debugfs: 'hsr0' already exists in 'hsr' [ 31.268537][ T3309] Cannot create hsr debugfs directory [ 31.288245][ T3306] hsr_slave_0: entered promiscuous mode [ 31.294451][ T3306] hsr_slave_1: entered promiscuous mode [ 31.300355][ T3306] debugfs: 'hsr0' already exists in 'hsr' [ 31.306280][ T3306] Cannot create hsr debugfs directory [ 31.314885][ T3301] team0: Port device team_slave_0 added [ 31.338140][ T3301] team0: Port device team_slave_1 added [ 31.389235][ T3301] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.396331][ T3301] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.422306][ T3301] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.453898][ T3301] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.461054][ T3301] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.487672][ T3301] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.580575][ T3301] hsr_slave_0: entered promiscuous mode [ 31.586926][ T3301] hsr_slave_1: entered promiscuous mode [ 31.593185][ T3301] debugfs: 'hsr0' already exists in 'hsr' [ 31.598953][ T3301] Cannot create hsr debugfs directory [ 31.609208][ T3303] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 31.617967][ T3303] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 31.631596][ T3303] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 31.640579][ T3303] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 31.689450][ T3309] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 31.698828][ T3309] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 31.708593][ T3309] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 31.723593][ T3309] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 31.764506][ T3306] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 31.776434][ T3306] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 31.786227][ T3306] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 31.796993][ T3306] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 31.831919][ T3302] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 31.840630][ T3302] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 31.852696][ T3302] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 31.865756][ T3302] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 31.896577][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.910547][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.932090][ T3301] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 31.942219][ T3301] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 31.952146][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.959444][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.974000][ T3309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.981159][ T3301] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 31.990869][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.998129][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.010094][ T3301] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 32.038885][ T3309] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.053867][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.073976][ T2929] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.081044][ T2929] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.093551][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.100604][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.119113][ T3303] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.133635][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.150774][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.166392][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.173509][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.182056][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.189130][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.209468][ T3302] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.236125][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.243260][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.264248][ T2929] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.271415][ T2929] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.299705][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.314741][ T3301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.351443][ T3301] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.379783][ T3309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.418637][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.434082][ T57] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.441173][ T57] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.460155][ T57] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.467650][ T57] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.504700][ T3302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.517352][ T3301] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 32.527776][ T3301] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.585155][ T3303] veth0_vlan: entered promiscuous mode [ 32.604902][ T3303] veth1_vlan: entered promiscuous mode [ 32.633170][ T3303] veth0_macvtap: entered promiscuous mode [ 32.664225][ T3303] veth1_macvtap: entered promiscuous mode [ 32.675579][ T3306] veth0_vlan: entered promiscuous mode [ 32.683516][ T3309] veth0_vlan: entered promiscuous mode [ 32.695749][ T3306] veth1_vlan: entered promiscuous mode [ 32.711419][ T3309] veth1_vlan: entered promiscuous mode [ 32.718788][ T3302] veth0_vlan: entered promiscuous mode [ 32.726855][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.741692][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.751632][ T3306] veth0_macvtap: entered promiscuous mode [ 32.761200][ T3302] veth1_vlan: entered promiscuous mode [ 32.770675][ T3306] veth1_macvtap: entered promiscuous mode [ 32.778548][ T57] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.791358][ T3301] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.799382][ T57] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.818087][ T3309] veth0_macvtap: entered promiscuous mode [ 32.829364][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.838427][ T57] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.848885][ T57] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.862313][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.862581][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 32.862593][ T29] audit: type=1400 audit(1757798045.272:81): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/root/syzkaller.xmNdK2/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 32.901498][ T29] audit: type=1400 audit(1757798045.292:82): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 32.910610][ T3309] veth1_macvtap: entered promiscuous mode [ 32.924147][ T29] audit: type=1400 audit(1757798045.292:83): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/root/syzkaller.xmNdK2/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 32.939526][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.955701][ T29] audit: type=1400 audit(1757798045.292:84): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 32.966702][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.984967][ T29] audit: type=1400 audit(1757798045.292:85): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/root/syzkaller.xmNdK2/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 32.985001][ T29] audit: type=1400 audit(1757798045.292:86): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/root/syzkaller.xmNdK2/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4047 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 32.994244][ T3302] veth0_macvtap: entered promiscuous mode [ 33.019424][ T29] audit: type=1400 audit(1757798045.292:87): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 33.049236][ T3302] veth1_macvtap: entered promiscuous mode [ 33.086018][ T57] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.092584][ T29] audit: type=1400 audit(1757798045.502:88): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 33.117804][ T29] audit: type=1400 audit(1757798045.502:89): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="gadgetfs" ino=4069 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 33.143577][ T57] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.156102][ T3303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 33.162046][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.185518][ T57] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.200026][ T29] audit: type=1400 audit(1757798045.612:90): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 33.231886][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.245252][ T57] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.284071][ T57] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.306165][ T3422] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.348161][ T3422] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.387773][ T3422] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.422763][ T3422] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.435665][ T3474] loop3: detected capacity change from 0 to 2048 [ 33.449819][ T3422] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.491184][ T3301] veth0_vlan: entered promiscuous mode [ 33.516261][ T3301] veth1_vlan: entered promiscuous mode [ 33.560038][ T3422] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.575995][ T3422] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.635509][ T3488] loop2: detected capacity change from 0 to 2048 [ 33.643473][ T3301] veth0_macvtap: entered promiscuous mode [ 33.665192][ T3301] veth1_macvtap: entered promiscuous mode [ 33.694294][ T3301] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.716464][ T3498] netlink: 'syz.1.9': attribute type 10 has an invalid length. [ 33.725665][ T3301] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.788521][ T3498] team0: Failed to send options change via netlink (err -105) [ 33.796244][ T3498] team0: Port device dummy0 added [ 33.893702][ T383] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.920352][ T383] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.931735][ T3498] netlink: 'syz.1.9': attribute type 10 has an invalid length. [ 33.940311][ T3498] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 33.951531][ T3498] team0: Failed to send options change via netlink (err -105) [ 33.964110][ T3498] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 33.994192][ T3498] team0: Port device dummy0 removed [ 34.017212][ T3498] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 34.053431][ T383] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.067232][ T383] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.130517][ T3506] netlink: 'syz.4.5': attribute type 4 has an invalid length. [ 34.208982][ T3512] loop0: detected capacity change from 0 to 1024 [ 34.248601][ T3512] ======================================================= [ 34.248601][ T3512] WARNING: The mand mount option has been deprecated and [ 34.248601][ T3512] and is ignored by this kernel. Remove the mand [ 34.248601][ T3512] option from the mount to silence this warning. [ 34.248601][ T3512] ======================================================= [ 34.349195][ T3512] ext4: Unknown parameter 'nouser_xattr' [ 34.394007][ T3512] netlink: 8 bytes leftover after parsing attributes in process `syz.0.13'. [ 34.402973][ T3512] netlink: 8 bytes leftover after parsing attributes in process `syz.0.13'. [ 34.417757][ T3512] macvlan2: entered promiscuous mode [ 34.544395][ T3498] syz.1.9 (3498) used greatest stack depth: 10544 bytes left [ 35.268496][ T3526] loop2: detected capacity change from 0 to 2048 [ 36.339036][ T3537] loop3: detected capacity change from 0 to 2048 [ 36.346066][ T3537] EXT4-fs: Ignoring removed i_version option [ 36.441862][ T3539] netlink: 'syz.1.20': attribute type 1 has an invalid length. [ 36.479220][ T3537] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 36.491895][ T3537] ext4 filesystem being mounted at /2/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 36.668582][ T3539] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 36.737410][ T3539] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 36.833668][ T3539] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 37.130811][ T3539] bond0 (unregistering): Released all slaves [ 37.343826][ T3548] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 37.539451][ T3548] loop0: detected capacity change from 0 to 512 [ 37.582797][ T3548] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 37.596130][ T3548] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 37.719983][ T3548] EXT4-fs error (device loop0): ext4_free_branches:1023: inode #16: comm syz.0.22: invalid indirect mapped block 4294967295 (level 0) [ 37.795570][ T3548] EXT4-fs error (device loop0): ext4_free_branches:1023: inode #16: comm syz.0.22: invalid indirect mapped block 4294967295 (level 1) [ 37.852688][ T3548] EXT4-fs (loop0): 1 orphan inode deleted [ 37.858479][ T3548] EXT4-fs (loop0): 1 truncate cleaned up [ 37.874050][ T3548] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 37.896030][ T29] kauditd_printk_skb: 325 callbacks suppressed [ 37.896049][ T29] audit: type=1326 audit(1757798050.312:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3555 comm="syz.4.26" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17e18feba9 code=0x7ffc0000 [ 37.925998][ T29] audit: type=1326 audit(1757798050.312:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3555 comm="syz.4.26" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17e18feba9 code=0x7ffc0000 [ 37.949798][ T29] audit: type=1326 audit(1757798050.312:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3555 comm="syz.4.26" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f17e18feba9 code=0x7ffc0000 [ 37.973335][ T29] audit: type=1326 audit(1757798050.312:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3555 comm="syz.4.26" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17e18feba9 code=0x7ffc0000 [ 37.983451][ T3548] EXT4-fs error (device loop0): ext4_lookup:1787: inode #15: comm syz.0.22: iget: bad extra_isize 46 (inode size 256) [ 37.997162][ T29] audit: type=1326 audit(1757798050.312:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3555 comm="syz.4.26" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17e18feba9 code=0x7ffc0000 [ 38.032340][ T29] audit: type=1326 audit(1757798050.312:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3555 comm="syz.4.26" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f17e18feba9 code=0x7ffc0000 [ 38.056404][ T29] audit: type=1326 audit(1757798050.312:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3555 comm="syz.4.26" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17e18feba9 code=0x7ffc0000 [ 38.080086][ T29] audit: type=1326 audit(1757798050.312:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3555 comm="syz.4.26" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17e18feba9 code=0x7ffc0000 [ 38.137867][ T29] audit: type=1326 audit(1757798050.512:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3555 comm="syz.4.26" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f17e18feba9 code=0x7ffc0000 [ 38.161524][ T29] audit: type=1326 audit(1757798050.572:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3555 comm="syz.4.26" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f17e18feba9 code=0x7ffc0000 [ 38.208439][ T3558] loop4: detected capacity change from 0 to 2048 [ 38.211249][ T3303] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.234191][ T3563] netlink: 60 bytes leftover after parsing attributes in process `syz.2.27'. [ 38.250512][ T3306] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.279596][ T3565] netlink: 20 bytes leftover after parsing attributes in process `syz.3.28'. [ 38.301781][ T3568] loop0: detected capacity change from 0 to 128 [ 38.401133][ T3571] loop2: detected capacity change from 0 to 128 [ 38.829941][ T3584] loop0: detected capacity change from 0 to 164 [ 38.852698][ T3584] ISOFS: unable to read i-node block [ 38.858129][ T3584] ISOFS: root inode is unusable. Disabling Rock Ridge and switching to Joliet. [ 38.887704][ T3586] syz.1.36 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 39.051922][ T3591] loop1: detected capacity change from 0 to 2048 [ 39.336222][ T3599] loop4: detected capacity change from 0 to 2048 [ 39.343082][ T3599] EXT4-fs: Ignoring removed i_version option [ 39.374709][ T3599] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.387300][ T3599] ext4 filesystem being mounted at /4/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 39.731421][ T3613] loop0: detected capacity change from 0 to 2048 [ 39.738356][ T3613] EXT4-fs: Ignoring removed i_version option [ 39.776565][ T3613] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.789012][ T3613] ext4 filesystem being mounted at /12/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 40.632164][ T3618] netlink: 'syz.1.42': attribute type 1 has an invalid length. [ 40.656718][ T3301] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.681936][ T3618] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.705624][ T3618] bridge_slave_1 (unregistering): left allmulticast mode [ 40.713034][ T3618] bridge_slave_1 (unregistering): left promiscuous mode [ 40.720083][ T3618] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.745805][ T3623] loop3: detected capacity change from 0 to 2048 [ 41.001831][ T3632] netlink: 4 bytes leftover after parsing attributes in process `syz.2.47'. [ 41.161654][ T3635] loop1: detected capacity change from 0 to 128 [ 41.222369][ T3306] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.437873][ T3422] kworker/u8:7: attempt to access beyond end of device [ 41.437873][ T3422] loop1: rw=1, sector=145, nr_sectors = 8 limit=128 [ 41.453071][ T3422] kworker/u8:7: attempt to access beyond end of device [ 41.453071][ T3422] loop1: rw=1, sector=161, nr_sectors = 8 limit=128 [ 41.467321][ T3422] kworker/u8:7: attempt to access beyond end of device [ 41.467321][ T3422] loop1: rw=1, sector=177, nr_sectors = 8 limit=128 [ 41.481271][ T3422] kworker/u8:7: attempt to access beyond end of device [ 41.481271][ T3422] loop1: rw=1, sector=193, nr_sectors = 8 limit=128 [ 41.501108][ T3422] kworker/u8:7: attempt to access beyond end of device [ 41.501108][ T3422] loop1: rw=1, sector=209, nr_sectors = 8 limit=128 [ 41.991745][ T3422] kworker/u8:7: attempt to access beyond end of device [ 41.991745][ T3422] loop1: rw=1, sector=225, nr_sectors = 8 limit=128 [ 42.005283][ T3422] kworker/u8:7: attempt to access beyond end of device [ 42.005283][ T3422] loop1: rw=1, sector=241, nr_sectors = 8 limit=128 [ 42.019433][ T3422] kworker/u8:7: attempt to access beyond end of device [ 42.019433][ T3422] loop1: rw=1, sector=257, nr_sectors = 8 limit=128 [ 42.032942][ T3422] kworker/u8:7: attempt to access beyond end of device [ 42.032942][ T3422] loop1: rw=1, sector=273, nr_sectors = 8 limit=128 [ 42.046598][ T3422] kworker/u8:7: attempt to access beyond end of device [ 42.046598][ T3422] loop1: rw=1, sector=289, nr_sectors = 8 limit=128 [ 42.249438][ T3658] netlink: 3 bytes leftover after parsing attributes in process `syz.1.56'. [ 42.293692][ T3658] batadv1: entered promiscuous mode [ 42.299225][ T3658] batadv1: entered allmulticast mode [ 42.414787][ T3662] loop0: detected capacity change from 0 to 128 [ 42.427387][ T3662] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=16, mo=a84ec018, mo2=0002] [ 42.435625][ T3662] System zones: 1-3, 19-19, 35-36 [ 42.441998][ T3662] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 42.471977][ T3662] ext4 filesystem being mounted at /15/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 42.507034][ T3670] loop2: detected capacity change from 0 to 128 [ 42.543679][ T3306] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 42.566242][ T3670] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=16, mo=a84ec018, mo2=0002] [ 42.574535][ T3670] System zones: 1-3, 19-19, 35-36 [ 42.580242][ T3670] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 42.603177][ T3670] ext4 filesystem being mounted at /11/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 42.712123][ T3677] loop0: detected capacity change from 0 to 512 [ 42.739763][ T3309] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 42.757973][ T3675] IPVS: length: 175 != 406008 [ 42.878823][ T3690] loop0: detected capacity change from 0 to 2048 [ 42.903355][ T29] kauditd_printk_skb: 561 callbacks suppressed [ 42.903446][ T29] audit: type=1326 audit(1757798055.312:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3689 comm="syz.0.65" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe9da68eba9 code=0x7ffc0000 [ 42.936917][ T29] audit: type=1326 audit(1757798055.322:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3689 comm="syz.0.65" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe9da68eba9 code=0x7ffc0000 [ 42.960365][ T29] audit: type=1326 audit(1757798055.322:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3689 comm="syz.0.65" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7fe9da68eba9 code=0x7ffc0000 [ 42.983636][ T29] audit: type=1326 audit(1757798055.322:990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3689 comm="syz.0.65" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe9da68eba9 code=0x7ffc0000 [ 43.006999][ T29] audit: type=1326 audit(1757798055.322:991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3689 comm="syz.0.65" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe9da68eba9 code=0x7ffc0000 [ 43.499570][ T3708] loop2: detected capacity change from 0 to 2048 [ 43.506583][ T3708] EXT4-fs: Ignoring removed i_version option [ 43.566497][ T29] audit: type=1326 audit(1757798055.982:992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3705 comm="syz.1.71" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9f876deba9 code=0x7ffc0000 [ 43.589988][ T29] audit: type=1326 audit(1757798055.982:993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3705 comm="syz.1.71" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9f876deba9 code=0x7ffc0000 [ 43.934359][ T3717] loop1: detected capacity change from 0 to 1024 [ 43.989983][ T3708] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 44.002583][ T3708] ext4 filesystem being mounted at /14/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 44.025841][ T3720] syz.0.74 uses obsolete (PF_INET,SOCK_PACKET) [ 44.377033][ T3717] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 44.469761][ T29] audit: type=1326 audit(1757798056.032:994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3705 comm="syz.1.71" exe="/root/syz-executor" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7f9f876deba9 code=0x7ffc0000 [ 44.493390][ T29] audit: type=1326 audit(1757798056.032:995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3705 comm="syz.1.71" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9f876deba9 code=0x7ffc0000 [ 44.516817][ T29] audit: type=1326 audit(1757798056.032:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3705 comm="syz.1.71" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9f876deba9 code=0x7ffc0000 [ 44.578876][ T3717] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1289: group 0, block bitmap and bg descriptor inconsistent: 25 vs 4278190105 free clusters [ 44.627270][ T3726] loop4: detected capacity change from 0 to 1024 [ 44.649048][ T3717] EXT4-fs (loop1): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 44 with error 28 [ 44.661595][ T3717] EXT4-fs (loop1): This should not happen!! Data will be lost [ 44.661595][ T3717] [ 44.671423][ T3717] EXT4-fs (loop1): Total free blocks count 0 [ 44.677469][ T3717] EXT4-fs (loop1): Free/Dirty block details [ 44.683401][ T3717] EXT4-fs (loop1): free_blocks=68451041280 [ 44.689312][ T3717] EXT4-fs (loop1): dirty_blocks=48 [ 44.694563][ T3717] EXT4-fs (loop1): Block reservation details [ 44.700734][ T3717] EXT4-fs (loop1): i_reserved_data_blocks=3 [ 44.808572][ T3726] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 44.855128][ T3726] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1289: group 0, block bitmap and bg descriptor inconsistent: 25 vs 4278190105 free clusters [ 44.907323][ T3717] syz.1.73 (3717) used greatest stack depth: 10120 bytes left [ 44.932097][ T3726] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 44 with error 28 [ 44.944655][ T3726] EXT4-fs (loop4): This should not happen!! Data will be lost [ 44.944655][ T3726] [ 44.954695][ T3726] EXT4-fs (loop4): Total free blocks count 0 [ 44.960693][ T3726] EXT4-fs (loop4): Free/Dirty block details [ 44.966754][ T3726] EXT4-fs (loop4): free_blocks=68451041280 [ 44.972617][ T3726] EXT4-fs (loop4): dirty_blocks=48 [ 44.977889][ T3726] EXT4-fs (loop4): Block reservation details [ 44.984828][ T3726] EXT4-fs (loop4): i_reserved_data_blocks=3 [ 44.997468][ T3736] FAULT_INJECTION: forcing a failure. [ 44.997468][ T3736] name failslab, interval 1, probability 0, space 0, times 1 [ 45.010595][ T3736] CPU: 1 UID: 0 PID: 3736 Comm: syz.0.78 Not tainted syzkaller #0 PREEMPT(voluntary) [ 45.010626][ T3736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 45.010638][ T3736] Call Trace: [ 45.010645][ T3736] [ 45.010654][ T3736] __dump_stack+0x1d/0x30 [ 45.010677][ T3736] dump_stack_lvl+0xe8/0x140 [ 45.010699][ T3736] dump_stack+0x15/0x1b [ 45.010750][ T3736] should_fail_ex+0x265/0x280 [ 45.010836][ T3736] should_failslab+0x8c/0xb0 [ 45.010862][ T3736] kmem_cache_alloc_noprof+0x50/0x310 [ 45.010894][ T3736] ? audit_log_start+0x365/0x6c0 [ 45.011007][ T3736] audit_log_start+0x365/0x6c0 [ 45.011043][ T3736] audit_seccomp+0x48/0x100 [ 45.011120][ T3736] ? __seccomp_filter+0x68c/0x10d0 [ 45.011140][ T3736] __seccomp_filter+0x69d/0x10d0 [ 45.011160][ T3736] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 45.011242][ T3736] ? vfs_write+0x7e8/0x960 [ 45.011266][ T3736] __secure_computing+0x82/0x150 [ 45.011290][ T3736] syscall_trace_enter+0xcf/0x1e0 [ 45.011314][ T3736] do_syscall_64+0xac/0x200 [ 45.011377][ T3736] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 45.011398][ T3736] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 45.011432][ T3736] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.011457][ T3736] RIP: 0033:0x7fe9da68eba9 [ 45.011473][ T3736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.011502][ T3736] RSP: 002b:00007fe9d90ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000124 [ 45.011521][ T3736] RAX: ffffffffffffffda RBX: 00007fe9da8d5fa0 RCX: 00007fe9da68eba9 [ 45.011533][ T3736] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 45.011544][ T3736] RBP: 00007fe9d90ef090 R08: 0000000000000000 R09: 0000000000000000 [ 45.011629][ T3736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.011642][ T3736] R13: 00007fe9da8d6038 R14: 00007fe9da8d5fa0 R15: 00007ffca716d068 [ 45.011661][ T3736] [ 45.221705][ T3302] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 45.240399][ T3301] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 45.274758][ T3309] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 45.634119][ T3757] loop0: detected capacity change from 0 to 2048 [ 45.641138][ T3757] EXT4-fs: Ignoring removed i_version option [ 45.680026][ T3757] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 45.692241][ T3757] ext4 filesystem being mounted at /22/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 45.725111][ T3757] ================================================================== [ 45.733263][ T3757] BUG: KCSAN: data-race in __filemap_remove_folio / folio_mapping [ 45.741265][ T3757] [ 45.743696][ T3757] write to 0xffffea0004fa1298 of 8 bytes by task 57 on cpu 1: [ 45.751342][ T3757] __filemap_remove_folio+0x1a5/0x2a0 [ 45.756852][ T3757] folio_unmap_invalidate+0x1dd/0x360 [ 45.762265][ T3757] folio_end_writeback+0x227/0x3d0 [ 45.767424][ T3757] ext4_finish_bio+0x459/0x8c0 [ 45.772226][ T3757] ext4_release_io_end+0x9f/0x1f0 [ 45.777547][ T3757] ext4_end_io_end+0x18d/0x240 [ 45.782343][ T3757] ext4_end_io_rsv_work+0x151/0x1e0 [ 45.787565][ T3757] process_scheduled_works+0x4cb/0x9d0 [ 45.793147][ T3757] worker_thread+0x582/0x770 [ 45.797866][ T3757] kthread+0x489/0x510 [ 45.801976][ T3757] ret_from_fork+0x11f/0x1b0 [ 45.806606][ T3757] ret_from_fork_asm+0x1a/0x30 [ 45.811486][ T3757] [ 45.813829][ T3757] read to 0xffffea0004fa1298 of 8 bytes by task 3757 on cpu 0: [ 45.821662][ T3757] folio_mapping+0xa1/0x120 [ 45.826295][ T3757] folio_wait_writeback+0x43/0x140 [ 45.831446][ T3757] file_write_and_wait_range+0x20b/0x2c0 [ 45.837141][ T3757] generic_buffers_fsync_noflush+0x45/0x120 [ 45.843078][ T3757] ext4_sync_file+0x1ab/0x690 [ 45.847785][ T3757] vfs_fsync_range+0x10d/0x130 [ 45.852585][ T3757] ext4_buffered_write_iter+0x34f/0x3c0 [ 45.858172][ T3757] ext4_file_write_iter+0x383/0xf00 [ 45.863672][ T3757] aio_write+0x2e5/0x410 [ 45.867954][ T3757] io_submit_one+0xacd/0x11d0 [ 45.872664][ T3757] __se_sys_io_submit+0xfb/0x280 [ 45.877636][ T3757] __x64_sys_io_submit+0x43/0x50 [ 45.882615][ T3757] x64_sys_call+0x2d5d/0x2ff0 [ 45.887411][ T3757] do_syscall_64+0xd2/0x200 [ 45.892039][ T3757] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.897964][ T3757] [ 45.900376][ T3757] value changed: 0xffff88811a06f248 -> 0x0000000000000000 [ 45.907494][ T3757] [ 45.909834][ T3757] Reported by Kernel Concurrency Sanitizer on: [ 45.916022][ T3757] CPU: 0 UID: 0 PID: 3757 Comm: syz.0.83 Not tainted syzkaller #0 PREEMPT(voluntary) [ 45.925777][ T3757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 45.935860][ T3757] ================================================================== [ 46.247398][ T3306] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000.