last executing test programs: 3.161017855s ago: executing program 4 (id=97): r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x8, 0xc9, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x7, &(0x7f0000000780)={@local, 0x0}, &(0x7f00000007c0)=0x14) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="5c0000006d0001002abd7000fedbdf2500000000", @ANYRES32=r7, @ANYBLOB="000800003014000008002800305b000008001f00050000002c003480140035"], 0x5c}, 0x1, 0x0, 0x0, 0x24008004}, 0x4008010) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r8, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r8, 0x29, 0x30, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff0100000000000000000000000000010000000000000000000000000000000000e7ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006ce11bc3008b071000900000000000000000000000000009444000000000000000000000005"], 0x310) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r9, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f00000001c0)='illinois\x00', 0x9) r10 = socket$kcm(0x10, 0x7, 0x4) sendmsg$kcm(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000300)="89000000120081ae08060cdc03a6000000000002000000006ee2ffca1b1f0000000004c00e72f750375ed08a563319bf9ed720000000d6e747033a0093b837dc6cc01e32efaec8c7a6ec0012100002400d0c0c00bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r8, 0x29, 0x30, &(0x7f0000000800)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff01000000000000000000000000e001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000010000000a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eef2da604272fd634f6672bca12fdfadce7845ee32fe7f7938451c25450186230706fdc783f3e56e6f5a735711e47657c86c91abee902ac97714a788db7eddf0109e4f441c156c98fc6696972be4"], 0x110) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000001040)=ANY=[@ANYBLOB="9c010000", @ANYRES16=0x0, @ANYBLOB="020025bd7000fddbdf2519000000540001801400020070696d3672656730000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08009be7ef2d51b7183e980209bd00", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="14000200626f6e645f736c6176655f31000000000800030002000000040001800c000180080003000300000074000180080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="1400020076658e68305f746f5f626f6e64000000140002006261746164765f736c6176655f300000140002006d6115c16f776e31000000000000000008000100565b401f5328964f357a58290147f784d9bdad3de82de7e73095612242d599c23fc142ca73d26532d4681e92e1c576a7fa7e6c1fa6353c8904ae265cca111119a53cd7059cbcbae4b6250e2f891ecf57c302f72bd4", @ANYRES32=r4, @ANYBLOB="14000200767863616e310000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="64000180080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="140002006e65747063693000000000000000000008000100", @ANYRES32=r5, @ANYBLOB="0800030000000000080003000200000014000200626f6e645f736c6176655f3100000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="4c00018008000100", @ANYRES32=r7, @ANYBLOB="140002006261746164765f736c6176655f3100001400020064766d727031000000000000000000000800030002000000080003000300000008000100", @ANYRESHEX=r3, @ANYBLOB], 0x19c}, 0x1, 0x0, 0x0, 0x4}, 0x4000810) r11 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000080)={'ip6gre0\x00'}) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000017c7b800"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioperm(0x1, 0x5, 0xdd) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x41555856, 0x1, 0x0, 0x0, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a85"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, '\x00', r7, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_open_dev$usbfs(&(0x7f0000000100), 0x75, 0x121301) 2.314949773s ago: executing program 4 (id=113): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r1}, &(0x7f00000005c0), &(0x7f0000000600)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0xffffffff, [{0x0, 0x3}, {0x0, 0x3}]}, @ptr, @restrict={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7746, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x503}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000005850000008200000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2.211077185s ago: executing program 4 (id=116): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) syz_usb_connect(0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x403}}]}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000002ec0)={0x0, 0x0, &(0x7f0000002e80)={&(0x7f0000002fc0)=ANY=[], 0x2b08}}, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000380)=@gcm_256={{0x303}, "5ef40e7ab852acb6", "582f7cccfda6a677c372675d88becd932053048ac5a438b0e48fdb55bdc83053", "52c227d6", "c6425ec4f2e476d5"}, 0x38) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r2) 1.317191718s ago: executing program 4 (id=121): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) semget$private(0x0, 0x5, 0x0) semop(0x0, &(0x7f0000000000)=[{0x3, 0x100}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r0}, 0x10) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0/../file0\x00', 0x500, 0x4, &(0x7f00000002c0)) setxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000980), &(0x7f0000000180)=@v2={0x2000000, [{0x1, 0x3}, {0x7fff, 0xc72}]}, 0x14, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xe) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x2b8, 0xb0000010, 0x2, 0x5c8f0200, 0x388, 0x3a8, 0x3a8, 0x388, 0x3a8, 0x3, 0x0, {[{{@ipv6={@private1, @local, [], [], 'vlan1\x00', 'veth0_to_team\x00'}, 0x0, 0x248, 0x290, 0x700, {}, [@common=@inet=@hashlimit3={{0x158}, {'geneve1\x00', {0xf1, 0x0, 0x33, 0x0, 0x0, 0x1, 0x7fffffff}}}, @common=@unspec=@limit={{0x48}, {0x0, 0x3}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x206, 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) r4 = epoll_create1(0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/wakeup_count', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)={0xe000001a}) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r5, &(0x7f0000000040)) 1.156769036s ago: executing program 4 (id=123): r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="bf16000000000000b70700000100e0ff5070000028000000770000000000000095000200000000007ae9413df8ff0af5aa35339f4b382c4cad9db6fa7a9b857b72abaca100af1ba23d699b89e890c10500000000000000000000000000ac0e064c27bdfbd301150500000000000000bfdc995279d64072aacbb0595b95060000009ad3bf16a461e48e955a772d4062093f4cb1c3d9532abad2085401f098eb039ae4f4103699b9e079227e98cc07c09c1a72cb6d47cef1595e84d21951010f0274b1445a2ad6a7ad73827cccc21842599e0ae7b91f0b878b9267aa0b28d69a74ffdea613e892f0f9ff94e690b6ad68e4cb6dd65fd7bf3124702c6b1c2aea53ee0cb83ff1807459c7cba77cedca0bff6d8370c33e2bd9cebd29c152ff9dc8c2772fe552fecfcd1778b0838100000031d521207e5223d86508416780983c2f380bc01cefe9773a9a5cd5b24aa24a561e72393c0ce2bf44825b05c138779fe74f884c2472ab45c2af60289cb199963312dd1929096c6f49d116f1612a7b97f77169fa5e8a66a372ef8e3ee7167f7d2a26fc6c3cfa4dc5860277223d6eb3460e3b10a0dc9495635a9fca19d7beb5e700498b43bdadc916c01264d22d7969530633f94b257fbc5da7a96820e31444c0b0f62619c9e351996185e4015510875b774666ba5c0ba9845ad25b578d"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x15, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x660000, 0x0) r3 = openat(r2, &(0x7f0000000180)='./file1\x00', 0x106ac2, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r4}, &(0x7f00000004c0), &(0x7f0000000500)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21081e, &(0x7f00000002c0), 0x1, 0x4ea, &(0x7f0000000840)="$eJzs3U1vG1sZAODXzpeTm3uTW7oABLSUQkFVncRto6oLKCuEUCVElyC1IXGjKHYcxU5pQhfpf0CiEitY8gNYd8WeDYIdm7JA4iMCNZVYGM14krqJ3QSSxiF+Hmk0c844856TeM6pX9c+AfStyxGxFRHDEfEoIiay+ly2xb3Wljzu9faz+Z3tZ/O5aDYf/D2Xnk/qou1nEh9l1yxExA++E/Hj3MG49Y3N5blKpbyWlaca1dWp+sbmjaXq3GJ5sbxSKs3OzE7fuXm7dGJ9vVQdzo6++Op3W9/4adKs8aymvR8nqdX1ob04kf3Ov/chgvXAQEQMZs8f/v/kI+JCRFxJ7/+JGEj/mgDAedZsTkRzor0MAJx3+TQHlssXs1zAeOTzxWIrh3cxxvKVWr1x/XFtfWWhlSubjKH846VKeTrLFU7GUC4pz6THb8ulfeWbEfFpRPxsZDQtF+drlYVe/sMHAPrYR/vm/3+NtOZ/AOCcK/S6AQDAqTP/A0D/Mf8DQP8x/wNA/zH/A0D/Mf8DQP8x/wNAX/n+/fvJ1tzJvv964cnG+nLtyY2Fcn25WF2fL87X1laLi7XaYvqdPdXDrlep1VZnbsX608lvrtYbU/WNzYfV2vpK42H6vd4Py0On0isA4H0+vfTyj7mI2Lo7mm7RtpaDuRrOt3yvGwD0zECvGwD0jNW+oH8d4zW+9ACcEx2W6H1HISJG91c2m83mh2sS8IFd+5z8P/Srtvy//wUMfUb+H/qX/D/0r2Yzd9Q1/+OoDwQAzjY5fqDL+/8Xsv2vszcHfrSw/xEv9lf4RAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD9Y3f932K2csd45PPFYsTHETEZQ7nHS5XydER8EhF/GBkaScozPW4zAHBc+b/ksvW/rk1cHd9/djj3ZiTdR8RPfvHg50/nGo213yf1/9irb7zI6ku9aD8AcJjdeTrdt72Qf739bH53O832/PXbEVFoxd/ZHo6dvfiDMZjuCzEUEWP/zGXlllxb7uI4tp5HxGc79T8X42kOpLXy6f74SeyPTzV+/p34+fRca5/8Lj5zAm2BfvMyGX/udbr/8nE53Xe+/wvpCHV82fiXXGp+Jx0D38bfHf8Guox/l48a49Zvv9s6Gj147nnE5wcjdmPvtI0/u/FzXeJfPXi5jv70hS9d6Xau+cuIa9E5fnusqUZ1daq+sXljqTq3WF4sr5RKszOz03du3i5NpTnqqe6zwd/uXv+k27mk/2Nd4hcO6f9Xj9b9+NW/H/3wy++J//WvdIqfj4vviZ/MiV87Yvy5sd8Uup1L4i906f9hf//rR4z/6s+bB5YNBwB6p76xuTxXqZTXHDg4+wfJU/YMNKPjwbdOK9Zw/Fc/1Wz+T7G6jRgnkXUDzoK9mz4i3vS6MQAAAAAAAAAAAAAAQEen8YmlXvcRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA8+s/AQAA//9q89Jf") socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xf8, 0x30, 0xffff, 0xfffffffe, 0x0, {}, [{0xe4, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_bpf={0x2c, 0x3, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0xf8}}, 0x0) pwritev2(r3, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r2, 0xffffffffffffffff}, &(0x7f0000000700), &(0x7f0000000740)=r1}, 0x20) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f00000007c0)={{0x1, 0x1, 0x18, r9, {0x5}}, './file1\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r8}, 0x10) r11 = creat(&(0x7f00000000c0)='./file0\x00', 0xc9028ba210c11f88) r12 = dup2(r11, r11) r13 = accept(r10, &(0x7f0000000d40)=@rc, &(0x7f0000000800)=0x80) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000dc0)={0x0, 0x1, r13, 0x7, 0x80000}) ioctl$BLKTRACESETUP(r12, 0xc0481273, &(0x7f0000000000)={'\x00', 0x5477, 0x200000a, 0xffffffdb, 0x0, 0x2}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000600)={&(0x7f0000000640)="6e5645b555b27c1eb179a384087c03f76ca370aad2948c9c572a8cbc66d71fb738099e4514423bd1a586e77cef52d631ea81529e7682be4ae7da3d6a912238fb860efabc24cf4b123519f8e927036caec985b4cca5321c074ad38945e6897da97741099943023b7d3b0f9c4e97c73a773fa579e1557895efe95e68fcdf7e054a7a75d4537ae828782bafe36f24ff34282c74a5ab66fa46158ed16fc273ffbb13305561b0f4e2a657072a0499ae21d351", &(0x7f0000002e80)=""/4110, &(0x7f0000000e80)="0ad1077da6910b6ee06c5f9d4bcfa6c1e833c4b594356c2f0c7c4aab6c9a6f40d43c086e2cf8dd9eedb8e922f21c13fab8565479c3d79b3ba3144066e283ee0ab1c6046ced52c60ff042c4d03d73c156b1fde308f4482d449846a7ec2121c45aa53400b2e23bb04f3fef91ffdb167f92d1fbc036e6de1d6a58bb1cdd7ee80dfdd41e88a76d780fb44e", 0xffffffffffffffff, 0xffffffff}, 0x38) r14 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmmsg(r0, &(0x7f0000000e40)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)="ae", 0x1}], 0x1}}], 0x1, 0x0) 1.109376482s ago: executing program 3 (id=125): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000000), 0x0}, 0x20) syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000042, &(0x7f0000000400), 0x7, 0x4ea, &(0x7f00000006c0)="$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") socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000c50000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) quotactl$Q_GETNEXTQUOTA(0xffffffff80000900, &(0x7f00000080c0)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) 1.062555317s ago: executing program 0 (id=128): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r0}, &(0x7f00000004c0), &(0x7f0000000500)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}, {@journal_dev={'journal_dev', 0x3d, 0x8000}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@minixdf}, {@resgid}, {@grpquota}, {@usrjquota}]}, 0x23, 0x452, &(0x7f0000000880)="$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") 887.815398ms ago: executing program 0 (id=129): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) fchdir(0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) inotify_init1(0x0) 866.29622ms ago: executing program 1 (id=130): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) fchdir(0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) inotify_init1(0x0) 824.747045ms ago: executing program 1 (id=131): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES64=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000070200fcf8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000000), 0x1f, 0x808, 0x400216) futex(&(0x7f000000cffc), 0x1, 0x800000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000340)='sched_switch\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)='\\\\@[*#)\x00', 0xfffffffffffffffe) 792.819569ms ago: executing program 0 (id=132): creat(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000140)) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x48, 0x0, 0x5, 0xfffffffe}]}) 791.468849ms ago: executing program 4 (id=133): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x5, 0x0, @void, @value, @void, @value}, 0x50) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x20, 0x39, 0x0, 0x5, {{0x2e, 0x4, 0x2, 0x22, 0xb8, 0x68, 0x0, 0x72, 0x4, 0x0, @multicast1, @multicast1, {[@end, @cipso={0x86, 0x32, 0xffffffffffffffff, [{0x5, 0x4, "fc21"}, {0x0, 0xb, "ec0ad2a77feceb42d7"}, {0x5, 0x12, "182439ad08be0a6e8640b30200000000"}, {0x6, 0xb, "dfc441e40acdd6b9a0"}]}, @rr={0x7, 0x13, 0x57, [@multicast2, @rand_addr=0x64010102, @broadcast, @multicast2]}, @timestamp={0x44, 0x8, 0x12, 0x0, 0xc, [0x5]}, @timestamp_addr={0x44, 0x2c, 0x59, 0x1, 0x7, [{@multicast2, 0x4}, {@multicast1, 0x5c6a}, {@loopback}, {@rand_addr=0x64010100, 0x9}, {@remote, 0xffffffff}]}, @timestamp={0x44, 0xc, 0xad, 0x0, 0x1, [0x1ff, 0x9]}, @rr={0x7, 0x7, 0x48, [@multicast2]}, @timestamp_addr={0x44, 0x14, 0x95, 0x1, 0x2, [{@multicast1, 0x8}, {@initdev={0xac, 0x1e, 0x1, 0x0}}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wg0\x00'}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000500)={'geneve1\x00', 0x0}) sendto$packet(r3, &(0x7f00000005c0)="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"/290, 0xfffffc99, 0x100, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) r5 = bpf$TOKEN_CREATE(0x24, &(0x7f00000005c0)={0x0, r0}, 0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x9, 0x8, 0x1ff, 0x10001, 0x18000, r0, 0x7, '\x00', r1, 0xffffffffffffffff, 0x2, 0x5, 0x5, 0x0, @value=r0, @void, @value=r5}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r6}, &(0x7f00000004c0), &(0x7f0000000500)='%-5lx \x00'}, 0x20) setitimer(0x0, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, &(0x7f0000000740)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000640)='./bus\x00', 0x0, &(0x7f0000000440)=ANY=[], 0x1, 0x1269, &(0x7f0000003780)="$eJzs3cFrI1UcB/Bf2rRNs7apuq7ugvjQiyLEbQ+evCyiIBaUlS6oIMzaVEPTpjShEBG3njwJ/hmiHr0J4j/QixfPgiDSi8c9iCNtUnfTpF3ttumyfD6Xebz3vu+96ZSBCfOY3Ve+WltdaVVXsnaMFQpR3JiI4u0UKcZiPLq244Ubv/z69DvvvvfmtcXFg9qXU0qzz/z4/qffPftT+8KN72d/mIqduQ92/1z4befSzuXdv7+NeivVW2m92U5ZutlstrObjVparrdWqym93ahlrVoq9Ua7077SaG5sdFK2vjxT3tistVopW++k1VontQupvdlJ2UdZfT1Vq9U0Uw7ux9I3t/M8j8jziZiMPM/z6SjHhXgkZmI2KjEXj8Zj8XhcjCfiUjwZT8Xl/V7nvW4AAAAAAAAAAAAAAAAAAAB4uNxj/39hcP//1HkvGQAAAAAAAAAAAAAAAAAAAB46h/f/FyN8/x8AAAAAAAAAAAAAAAAAAABG7B7f/z+0//9F+/8BAAAAAAAAAAAAAAAAAADgLJS6h+splSLWvtha2lrqHrv111aiHo2oxdWoxF+xv/u/q1t+/Y3F166mfXPx0tqtXv7W1tJ4f35+ohJzhaH5+W4+9eenonx3fiEqcXH4/AtD86V4/rm9/OfdfDUq8fOH0YxGLEcUeme/n/9sPqVX31qc7s9f2et3pPEzviwAAABwmqrpX4PP79u9TkPbu0295/PU61k45veBQ8/nxbhSPK+z5kCr88lq1mjUNk9YmDx6nMn+mulezxPPVYiIrC8+W/79+t6QJ138qRXGRzrpxPF97uOaRvEB+GOeQuGPr++qKcVoZx/r/aNnjb37539LxXaen+nCJoc1TR2XOvqeUTjjexKjc+ein/dKAAAAAAAAAAAA+D+Gvv03HRED7wN+PFBz8Hp4f3xw5KNn/3IEZwgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/7ADxwIAAAAAwvyt0+jYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC+CgAA///g1MT0") r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r7, 0x400, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r9 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r9}, &(0x7f0000bbdffc)) r10 = socket(0x10, 0x3, 0x0) bind$netlink(r10, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r10, &(0x7f0000000140)="2600000022004701050000070000000000000020002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r10, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r10, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) write(r10, &(0x7f0000000000)='\"', 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) unlink(&(0x7f0000000580)='./file1\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 685.893991ms ago: executing program 1 (id=134): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) fchown(0xffffffffffffffff, 0x0, 0xee01) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = inotify_init1(0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x2c, r3, 0x1, 0x0, 0x0, {0x1b}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x1c, r3, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300)={0x0, r1}, 0x8) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x6) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000340)={0x6, &(0x7f0000000180)=[{0x4, 0x6, 0x7, 0x4d4}, {0x2bb, 0xb0, 0x8, 0x80}, {0xfff, 0x80, 0x7, 0x54af}, {0xfffb, 0x3, 0x6, 0x6}, {0xfffd, 0xe, 0x7, 0x3}, {0x26b9, 0xb, 0x4, 0x7}]}) 634.822137ms ago: executing program 0 (id=135): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) fchown(0xffffffffffffffff, 0x0, 0xee01) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = inotify_init1(0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x2c, r3, 0x1, 0x0, 0x0, {0x1b}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x1c, r3, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300)={0x0, r1}, 0x8) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x6) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000340)={0x6, &(0x7f0000000180)=[{0x4, 0x6, 0x7, 0x4d4}, {0x2bb, 0xb0, 0x8, 0x80}, {0xfff, 0x80, 0x7, 0x54af}, {0xfffb, 0x3, 0x6, 0x6}, {0xfffd, 0xe, 0x7, 0x3}, {0x26b9, 0xb, 0x4, 0x7}]}) 555.537316ms ago: executing program 1 (id=136): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000e50700000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0), 0x802, 0x0) syz_emit_ethernet(0x16, &(0x7f0000000680)=ANY=[@ANYBLOB="ffffffffffffbbbbbbbbbbbb0004aa00bf99"], 0x0) io_cancel(0x0, 0x0, 0x0) ioperm(0x7, 0x5, 0x10000000000007) bpf$MAP_CREATE(0x0, 0x0, 0x48) listen(0xffffffffffffffff, 0x6) 538.875238ms ago: executing program 0 (id=137): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x18) r2 = socket(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) 538.173808ms ago: executing program 1 (id=138): r0 = socket$inet6(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002004007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f00000003c0)="0022041100ffffebfffffffeffffff0700000000ff000207835eeb1317b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77a62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b842f3e253be8a62b37f820fe75a9ea937ea4efbfb9b4a128f2dbe2837496d00a890abd6ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d41991ac25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85bbe6eb60cd7cf80700d38c31c7c86d169229f2436fff09c4d86cbe4ab190c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845a45558f955039fb14ccaa21ab3", 0x130) 507.378632ms ago: executing program 1 (id=139): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x35, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$rds(0x15, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6, 0x102, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000280)={0x2c, &(0x7f0000001400)=ANY=[@ANYBLOB='`'], 0x0, 0x0, 0x0, 0x0}, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001439) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x2000000b) ppoll(&(0x7f0000000180)=[{r2}], 0x1, 0x0, 0x0, 0x0) close(r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) io_uring_setup(0x678d, &(0x7f0000000340)={0x0, 0xffffffff, 0x80, 0x0, 0xf1}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x0, "7e12ddc5a89047bf00"}) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000200)=0x2) read(r4, 0x0, 0x2006) 506.459762ms ago: executing program 0 (id=140): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x62) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='fscache_relinquish\x00'}, 0x18) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)="c4", 0x1}], 0x1) recvmmsg$unix(r0, &(0x7f0000003100)=[{{&(0x7f0000000000), 0x6e, &(0x7f0000000080)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}}], 0x40000000000015a, 0x0, 0x0) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x101d0}], 0x1}}], 0x400000000000181, 0x9200000000000000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000001c00)="b7", 0x1}], 0x1) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) msgget$private(0x0, 0x656) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff}) tee(r5, r4, 0x8, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x16, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3e6d}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@call={0x85, 0x0, 0x0, 0x52}, @exit, @map_idx={0x18, 0x7, 0x5, 0x0, 0xf}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x9}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x15, &(0x7f0000000280)=""/21, 0x40f00, 0x4e, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000300)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x10, 0x8, 0x3}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000380)=[r2, r2, r2, r2, r2], &(0x7f00000003c0)=[{0x0, 0x4, 0x1, 0x4}], 0x10, 0x3, @void, @value}, 0x94) 257.313621ms ago: executing program 3 (id=141): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x10000000) ptrace$ARCH_SHSTK_DISABLE(0x1e, r0, 0x2, 0x5002) 223.426344ms ago: executing program 3 (id=142): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) semget$private(0x0, 0x5, 0x0) semop(0x0, &(0x7f0000000000)=[{0x3, 0x100}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r0}, 0x10) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0/../file0\x00', 0x500, 0x4, &(0x7f00000002c0)) setxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000980), &(0x7f0000000180)=@v2={0x2000000, [{0x1, 0x3}, {0x7fff, 0xc72}]}, 0x14, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xe) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x2b8, 0xb0000010, 0x2, 0x5c8f0200, 0x388, 0x3a8, 0x3a8, 0x388, 0x3a8, 0x3, 0x0, {[{{@ipv6={@private1, @local, [], [], 'vlan1\x00', 'veth0_to_team\x00'}, 0x0, 0x248, 0x290, 0x700, {}, [@common=@inet=@hashlimit3={{0x158}, {'geneve1\x00', {0xf1, 0x0, 0x33, 0x0, 0x0, 0x1, 0x7fffffff}}}, @common=@unspec=@limit={{0x48}, {0x0, 0x3}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x206, 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) r4 = epoll_create1(0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/wakeup_count', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)={0xe000001a}) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r5, &(0x7f0000000040)) 222.483165ms ago: executing program 2 (id=143): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB="0300000000000000000000006b17bdcf8d5ec8df", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x121000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000005850000008200000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) r6 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r7 = open(&(0x7f0000000040)='.\x00', 0x418601, 0x0) flock(r7, 0x2) close_range(r6, 0xffffffffffffffff, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000340)={'dvmrp1\x00', 0x20}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454da, &(0x7f0000000140)={'bond0\x00'}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0x14) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000380)={'bond_slave_1\x00', 0x200}) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[@ANYBLOB='\n\te'], 0x31) bind$phonet(r1, &(0x7f0000000080)={0x23, 0xf1, 0x8, 0xb}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x9, 0x8, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) 193.478578ms ago: executing program 2 (id=144): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000380)='tlb_flush\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000000000000063010c000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r0}, 0x18) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 187.918968ms ago: executing program 3 (id=145): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) semget$private(0x0, 0x5, 0x0) semop(0x0, &(0x7f0000000000)=[{0x3, 0x100}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r0}, 0x10) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0/../file0\x00', 0x500, 0x4, &(0x7f00000002c0)) setxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000980), &(0x7f0000000180)=@v2={0x2000000, [{0x1, 0x3}, {0x7fff, 0xc72}]}, 0x14, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xe) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x2b8, 0xb0000010, 0x2, 0x5c8f0200, 0x388, 0x3a8, 0x3a8, 0x388, 0x3a8, 0x3, 0x0, {[{{@ipv6={@private1, @local, [], [], 'vlan1\x00', 'veth0_to_team\x00'}, 0x0, 0x248, 0x290, 0x700, {}, [@common=@inet=@hashlimit3={{0x158}, {'geneve1\x00', {0xf1, 0x0, 0x33, 0x0, 0x0, 0x1, 0x7fffffff}}}, @common=@unspec=@limit={{0x48}, {0x0, 0x3}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x206, 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) r4 = epoll_create1(0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/wakeup_count', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)={0xe000001a}) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r5, &(0x7f0000000040)) 166.908081ms ago: executing program 2 (id=146): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) r1 = socket(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) 150.181393ms ago: executing program 3 (id=147): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) fchown(0xffffffffffffffff, 0x0, 0xee01) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = inotify_init1(0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x2c, r3, 0x1, 0x0, 0x0, {0x1b}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x1c, r3, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300)={0x0, r1}, 0x8) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x6) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000340)={0x6, &(0x7f0000000180)=[{0x4, 0x6, 0x7, 0x4d4}, {0x2bb, 0xb0, 0x8, 0x80}, {0xfff, 0x80, 0x7, 0x54af}, {0xfffb, 0x3, 0x6, 0x6}, {0xfffd, 0xe, 0x7, 0x3}, {0x26b9, 0xb, 0x4, 0x7}]}) 143.671133ms ago: executing program 2 (id=148): symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') r0 = memfd_create(&(0x7f00000000c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec', 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@private0, 0x800, 0x0, 0xff, 0x1}, 0x20) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@private0, 0x800, 0x0, 0xff, 0x1}, 0x20) write$binfmt_script(r0, &(0x7f0000000300)={'#! ', './file0'}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000040)={r3, 0x3, 0x3, 0xfffffffffffffe01}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x3, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES64=r0, @ANYRESOCT=r0, @ANYBLOB="a5fededb2b36426adfdf10eeaca7df9e6003748a21d5928c7dc4879e90b99855cc027eb8b81bab0cf6db992e33f9c3e56f", @ANYRES8=r0, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000370400"/20, @ANYRES32=r6, @ANYBLOB="92010000000000000a000200bbbbbbbbbbbb00001c0016801800018014000a"], 0x48}, 0x1, 0x0, 0x0, 0x20004800}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 36.809576ms ago: executing program 3 (id=149): r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x20}, 0x14}}, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000005000/0x4000)=nil) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000f80)=@mangle={'mangle\x00', 0x1f, 0x6, 0x408, 0x0, 0x320, 0xd0, 0x320, 0x1c0, 0x468, 0x468, 0x468, 0x468, 0x468, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x4, [0x6, 0x3, 0x4, 0x1, 0x1, 0x3], 0x6, 0x7}, {0x2, [0x1, 0x1, 0x2, 0x2, 0x7, 0x1], 0x1, 0x1}}}}, {{@ip={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffffff, 0xff, 'veth1_to_batadv\x00', 'macvtap0\x00', {}, {}, 0x6, 0x1, 0x20}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00', 0x0, {0x20, 0x1, 0x2}}}, {{@ip={@rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff000000, 0x0, 'ipvlan1\x00', 'vxcan1\x00', {0xff}, {}, 0x2, 0x1, 0x60}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x1}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2f}, @empty, 0xff000000, 0x7f, 'veth0_vlan\x00', 'team0\x00', {0xff}, {0xff}, 0x1, 0x4, 0x4}, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x0, 0x1000, 0x9cd, 0x2}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @local, 0x7, 0x2, [0x1, 0x31, 0x17, 0xc, 0x2f, 0x1d, 0x38, 0x3e, 0x3, 0x39, 0x2a, 0x34, 0x11, 0x35, 0x2b, 0x17], 0x0, 0x2, 0xfffffffffffffffb}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x468) syz_genetlink_get_family_id$nfc(&(0x7f0000000140), r1) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r1) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000100)=0x7, &(0x7f0000000180)=0x2) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), r1) sendmsg$NL802154_CMD_NEW_INTERFACE(r1, &(0x7f0000000480)={0x0, 0x11, &(0x7f0000000440)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000eeff120000000a0004007778616e3300000008001500", @ANYRES32=0x0, @ANYBLOB="080001"], 0x30}}, 0x0) ioctl$KDFONTOP_GET(r0, 0x560f, &(0x7f0000000040)={0x1, 0x4002, 0x18, 0x115, 0x167, 0x0}) 35.300956ms ago: executing program 2 (id=150): r0 = socket$inet6(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002004007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f00000003c0)="0022041100ffffebfffffffeffffff0700000000ff000207835eeb1317b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77a62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b842f3e253be8a62b37f820fe75a9ea937ea4efbfb9b4a128f2dbe2837496d00a890abd6ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d41991ac25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85bbe6eb60cd7cf80700d38c31c7c86d169229f2436fff09c4d86cbe4ab190c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845a45558f955039fb14ccaa21ab3", 0x130) 0s ago: executing program 2 (id=151): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f0000000580)={0x23c, 0x0, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x40, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xb}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xd}]}, @TIPC_NLA_NET={0x70, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x601f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x101}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xbb7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8000000000000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK={0xa4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4a74}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1ff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x100}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1df}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6444}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x561}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xe051}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x10}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x480d2}, 0x8000) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) clock_nanosleep(0x8, 0x0, 0x0, 0x0) connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x3, &(0x7f0000000140), 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}) timerfd_settime(r2, 0x3, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x2, &(0x7f0000000200)=[{0x24}, {0x6, 0x0, 0x0, 0x7}]}) write$binfmt_script(r5, &(0x7f0000000540), 0x84) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000100)={0x10, 0x1, 0x11, 0x1a, 0x7, 0x100, 0x5, 0xd7}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000014000905005000000000000000021f00203700", @ANYRES32=r4, @ANYBLOB="08000100ac141435"], 0x20}}, 0x40) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.172' (ED25519) to the list of known hosts. [ 30.331876][ T29] audit: type=1400 audit(1730168145.046:82): avc: denied { mounton } for pid=3304 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 30.333154][ T3304] cgroup: Unknown subsys name 'net' [ 30.354626][ T29] audit: type=1400 audit(1730168145.046:83): avc: denied { mount } for pid=3304 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.382087][ T29] audit: type=1400 audit(1730168145.076:84): avc: denied { unmount } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.521353][ T3304] cgroup: Unknown subsys name 'cpuset' [ 30.527584][ T3304] cgroup: Unknown subsys name 'rlimit' [ 30.656065][ T29] audit: type=1400 audit(1730168145.366:85): avc: denied { setattr } for pid=3304 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.681864][ T29] audit: type=1400 audit(1730168145.366:86): avc: denied { create } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.689077][ T3307] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 30.702309][ T29] audit: type=1400 audit(1730168145.366:87): avc: denied { write } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.731261][ T29] audit: type=1400 audit(1730168145.366:88): avc: denied { read } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.751625][ T29] audit: type=1400 audit(1730168145.376:89): avc: denied { mounton } for pid=3304 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 30.776484][ T29] audit: type=1400 audit(1730168145.376:90): avc: denied { mount } for pid=3304 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 30.799780][ T29] audit: type=1400 audit(1730168145.426:91): avc: denied { relabelto } for pid=3307 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 30.829274][ T3304] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 32.622711][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 32.701630][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 32.722923][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 32.734131][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 32.794110][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.801205][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.808380][ T3314] bridge_slave_0: entered allmulticast mode [ 32.815110][ T3314] bridge_slave_0: entered promiscuous mode [ 32.843414][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.850546][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.857792][ T3314] bridge_slave_1: entered allmulticast mode [ 32.864141][ T3314] bridge_slave_1: entered promiscuous mode [ 32.876952][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.884109][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.891243][ T3320] bridge_slave_0: entered allmulticast mode [ 32.897673][ T3320] bridge_slave_0: entered promiscuous mode [ 32.921030][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.930195][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.937351][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.944543][ T3320] bridge_slave_1: entered allmulticast mode [ 32.951112][ T3320] bridge_slave_1: entered promiscuous mode [ 32.962046][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 32.976176][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.002437][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.009489][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.016668][ T3315] bridge_slave_0: entered allmulticast mode [ 33.023016][ T3315] bridge_slave_0: entered promiscuous mode [ 33.039911][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.047085][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.054412][ T3321] bridge_slave_0: entered allmulticast mode [ 33.061003][ T3321] bridge_slave_0: entered promiscuous mode [ 33.068410][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.077612][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.084701][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.091925][ T3315] bridge_slave_1: entered allmulticast mode [ 33.098307][ T3315] bridge_slave_1: entered promiscuous mode [ 33.114399][ T3314] team0: Port device team_slave_0 added [ 33.120231][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.127411][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.134581][ T3321] bridge_slave_1: entered allmulticast mode [ 33.140955][ T3321] bridge_slave_1: entered promiscuous mode [ 33.147894][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.173961][ T3314] team0: Port device team_slave_1 added [ 33.184567][ T3320] team0: Port device team_slave_0 added [ 33.207547][ T3320] team0: Port device team_slave_1 added [ 33.214295][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.224383][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.234628][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.269529][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.287733][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.294752][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.320995][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.332149][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.339110][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.365066][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.376580][ T3321] team0: Port device team_slave_0 added [ 33.383082][ T3321] team0: Port device team_slave_1 added [ 33.393240][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.400351][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.407537][ T3318] bridge_slave_0: entered allmulticast mode [ 33.413971][ T3318] bridge_slave_0: entered promiscuous mode [ 33.420632][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.427689][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.453744][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.464758][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.471751][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.497734][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.517554][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.524708][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.532162][ T3318] bridge_slave_1: entered allmulticast mode [ 33.538552][ T3318] bridge_slave_1: entered promiscuous mode [ 33.559207][ T3315] team0: Port device team_slave_0 added [ 33.565928][ T3315] team0: Port device team_slave_1 added [ 33.587469][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.596779][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.603825][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.629830][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.641112][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.648063][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.674006][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.685632][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.692640][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.718547][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.730307][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.737338][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.763292][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.774880][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.818758][ T3318] team0: Port device team_slave_0 added [ 33.825375][ T3318] team0: Port device team_slave_1 added [ 33.837554][ T3320] hsr_slave_0: entered promiscuous mode [ 33.843576][ T3320] hsr_slave_1: entered promiscuous mode [ 33.861817][ T3314] hsr_slave_0: entered promiscuous mode [ 33.867829][ T3314] hsr_slave_1: entered promiscuous mode [ 33.873902][ T3314] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 33.881568][ T3314] Cannot create hsr debugfs directory [ 33.911845][ T3321] hsr_slave_0: entered promiscuous mode [ 33.917987][ T3321] hsr_slave_1: entered promiscuous mode [ 33.924178][ T3321] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 33.931939][ T3321] Cannot create hsr debugfs directory [ 33.937673][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.944808][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 33.970733][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.996828][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.003899][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.029909][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.042797][ T3315] hsr_slave_0: entered promiscuous mode [ 34.048890][ T3315] hsr_slave_1: entered promiscuous mode [ 34.055082][ T3315] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 34.062677][ T3315] Cannot create hsr debugfs directory [ 34.139447][ T3318] hsr_slave_0: entered promiscuous mode [ 34.145546][ T3318] hsr_slave_1: entered promiscuous mode [ 34.151486][ T3318] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 34.159032][ T3318] Cannot create hsr debugfs directory [ 34.250116][ T3314] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 34.271934][ T3314] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 34.293292][ T3314] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 34.312837][ T3314] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 34.323597][ T3320] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 34.340608][ T3320] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 34.354740][ T3320] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 34.363429][ T3320] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 34.380304][ T3315] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 34.402621][ T3315] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 34.411894][ T3321] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 34.421296][ T3315] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 34.429861][ T3321] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 34.438937][ T3321] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 34.447749][ T3321] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 34.457328][ T3315] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 34.487301][ T3318] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 34.497697][ T3318] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 34.507406][ T3318] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 34.516298][ T3318] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 34.573516][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.607408][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.626380][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.633502][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.662744][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.671558][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.678669][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.697600][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.714679][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.725508][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.737343][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.749135][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.756268][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.766634][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.778059][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.785182][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.796621][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.803699][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.812932][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.824956][ T134] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.832040][ T134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.850847][ T134] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.857972][ T134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.870412][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.898247][ T3320] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 34.908769][ T3320] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.922077][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.929158][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.941821][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.948952][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.976450][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.983558][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.016803][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.039902][ T3318] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 35.082254][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.133700][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.159183][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.188839][ T3314] veth0_vlan: entered promiscuous mode [ 35.214641][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.243451][ T3314] veth1_vlan: entered promiscuous mode [ 35.291575][ T3314] veth0_macvtap: entered promiscuous mode [ 35.329875][ T3314] veth1_macvtap: entered promiscuous mode [ 35.346957][ T3315] veth0_vlan: entered promiscuous mode [ 35.370948][ T3315] veth1_vlan: entered promiscuous mode [ 35.391939][ T3320] veth0_vlan: entered promiscuous mode [ 35.403539][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.413880][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.431607][ T3314] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.440453][ T3314] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.449184][ T3314] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.457997][ T3314] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.474902][ T3318] veth0_vlan: entered promiscuous mode [ 35.482701][ T3320] veth1_vlan: entered promiscuous mode [ 35.498277][ T3321] veth0_vlan: entered promiscuous mode [ 35.506098][ T3315] veth0_macvtap: entered promiscuous mode [ 35.513962][ T3318] veth1_vlan: entered promiscuous mode [ 35.521809][ T3315] veth1_macvtap: entered promiscuous mode [ 35.532266][ T3321] veth1_vlan: entered promiscuous mode [ 35.544823][ T3320] veth0_macvtap: entered promiscuous mode [ 35.557250][ T3320] veth1_macvtap: entered promiscuous mode [ 35.569482][ T3321] veth0_macvtap: entered promiscuous mode [ 35.579864][ T3318] veth0_macvtap: entered promiscuous mode [ 35.589716][ T3321] veth1_macvtap: entered promiscuous mode [ 35.592263][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 35.592279][ T29] audit: type=1400 audit(1730168150.306:110): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/root/syzkaller.bZ7xPS/syz-tmp" dev="sda1" ino=1944 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 35.602208][ T3321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 35.636578][ T3321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 35.647213][ T29] audit: type=1400 audit(1730168150.346:111): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 35.651086][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.669340][ T29] audit: type=1400 audit(1730168150.346:112): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/root/syzkaller.bZ7xPS/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 35.694072][ T3320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 35.701907][ T29] audit: type=1400 audit(1730168150.346:113): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 35.712328][ T3320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 35.712342][ T3320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 35.712355][ T3320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 35.716746][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.734196][ T29] audit: type=1400 audit(1730168150.346:114): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/root/syzkaller.bZ7xPS/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 35.744420][ T3318] veth1_macvtap: entered promiscuous mode [ 35.754465][ T29] audit: type=1400 audit(1730168150.346:115): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/root/syzkaller.bZ7xPS/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4144 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 35.771696][ T3318] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 35.798184][ T29] audit: type=1400 audit(1730168150.346:116): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 35.798213][ T29] audit: type=1400 audit(1730168150.356:117): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=502 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 35.804036][ T3318] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 35.804049][ T3318] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 35.904651][ T3318] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 35.914543][ T3318] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 35.925017][ T3318] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 35.935677][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.948712][ T3315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 35.959222][ T3315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 35.969111][ T3315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 35.979566][ T3315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 35.989488][ T3315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 35.999978][ T3315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.009832][ T3315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 36.020407][ T3315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.031274][ T3314] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 36.031931][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.053861][ T3321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.064504][ T3321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.075152][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.083847][ T3321] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.092598][ T3321] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.101331][ T3321] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.110142][ T3321] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.124226][ T3315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.134772][ T3315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.144630][ T3315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.155110][ T3315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.168451][ T29] audit: type=1400 audit(1730168150.866:118): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 36.169630][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.192662][ T29] audit: type=1400 audit(1730168150.866:119): avc: denied { open } for pid=3314 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 36.211228][ T3315] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.232729][ T3315] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.241607][ T3315] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.250503][ T3315] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.262660][ T3320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.273166][ T3320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.283007][ T3320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.293442][ T3320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.303389][ T3320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.313856][ T3320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.324817][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.336499][ T3318] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.347029][ T3318] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.356971][ T3318] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.367441][ T3318] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.377293][ T3318] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.387765][ T3318] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.397606][ T3318] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 36.408114][ T3318] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 36.419052][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.431708][ T3320] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.440543][ T3320] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.449280][ T3320] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.458193][ T3320] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.470241][ T3318] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.479136][ T3318] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.487932][ T3318] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.496715][ T3318] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.525087][ T3460] loop1: detected capacity change from 0 to 512 [ 36.531676][ T3460] ======================================================= [ 36.531676][ T3460] WARNING: The mand mount option has been deprecated and [ 36.531676][ T3460] and is ignored by this kernel. Remove the mand [ 36.531676][ T3460] option from the mount to silence this warning. [ 36.531676][ T3460] ======================================================= [ 36.574249][ T3460] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 36.634670][ T3460] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz.1.7: bg 0: block 64: padding at end of block bitmap is not set [ 36.652846][ T3460] EXT4-fs error (device loop1): ext4_acquire_dquot:6879: comm syz.1.7: Failed to acquire dquot type 0 [ 36.665232][ T3460] EXT4-fs (loop1): 1 truncate cleaned up [ 36.671667][ T3460] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.983235][ T3478] loop0: detected capacity change from 0 to 256 [ 37.118560][ T3492] loop2: detected capacity change from 0 to 512 [ 37.125902][ T3492] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 37.152513][ T3492] EXT4-fs error (device loop2): ext4_validate_block_bitmap:441: comm syz.2.10: bg 0: block 64: padding at end of block bitmap is not set [ 37.166861][ T3492] EXT4-fs error (device loop2): ext4_acquire_dquot:6879: comm syz.2.10: Failed to acquire dquot type 0 [ 37.178751][ T3492] EXT4-fs (loop2): 1 truncate cleaned up [ 37.184795][ T3492] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 37.269991][ T3460] syz.1.7 (3460) used greatest stack depth: 9600 bytes left [ 37.279817][ T3314] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.399223][ T3498] loop1: detected capacity change from 0 to 1024 [ 37.408996][ T3498] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 37.425311][ T3498] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 37.490199][ T3314] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.534172][ T3501] xt_connbytes: Forcing CT accounting to be enabled [ 37.540964][ T3501] Cannot find add_set index 0 as target [ 37.750555][ T3505] loop1: detected capacity change from 0 to 512 [ 37.758858][ T3505] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 37.773726][ T3505] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz.1.14: bg 0: block 64: padding at end of block bitmap is not set [ 37.788710][ T3505] EXT4-fs error (device loop1): ext4_acquire_dquot:6879: comm syz.1.14: Failed to acquire dquot type 0 [ 37.801354][ T3505] EXT4-fs (loop1): 1 truncate cleaned up [ 37.807844][ T3505] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 37.901155][ T3492] syz.2.10 (3492) used greatest stack depth: 9432 bytes left [ 37.972648][ T3315] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.188958][ C0] hrtimer: interrupt took 27366 ns [ 38.205180][ T3515] netlink: 7 bytes leftover after parsing attributes in process `syz.2.15'. [ 38.207117][ T3517] loop4: detected capacity change from 0 to 1024 [ 38.226975][ T3517] EXT4-fs (loop4): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 38.271470][ T3517] JBD2: no valid journal superblock found [ 38.277325][ T3517] EXT4-fs (loop4): Could not load journal inode [ 38.296357][ T3519] loop3: detected capacity change from 0 to 512 [ 38.318173][ T3519] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 38.397786][ T3519] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz.3.17: bg 0: block 64: padding at end of block bitmap is not set [ 38.422172][ T3519] EXT4-fs error (device loop3): ext4_acquire_dquot:6879: comm syz.3.17: Failed to acquire dquot type 0 [ 38.434556][ T3519] EXT4-fs (loop3): 1 truncate cleaned up [ 38.441155][ T3519] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 38.543232][ T3524] loop0: detected capacity change from 0 to 2048 [ 38.575072][ T3314] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.586238][ T3484] loop0: p1 < > p4 [ 38.664295][ T3484] loop0: p4 size 8388608 extends beyond EOD, truncated [ 38.748161][ T3524] loop0: p1 < > p4 [ 38.753380][ T3524] loop0: p4 size 8388608 extends beyond EOD, truncated [ 38.856701][ T3484] udevd[3484]: inotify_add_watch(7, /dev/loop0p1, 10) failed: No such file or directory [ 38.857764][ T3536] loop2: detected capacity change from 0 to 512 [ 38.875235][ T3308] udevd[3308]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory [ 38.905932][ T3308] udevd[3308]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory [ 38.918261][ T3484] udevd[3484]: inotify_add_watch(7, /dev/loop0p1, 10) failed: No such file or directory [ 38.936595][ T3536] EXT4-fs error (device loop2): ext4_xattr_ibody_find:2240: inode #15: comm syz.2.24: corrupted in-inode xattr: invalid ea_ino [ 38.958988][ T3536] EXT4-fs error (device loop2): ext4_orphan_get:1393: comm syz.2.24: couldn't read orphan inode 15 (err -117) [ 38.971949][ T3536] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 39.029339][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.045466][ T3315] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.109189][ T3553] FAULT_INJECTION: forcing a failure. [ 39.109189][ T3553] name failslab, interval 1, probability 0, space 0, times 1 [ 39.122084][ T3553] CPU: 1 UID: 0 PID: 3553 Comm: syz.2.30 Not tainted 6.12.0-rc5-syzkaller #0 [ 39.130923][ T3553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 39.140989][ T3553] Call Trace: [ 39.144334][ T3553] [ 39.147349][ T3553] dump_stack_lvl+0xf2/0x150 [ 39.151951][ T3553] dump_stack+0x15/0x20 [ 39.156111][ T3553] should_fail_ex+0x223/0x230 [ 39.160820][ T3553] ? __alloc_skb+0x10b/0x310 [ 39.165447][ T3553] should_failslab+0x8f/0xb0 [ 39.170049][ T3553] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 39.175868][ T3553] __alloc_skb+0x10b/0x310 [ 39.180378][ T3553] netlink_alloc_large_skb+0xad/0xe0 [ 39.185678][ T3553] netlink_sendmsg+0x3b4/0x6e0 [ 39.190452][ T3553] ? __pfx_netlink_sendmsg+0x10/0x10 [ 39.195741][ T3553] __sock_sendmsg+0x140/0x180 [ 39.200499][ T3553] __sys_sendto+0x1d6/0x260 [ 39.205056][ T3553] __x64_sys_sendto+0x78/0x90 [ 39.209751][ T3553] x64_sys_call+0x2959/0x2d60 [ 39.214512][ T3553] do_syscall_64+0xc9/0x1c0 [ 39.219027][ T3553] ? clear_bhb_loop+0x55/0xb0 [ 39.223820][ T3553] ? clear_bhb_loop+0x55/0xb0 [ 39.228505][ T3553] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.234419][ T3553] RIP: 0033:0x7f5eabf705ac [ 39.238851][ T3553] Code: 2a 5a 02 00 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 70 5a 02 00 48 8b [ 39.258675][ T3553] RSP: 002b:00007f5eaabe5ec0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 39.267103][ T3553] RAX: ffffffffffffffda RBX: 00007f5eaabe5fc0 RCX: 00007f5eabf705ac [ 39.275149][ T3553] RDX: 0000000000000024 RSI: 00007f5eaabe6010 RDI: 0000000000000005 [ 39.283208][ T3553] RBP: 0000000000000000 R08: 00007f5eaabe5f14 R09: 000000000000000c [ 39.291185][ T3553] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 [ 39.299224][ T3553] R13: 00007f5eaabe5f68 R14: 00007f5eaabe6010 R15: 0000000000000000 [ 39.307223][ T3553] [ 39.370497][ T3551] serio: Serial port pts0 [ 39.414077][ T3567] loop0: detected capacity change from 0 to 256 [ 39.590980][ T3573] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 39.599219][ T3573] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 39.621519][ T3569] netlink: 8 bytes leftover after parsing attributes in process `syz.2.38'. [ 39.648655][ T3569] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 39.949980][ T3586] loop4: detected capacity change from 0 to 1024 [ 39.957276][ T3586] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 40.155817][ T3569] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.204482][ T3569] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.264197][ T3569] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.309094][ T3601] loop3: detected capacity change from 0 to 512 [ 40.316056][ T3601] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 40.337235][ T3601] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz.3.46: bg 0: block 64: padding at end of block bitmap is not set [ 40.352891][ T3601] EXT4-fs error (device loop3): ext4_acquire_dquot:6879: comm syz.3.46: Failed to acquire dquot type 0 [ 40.364672][ T3601] EXT4-fs (loop3): 1 truncate cleaned up [ 40.370789][ T3601] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.395965][ T3569] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.425242][ T3569] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.453470][ T3569] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.482737][ T3569] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.495528][ T3608] program syz.0.49 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 40.510295][ T3610] FAULT_INJECTION: forcing a failure. [ 40.510295][ T3610] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 40.523556][ T3610] CPU: 1 UID: 0 PID: 3610 Comm: syz.2.50 Not tainted 6.12.0-rc5-syzkaller #0 [ 40.532400][ T3610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 40.542481][ T3610] Call Trace: [ 40.545770][ T3610] [ 40.548713][ T3610] dump_stack_lvl+0xf2/0x150 [ 40.553325][ T3610] dump_stack+0x15/0x20 [ 40.557571][ T3610] should_fail_ex+0x223/0x230 [ 40.562422][ T3610] should_fail+0xb/0x10 [ 40.566672][ T3610] should_fail_usercopy+0x1a/0x20 [ 40.571743][ T3610] _copy_from_user+0x20/0xe0 [ 40.576349][ T3610] memdup_user+0x64/0xc0 [ 40.580630][ T3610] strndup_user+0x68/0xa0 [ 40.585027][ T3610] __se_sys_add_key+0x11b/0x320 [ 40.589896][ T3610] ? fput+0x14e/0x190 [ 40.593933][ T3610] __x64_sys_add_key+0x67/0x80 [ 40.598722][ T3610] x64_sys_call+0x157d/0x2d60 [ 40.603653][ T3610] do_syscall_64+0xc9/0x1c0 [ 40.608177][ T3610] ? clear_bhb_loop+0x55/0xb0 [ 40.612883][ T3610] ? clear_bhb_loop+0x55/0xb0 [ 40.617632][ T3610] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 40.623553][ T3610] RIP: 0033:0x7f5eabf6e719 [ 40.628068][ T3610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.647862][ T3610] RSP: 002b:00007f5eaabe7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 40.656404][ T3610] RAX: ffffffffffffffda RBX: 00007f5eac125f80 RCX: 00007f5eabf6e719 [ 40.664423][ T3610] RDX: 00000000200002c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 40.672413][ T3610] RBP: 00007f5eaabe7090 R08: ffffffffffffffff R09: 0000000000000000 [ 40.680402][ T3610] R10: 0000000000000048 R11: 0000000000000246 R12: 0000000000000001 [ 40.688387][ T3610] R13: 0000000000000000 R14: 00007f5eac125f80 R15: 00007ffd482b4aa8 [ 40.696421][ T3610] [ 40.700467][ T29] kauditd_printk_skb: 17426 callbacks suppressed [ 40.700480][ T29] audit: type=1326 audit(1730168155.236:17531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3593 comm="syz.4.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f3de3d856e7 code=0x7ffc0000 [ 40.731631][ T29] audit: type=1326 audit(1730168155.236:17532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3593 comm="syz.4.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f3de3d2a099 code=0x7ffc0000 [ 40.755238][ T29] audit: type=1326 audit(1730168155.236:17533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3593 comm="syz.4.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f3de3d8e719 code=0x7ffc0000 [ 40.778645][ T29] audit: type=1326 audit(1730168155.236:17534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3593 comm="syz.4.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f3de3d856e7 code=0x7ffc0000 [ 40.802581][ T29] audit: type=1326 audit(1730168155.236:17535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3593 comm="syz.4.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f3de3d2a099 code=0x7ffc0000 [ 40.826293][ T29] audit: type=1326 audit(1730168155.236:17536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3593 comm="syz.4.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f3de3d8e719 code=0x7ffc0000 [ 40.849655][ T29] audit: type=1326 audit(1730168155.236:17537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3602 comm="syz.1.48" exe="/root/syz-executor" sig=0 arch=c000003e syscall=299 compat=0 ip=0x7fbf56bae719 code=0x7ffc0000 [ 40.943146][ T29] audit: type=1326 audit(1730168155.606:17538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3593 comm="syz.4.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f3de3d856e7 code=0x7ffc0000 [ 40.966835][ T29] audit: type=1326 audit(1730168155.606:17539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3593 comm="syz.4.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f3de3d2a099 code=0x7ffc0000 [ 40.990521][ T29] audit: type=1326 audit(1730168155.606:17540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3593 comm="syz.4.45" exe="/root/syz-executor" sig=0 arch=c000003e syscall=276 compat=0 ip=0x7f3de3d8e719 code=0x7ffc0000 [ 41.015096][ T3616] netlink: 12 bytes leftover after parsing attributes in process `syz.0.51'. [ 41.023936][ T3616] netlink: 24 bytes leftover after parsing attributes in process `syz.0.51'. [ 41.052262][ T3618] mmap: syz.2.52 (3618) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 41.096542][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.159253][ T3628] FAULT_INJECTION: forcing a failure. [ 41.159253][ T3628] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 41.172457][ T3628] CPU: 0 UID: 0 PID: 3628 Comm: syz.3.55 Not tainted 6.12.0-rc5-syzkaller #0 [ 41.181276][ T3628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 41.191399][ T3628] Call Trace: [ 41.194763][ T3628] [ 41.197690][ T3628] dump_stack_lvl+0xf2/0x150 [ 41.202362][ T3628] dump_stack+0x15/0x20 [ 41.206673][ T3628] should_fail_ex+0x223/0x230 [ 41.211367][ T3628] should_fail+0xb/0x10 [ 41.215556][ T3628] should_fail_usercopy+0x1a/0x20 [ 41.220634][ T3628] _copy_from_user+0x20/0xe0 [ 41.225248][ T3628] sctp_setsockopt+0xbe/0xea0 [ 41.229936][ T3628] sock_common_setsockopt+0x64/0x80 [ 41.235222][ T3628] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 41.241132][ T3628] __sys_setsockopt+0x1cc/0x240 [ 41.246046][ T3628] __x64_sys_setsockopt+0x66/0x80 [ 41.251155][ T3628] x64_sys_call+0x278d/0x2d60 [ 41.255830][ T3628] do_syscall_64+0xc9/0x1c0 [ 41.260361][ T3628] ? clear_bhb_loop+0x55/0xb0 [ 41.265135][ T3628] ? clear_bhb_loop+0x55/0xb0 [ 41.270148][ T3628] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.276053][ T3628] RIP: 0033:0x7f0823a3e719 [ 41.280467][ T3628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.300249][ T3628] RSP: 002b:00007f08226b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 41.308665][ T3628] RAX: ffffffffffffffda RBX: 00007f0823bf5f80 RCX: 00007f0823a3e719 [ 41.316650][ T3628] RDX: 0000000000000009 RSI: 0000000000000084 RDI: 0000000000000003 [ 41.324653][ T3628] RBP: 00007f08226b7090 R08: 000000000000009c R09: 0000000000000000 [ 41.332674][ T3628] R10: 0000000020000680 R11: 0000000000000246 R12: 0000000000000001 [ 41.340647][ T3628] R13: 0000000000000000 R14: 00007f0823bf5f80 R15: 00007fff82d44c28 [ 41.348706][ T3628] [ 41.422601][ T3637] loop1: detected capacity change from 0 to 256 [ 41.494446][ T3646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 41.505128][ T3646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.514963][ T3646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 41.525434][ T3646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.535471][ T3646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 41.545922][ T3646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.555367][ T3651] process 'syz.2.62' launched '/dev/fd/3' with NULL argv: empty string added [ 41.555770][ T3646] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 41.575030][ T3646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.585464][ T3646] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 41.593021][ T3646] batadv_slave_0: entered promiscuous mode [ 41.796129][ T3669] loop1: detected capacity change from 0 to 256 [ 42.128279][ T3679] FAULT_INJECTION: forcing a failure. [ 42.128279][ T3679] name failslab, interval 1, probability 0, space 0, times 0 [ 42.140985][ T3679] CPU: 1 UID: 0 PID: 3679 Comm: syz.0.70 Not tainted 6.12.0-rc5-syzkaller #0 [ 42.149769][ T3679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 42.159876][ T3679] Call Trace: [ 42.163163][ T3679] [ 42.166113][ T3679] dump_stack_lvl+0xf2/0x150 [ 42.170835][ T3679] dump_stack+0x15/0x20 [ 42.175079][ T3679] should_fail_ex+0x223/0x230 [ 42.179808][ T3679] ? __get_vm_area_node+0xf7/0x1b0 [ 42.185016][ T3679] should_failslab+0x8f/0xb0 [ 42.189646][ T3679] __kmalloc_cache_node_noprof+0x50/0x2b0 [ 42.195411][ T3679] __get_vm_area_node+0xf7/0x1b0 [ 42.200473][ T3679] __vmalloc_node_range_noprof+0x2c3/0xec0 [ 42.206308][ T3679] ? bpf_prog_alloc_no_stats+0x49/0x360 [ 42.211907][ T3679] ? __rcu_read_unlock+0x4e/0x70 [ 42.216967][ T3679] ? terminate_walk+0x260/0x280 [ 42.221858][ T3679] ? bpf_prog_alloc_no_stats+0x49/0x360 [ 42.227483][ T3679] __vmalloc_noprof+0x5e/0x70 [ 42.232184][ T3679] ? bpf_prog_alloc_no_stats+0x49/0x360 [ 42.237752][ T3679] bpf_prog_alloc_no_stats+0x49/0x360 [ 42.243286][ T3679] ? bpf_prog_alloc+0x28/0x150 [ 42.248126][ T3679] bpf_prog_alloc+0x3a/0x150 [ 42.252770][ T3679] __get_filter+0x90/0x220 [ 42.257198][ T3679] sk_reuseport_attach_filter+0x22/0x140 [ 42.262845][ T3679] sk_setsockopt+0x195f/0x1f80 [ 42.267711][ T3679] udp_lib_setsockopt+0x99/0x7e0 [ 42.272674][ T3679] udpv6_setsockopt+0x73/0xb0 [ 42.277360][ T3679] ? __pfx_udp_v6_push_pending_frames+0x10/0x10 [ 42.283691][ T3679] sock_common_setsockopt+0x64/0x80 [ 42.288928][ T3679] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 42.294870][ T3679] __sys_setsockopt+0x1cc/0x240 [ 42.299750][ T3679] __x64_sys_setsockopt+0x66/0x80 [ 42.304826][ T3679] x64_sys_call+0x278d/0x2d60 [ 42.309512][ T3679] do_syscall_64+0xc9/0x1c0 [ 42.314075][ T3679] ? clear_bhb_loop+0x55/0xb0 [ 42.318796][ T3679] ? clear_bhb_loop+0x55/0xb0 [ 42.323550][ T3679] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.329533][ T3679] RIP: 0033:0x7f4db77de719 [ 42.334017][ T3679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.353677][ T3679] RSP: 002b:00007f4db6457038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 42.362098][ T3679] RAX: ffffffffffffffda RBX: 00007f4db7995f80 RCX: 00007f4db77de719 [ 42.370089][ T3679] RDX: 0000000000000033 RSI: 0000000000000001 RDI: 0000000000000004 [ 42.378112][ T3679] RBP: 00007f4db6457090 R08: 0000000000000010 R09: 0000000000000000 [ 42.386123][ T3679] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 42.394100][ T3679] R13: 0000000000000000 R14: 00007f4db7995f80 R15: 00007ffd6b49dd28 [ 42.402083][ T3679] [ 42.405364][ T3679] syz.0.70: vmalloc error: size 4096, vm_struct allocation failed, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 42.421083][ T3679] CPU: 1 UID: 0 PID: 3679 Comm: syz.0.70 Not tainted 6.12.0-rc5-syzkaller #0 [ 42.429873][ T3679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 42.440008][ T3679] Call Trace: [ 42.443291][ T3679] [ 42.446226][ T3679] dump_stack_lvl+0xf2/0x150 [ 42.450833][ T3679] dump_stack+0x15/0x20 [ 42.454998][ T3679] warn_alloc+0x145/0x1b0 [ 42.459339][ T3679] ? __kmalloc_cache_node_noprof+0x50/0x2b0 [ 42.465267][ T3679] __vmalloc_node_range_noprof+0x2e8/0xec0 [ 42.471082][ T3679] ? __rcu_read_unlock+0x4e/0x70 [ 42.476199][ T3679] ? terminate_walk+0x260/0x280 [ 42.481069][ T3679] ? bpf_prog_alloc_no_stats+0x49/0x360 [ 42.486775][ T3679] __vmalloc_noprof+0x5e/0x70 [ 42.491511][ T3679] ? bpf_prog_alloc_no_stats+0x49/0x360 [ 42.497078][ T3679] bpf_prog_alloc_no_stats+0x49/0x360 [ 42.502468][ T3679] ? bpf_prog_alloc+0x28/0x150 [ 42.507283][ T3679] bpf_prog_alloc+0x3a/0x150 [ 42.511893][ T3679] __get_filter+0x90/0x220 [ 42.516322][ T3679] sk_reuseport_attach_filter+0x22/0x140 [ 42.521966][ T3679] sk_setsockopt+0x195f/0x1f80 [ 42.526867][ T3679] udp_lib_setsockopt+0x99/0x7e0 [ 42.531824][ T3679] udpv6_setsockopt+0x73/0xb0 [ 42.536508][ T3679] ? __pfx_udp_v6_push_pending_frames+0x10/0x10 [ 42.542779][ T3679] sock_common_setsockopt+0x64/0x80 [ 42.547990][ T3679] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 42.553918][ T3679] __sys_setsockopt+0x1cc/0x240 [ 42.558888][ T3679] __x64_sys_setsockopt+0x66/0x80 [ 42.564007][ T3679] x64_sys_call+0x278d/0x2d60 [ 42.568785][ T3679] do_syscall_64+0xc9/0x1c0 [ 42.573393][ T3679] ? clear_bhb_loop+0x55/0xb0 [ 42.578224][ T3679] ? clear_bhb_loop+0x55/0xb0 [ 42.582914][ T3679] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.588837][ T3679] RIP: 0033:0x7f4db77de719 [ 42.593431][ T3679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.613081][ T3679] RSP: 002b:00007f4db6457038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 42.621567][ T3679] RAX: ffffffffffffffda RBX: 00007f4db7995f80 RCX: 00007f4db77de719 [ 42.629607][ T3679] RDX: 0000000000000033 RSI: 0000000000000001 RDI: 0000000000000004 [ 42.637582][ T3679] RBP: 00007f4db6457090 R08: 0000000000000010 R09: 0000000000000000 [ 42.645628][ T3679] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 42.653721][ T3679] R13: 0000000000000000 R14: 00007f4db7995f80 R15: 00007ffd6b49dd28 [ 42.661703][ T3679] [ 42.665316][ T3679] Mem-Info: [ 42.668438][ T3679] active_anon:6729 inactive_anon:0 isolated_anon:0 [ 42.668438][ T3679] active_file:4707 inactive_file:1930 isolated_file:0 [ 42.668438][ T3679] unevictable:0 dirty:1203 writeback:8 [ 42.668438][ T3679] slab_reclaimable:2674 slab_unreclaimable:13326 [ 42.668438][ T3679] mapped:23670 shmem:3088 pagetables:738 [ 42.668438][ T3679] sec_pagetables:0 bounce:0 [ 42.668438][ T3679] kernel_misc_reclaimable:0 [ 42.668438][ T3679] free:1907474 free_pcp:18284 free_cma:0 [ 42.713653][ T3679] Node 0 active_anon:26684kB inactive_anon:0kB active_file:18828kB inactive_file:7720kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:94680kB dirty:4812kB writeback:32kB shmem:12352kB writeback_tmp:0kB kernel_stack:2832kB pagetables:2836kB sec_pagetables:0kB all_unreclaimable? no [ 42.741998][ T3679] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 42.769367][ T3679] lowmem_reserve[]: 0 2866 7844 0 [ 42.774477][ T3679] Node 0 DMA32 free:2950276kB boost:0kB min:4136kB low:7068kB high:10000kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2953908kB mlocked:0kB bounce:0kB free_pcp:3632kB local_pcp:3532kB free_cma:0kB [ 42.803353][ T3679] lowmem_reserve[]: 0 0 4978 0 [ 42.808195][ T3679] Node 0 Normal free:4662520kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB active_anon:26800kB inactive_anon:0kB active_file:18828kB inactive_file:7720kB unevictable:0kB writepending:4844kB present:5242880kB managed:5098208kB mlocked:0kB bounce:0kB free_pcp:69808kB local_pcp:68840kB free_cma:0kB [ 42.838464][ T3679] lowmem_reserve[]: 0 0 0 0 [ 42.843065][ T3679] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 42.856016][ T3679] Node 0 DMA32: 3*4kB (M) 1*8kB (M) 1*16kB (M) 3*32kB (M) 2*64kB (M) 3*128kB (M) 2*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 718*4096kB (M) = 2950276kB [ 42.872542][ T3679] Node 0 Normal: 196*4kB (UME) 88*8kB (ME) 38*16kB (UME) 40*32kB (UME) 35*64kB (UME) 15*128kB (UME) 21*256kB (M) 14*512kB (ME) 6*1024kB (M) 4*2048kB (M) 1126*4096kB (M) = 4646512kB [ 42.890826][ T3679] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 42.900454][ T3679] 9755 total pagecache pages [ 42.905119][ T3679] 0 pages in swap cache [ 42.909306][ T3679] Free swap = 124988kB [ 42.913496][ T3679] Total swap = 124996kB [ 42.917655][ T3679] 2097051 pages RAM [ 42.921503][ T3679] 0 pages HighMem/MovableOnly [ 42.926177][ T3679] 80182 pages reserved [ 42.973959][ T3701] loop1: detected capacity change from 0 to 512 [ 43.003469][ T3699] netlink: 92 bytes leftover after parsing attributes in process `syz.4.73'. [ 43.023095][ T3701] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2240: inode #15: comm syz.1.78: corrupted in-inode xattr: invalid ea_ino [ 43.037000][ T3701] EXT4-fs error (device loop1): ext4_orphan_get:1393: comm syz.1.78: couldn't read orphan inode 15 (err -117) [ 43.051000][ T3701] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 43.057882][ T3699] loop4: detected capacity change from 0 to 1024 [ 43.098292][ T3314] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.149298][ T3699] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 43.174418][ T3699] ext4 filesystem being mounted at /16/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 43.176658][ T3720] ref_tracker: memory allocation failure, unreliable refcount tracker. [ 43.244863][ T3320] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.275743][ T3717] delete_channel: no stack [ 43.298058][ T3724] netlink: 44 bytes leftover after parsing attributes in process `syz.2.77'. [ 43.308041][ T3725] FAULT_INJECTION: forcing a failure. [ 43.308041][ T3725] name failslab, interval 1, probability 0, space 0, times 0 [ 43.320706][ T3725] CPU: 0 UID: 0 PID: 3725 Comm: syz.4.86 Not tainted 6.12.0-rc5-syzkaller #0 [ 43.329517][ T3725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 43.339605][ T3725] Call Trace: [ 43.342903][ T3725] [ 43.345843][ T3725] dump_stack_lvl+0xf2/0x150 [ 43.350447][ T3725] dump_stack+0x15/0x20 [ 43.354675][ T3725] should_fail_ex+0x223/0x230 [ 43.359435][ T3725] ? skb_clone+0x154/0x1f0 [ 43.363894][ T3725] should_failslab+0x8f/0xb0 [ 43.368541][ T3725] kmem_cache_alloc_noprof+0x4c/0x290 [ 43.373957][ T3725] skb_clone+0x154/0x1f0 [ 43.378256][ T3725] __netlink_deliver_tap+0x2bd/0x4c0 [ 43.383584][ T3725] netlink_unicast+0x64a/0x670 [ 43.388470][ T3725] netlink_sendmsg+0x5cc/0x6e0 [ 43.393247][ T3725] ? __pfx_netlink_sendmsg+0x10/0x10 [ 43.398600][ T3725] __sock_sendmsg+0x140/0x180 [ 43.403308][ T3725] sock_write_iter+0x15e/0x1a0 [ 43.408149][ T3725] do_iter_readv_writev+0x394/0x450 [ 43.413428][ T3725] vfs_writev+0x2d4/0x880 [ 43.417771][ T3725] ? proc_fail_nth_write+0x12a/0x150 [ 43.423149][ T3725] do_writev+0xf8/0x220 [ 43.427318][ T3725] __x64_sys_writev+0x45/0x50 [ 43.432007][ T3725] x64_sys_call+0x1f18/0x2d60 [ 43.436726][ T3725] do_syscall_64+0xc9/0x1c0 [ 43.441313][ T3725] ? clear_bhb_loop+0x55/0xb0 [ 43.445998][ T3725] ? clear_bhb_loop+0x55/0xb0 [ 43.450825][ T3725] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.456735][ T3725] RIP: 0033:0x7f3de3d8e719 [ 43.461152][ T3725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.480885][ T3725] RSP: 002b:00007f3de2a07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 43.489306][ T3725] RAX: ffffffffffffffda RBX: 00007f3de3f45f80 RCX: 00007f3de3d8e719 [ 43.497288][ T3725] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000003 [ 43.505265][ T3725] RBP: 00007f3de2a07090 R08: 0000000000000000 R09: 0000000000000000 [ 43.513343][ T3725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.521374][ T3725] R13: 0000000000000000 R14: 00007f3de3f45f80 R15: 00007ffe16b8dfa8 [ 43.529458][ T3725] [ 43.538864][ T3729] FAULT_INJECTION: forcing a failure. [ 43.538864][ T3729] name failslab, interval 1, probability 0, space 0, times 0 [ 43.551613][ T3729] CPU: 1 UID: 0 PID: 3729 Comm: syz.0.88 Not tainted 6.12.0-rc5-syzkaller #0 [ 43.560406][ T3729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 43.570523][ T3729] Call Trace: [ 43.573825][ T3729] [ 43.576843][ T3729] dump_stack_lvl+0xf2/0x150 [ 43.581459][ T3729] dump_stack+0x15/0x20 [ 43.585644][ T3729] should_fail_ex+0x223/0x230 [ 43.590464][ T3729] ? sidtab_sid2str_get+0xb8/0x140 [ 43.595703][ T3729] should_failslab+0x8f/0xb0 [ 43.600315][ T3729] __kmalloc_node_track_caller_noprof+0xa6/0x380 [ 43.606870][ T3729] ? vsnprintf+0xdd8/0xe30 [ 43.611313][ T3729] kmemdup_noprof+0x2a/0x60 [ 43.615874][ T3729] sidtab_sid2str_get+0xb8/0x140 [ 43.620844][ T3729] security_sid_to_context_core+0x1eb/0x2f0 [ 43.626796][ T3729] security_sid_to_context+0x27/0x30 [ 43.632116][ T3735] FAULT_INJECTION: forcing a failure. [ 43.632116][ T3735] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 43.632174][ T3729] selinux_secid_to_secctx+0x22/0x30 [ 43.650572][ T3729] security_secid_to_secctx+0x48/0x90 [ 43.655963][ T3729] audit_log_task_context+0x8c/0x1b0 [ 43.661264][ T3729] audit_log_task+0xfb/0x180 [ 43.665864][ T3729] audit_seccomp+0x68/0x130 [ 43.670372][ T3729] __seccomp_filter+0x6fa/0x1180 [ 43.675350][ T3729] __secure_computing+0x9f/0x1c0 [ 43.680304][ T3729] syscall_trace_enter+0xd1/0x1f0 [ 43.685416][ T3729] do_syscall_64+0xaa/0x1c0 [ 43.689934][ T3729] ? clear_bhb_loop+0x55/0xb0 [ 43.694616][ T3729] ? clear_bhb_loop+0x55/0xb0 [ 43.699298][ T3729] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.705236][ T3729] RIP: 0033:0x7f4db77dd15c [ 43.709657][ T3729] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 43.729275][ T3729] RSP: 002b:00007f4db6457030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 43.737771][ T3729] RAX: ffffffffffffffda RBX: 00007f4db7995f80 RCX: 00007f4db77dd15c [ 43.745807][ T3729] RDX: 000000000000000f RSI: 00007f4db64570a0 RDI: 0000000000000006 [ 43.753784][ T3729] RBP: 00007f4db6457090 R08: 0000000000000000 R09: 0000000000000000 [ 43.761792][ T3729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 43.769769][ T3729] R13: 0000000000000000 R14: 00007f4db7995f80 R15: 00007ffd6b49dd28 [ 43.777796][ T3729] [ 43.780816][ T3735] CPU: 0 UID: 0 PID: 3735 Comm: syz.1.91 Not tainted 6.12.0-rc5-syzkaller #0 [ 43.789618][ T3735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 43.790727][ T3725] netlink: 5 bytes leftover after parsing attributes in process `syz.4.86'. [ 43.799744][ T3735] Call Trace: [ 43.799756][ T3735] [ 43.799766][ T3735] dump_stack_lvl+0xf2/0x150 [ 43.819317][ T3735] dump_stack+0x15/0x20 [ 43.820865][ T3725] 0猉功D: renamed from gretap0 (while UP) [ 43.823514][ T3735] should_fail_ex+0x223/0x230 [ 43.833936][ T3735] should_fail+0xb/0x10 [ 43.838116][ T3735] should_fail_usercopy+0x1a/0x20 [ 43.843147][ T3735] _copy_to_user+0x20/0xa0 [ 43.847603][ T3735] simple_read_from_buffer+0xa0/0x110 [ 43.853056][ T3735] proc_fail_nth_read+0xf9/0x140 [ 43.858013][ T3735] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 43.863573][ T3735] vfs_read+0x1a2/0x700 [ 43.867820][ T3735] ? __fget_files+0x1d4/0x210 [ 43.872522][ T3735] ksys_read+0xeb/0x1b0 [ 43.876693][ T3735] __x64_sys_read+0x42/0x50 [ 43.881317][ T3735] x64_sys_call+0x27d3/0x2d60 [ 43.886009][ T3735] do_syscall_64+0xc9/0x1c0 [ 43.890695][ T3735] ? clear_bhb_loop+0x55/0xb0 [ 43.895434][ T3735] ? clear_bhb_loop+0x55/0xb0 [ 43.900113][ T3735] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.906021][ T3735] RIP: 0033:0x7fbf56bad15c [ 43.910594][ T3735] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 43.930324][ T3735] RSP: 002b:00007fbf55821030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 43.938807][ T3735] RAX: ffffffffffffffda RBX: 00007fbf56d65f80 RCX: 00007fbf56bad15c [ 43.946778][ T3735] RDX: 000000000000000f RSI: 00007fbf558210a0 RDI: 0000000000000005 [ 43.954750][ T3735] RBP: 00007fbf55821090 R08: 0000000000000000 R09: 0000000000000000 [ 43.962731][ T3735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.970706][ T3735] R13: 0000000000000000 R14: 00007fbf56d65f80 R15: 00007fff2d040378 [ 43.978687][ T3735] [ 44.004061][ T3725] 0猉功D: entered allmulticast mode [ 44.009780][ T3725] A link change request failed with some changes committed already. Interface 30猉功D may have been left with an inconsistent configuration, please check. [ 44.343636][ T3757] syz.2.101[3757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.343889][ T3757] syz.2.101[3757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.352060][ T3758] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3758 comm=syz.4.97 [ 44.361849][ T3757] syz.2.101[3757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.402519][ T3762] loop3: detected capacity change from 0 to 512 [ 44.426210][ T3764] netlink: 5 bytes leftover after parsing attributes in process `syz.1.104'. [ 44.435230][ T3764] 0猉功D: renamed from gretap0 (while UP) [ 44.442291][ T3762] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a042c118, mo2=0002] [ 44.450228][ T3762] EXT4-fs (loop3): failed to initialize system zone (-117) [ 44.457634][ T3762] EXT4-fs (loop3): mount failed [ 44.463945][ T3764] 0猉功D: entered allmulticast mode [ 44.469764][ T3764] A link change request failed with some changes committed already. Interface 30猉功D may have been left with an inconsistent configuration, please check. [ 44.845875][ T3774] macvtap0: entered promiscuous mode [ 44.852033][ T3774] macvtap0: left promiscuous mode [ 44.926408][ T3777] program syz.1.108 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 44.954767][ T3777] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 44.971704][ T3780] geneve0: entered promiscuous mode [ 44.994894][ C1] sd 0:0:1:0: [sda] tag#6281 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK cmd_age=0s [ 45.005322][ C1] sd 0:0:1:0: [sda] tag#6281 CDB: Read(6) 08 00 00 00 00 00 [ 45.012810][ C1] sd 0:0:1:0: [sda] tag#6282 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK cmd_age=0s [ 45.023251][ C1] sd 0:0:1:0: [sda] tag#6282 CDB: Read(6) 08 00 00 00 00 00 [ 45.188915][ T3798] syz.0.115[3798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.189067][ T3798] syz.0.115[3798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.215179][ T3798] syz.0.115[3798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.718650][ T29] kauditd_printk_skb: 2202 callbacks suppressed [ 45.718669][ T29] audit: type=1326 audit(1730168160.426:19742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3782 comm="syz.3.110" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f0823a356e7 code=0x7ffc0000 [ 45.823575][ T29] audit: type=1326 audit(1730168160.476:19743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.1.117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf56bae719 code=0x7ffc0000 [ 45.847110][ T29] audit: type=1326 audit(1730168160.476:19744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.1.117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf56bae719 code=0x7ffc0000 [ 45.870567][ T29] audit: type=1326 audit(1730168160.476:19745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.1.117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7fbf56bae719 code=0x7ffc0000 [ 45.894136][ T29] audit: type=1326 audit(1730168160.476:19746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.1.117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf56bae719 code=0x7ffc0000 [ 45.917589][ T29] audit: type=1326 audit(1730168160.476:19747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.1.117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7fbf56bae719 code=0x7ffc0000 [ 45.941070][ T29] audit: type=1326 audit(1730168160.476:19748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.1.117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf56bae719 code=0x7ffc0000 [ 45.964770][ T29] audit: type=1326 audit(1730168160.476:19749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.1.117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7fbf56bae719 code=0x7ffc0000 [ 45.988212][ T29] audit: type=1326 audit(1730168160.476:19750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.1.117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf56bae719 code=0x7ffc0000 [ 46.011800][ T29] audit: type=1326 audit(1730168160.476:19751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3809 comm="syz.1.117" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf56bae719 code=0x7ffc0000 [ 46.124641][ T3823] loop2: detected capacity change from 0 to 512 [ 46.131819][ T3822] netlink: 8 bytes leftover after parsing attributes in process `syz.3.118'. [ 46.153762][ T3826] syz.0.120 uses obsolete (PF_INET,SOCK_PACKET) [ 46.163426][ T3823] EXT4-fs error (device loop2): ext4_xattr_ibody_find:2240: inode #15: comm syz.2.119: corrupted in-inode xattr: invalid ea_ino [ 46.179414][ T3823] EXT4-fs error (device loop2): ext4_orphan_get:1393: comm syz.2.119: couldn't read orphan inode 15 (err -117) [ 46.196328][ T3823] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 46.230602][ T3822] netlink: 20 bytes leftover after parsing attributes in process `syz.3.118'. [ 46.246423][ T3315] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.259024][ T3830] IPVS: sync thread started: state = BACKUP, mcast_ifn = vcan0, syncid = 0, id = 0 [ 46.320021][ T3835] loop4: detected capacity change from 0 to 512 [ 46.397695][ T3846] loop0: detected capacity change from 0 to 512 [ 46.408518][ T3848] loop3: detected capacity change from 0 to 512 [ 46.418487][ T3848] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 46.428426][ T3835] EXT4-fs (loop4): too many log groups per flexible block group [ 46.436212][ T3835] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 46.443419][ T3835] EXT4-fs (loop4): mount failed [ 46.450204][ T3846] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2240: inode #15: comm syz.0.128: corrupted in-inode xattr: invalid ea_ino [ 46.453685][ T3848] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz.3.125: bg 0: block 64: padding at end of block bitmap is not set [ 46.479212][ T3846] EXT4-fs error (device loop0): ext4_orphan_get:1393: comm syz.0.128: couldn't read orphan inode 15 (err -117) [ 46.494045][ T3848] EXT4-fs error (device loop3): ext4_acquire_dquot:6879: comm syz.3.125: Failed to acquire dquot type 0 [ 46.502995][ T3846] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 46.505627][ T3848] EXT4-fs (loop3): 1 truncate cleaned up [ 46.523706][ T3848] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 46.572962][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.718029][ T3859] loop4: detected capacity change from 0 to 8192 [ 46.724934][ T3859] vfat: Unknown parameter '' [ 47.044464][ T3879] serio: Serial port pts0 [ 47.191126][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 47.318736][ T3901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 47.329275][ T3901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.339229][ T3901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 47.349743][ T3901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.359679][ T3901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 47.370185][ T3901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.380138][ T3901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 47.390613][ T3901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 47.420869][ T3016] ================================================================== [ 47.428994][ T3016] BUG: KCSAN: data-race in d_delete / lookup_fast [ 47.435467][ T3016] [ 47.435475][ T3016] read-write to 0xffff888106651f00 of 4 bytes by task 3833 on cpu 0: [ 47.435492][ T3016] d_delete+0x73/0x100 [ 47.435522][ T3016] d_delete_notify+0x34/0x100 [ 47.435553][ T3016] vfs_unlink+0x320/0x430 [ 47.435586][ T3016] do_unlinkat+0x236/0x4c0 [ 47.435622][ T3016] __x64_sys_unlink+0x2e/0x40 [ 47.435659][ T3016] x64_sys_call+0x280f/0x2d60 [ 47.435687][ T3016] do_syscall_64+0xc9/0x1c0 [ 47.435708][ T3016] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 47.435754][ T3016] [ 47.435760][ T3016] read to 0xffff888106651f00 of 4 bytes by task 3016 on cpu 1: [ 47.435775][ T3016] lookup_fast+0xd9/0x2a0 [ 47.435797][ T3016] walk_component+0x3f/0x230 [ 47.435821][ T3016] path_lookupat+0x10a/0x2b0 [ 47.435848][ T3016] filename_lookup+0x127/0x300 [ 47.435876][ T3016] do_readlinkat+0x89/0x210 [ 47.435905][ T3016] __x64_sys_readlink+0x47/0x60 [ 47.435929][ T3016] x64_sys_call+0x13c3/0x2d60 [ 47.435954][ T3016] do_syscall_64+0xc9/0x1c0 [ 47.435977][ T3016] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 47.436014][ T3016] [ 47.436018][ T3016] value changed: 0x00600108 -> 0x00008008 [ 47.436029][ T3016] [ 47.436032][ T3016] Reported by Kernel Concurrency Sanitizer on: [ 47.436040][ T3016] CPU: 1 UID: 0 PID: 3016 Comm: udevd Not tainted 6.12.0-rc5-syzkaller #0 [ 47.436065][ T3016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 47.436079][ T3016] ==================================================================