last executing test programs: 3m29.319585493s ago: executing program 2 (id=1039): bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="d800000019008111e00212ba0d8105040a600000ff0f040b067c55a1bc000900080006990300000015000500fe8081780d001500033f01400200000901ac040000d67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001740)=@newtaction={0x894, 0x30, 0x1, 0x0, 0x0, {0x7a}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0xff, 0xef02, 0xef0a, 0x9, 0x23, 0x400000, 0x80000000, 0xfffffffb, 0xc, 0x3, 0x2, 0x6, 0x73f9e023, 0x6, 0x6, 0x3e68, 0xfb, 0xeb5, 0x7, 0x24, 0x35bad662, 0x5, 0x4, 0x29, 0x6, 0x8, 0x4, 0x5, 0x1ff, 0x140000, 0x0, 0x1a, 0x8, 0x5, 0x0, 0x5, 0x9, 0x9, 0x7, 0x2, 0x8, 0x0, 0xf, 0x2, 0x98, 0x800, 0x100, 0x8000, 0xca, 0x4, 0x2, 0x3, 0x4, 0x2, 0x1d9, 0x4, 0xfffff2c2, 0x8081, 0x0, 0x1, 0x8, 0x7, 0x9, 0x0, 0x7, 0x8, 0x7, 0x6, 0x7f, 0x3ff, 0x6e09bc56, 0x81, 0x0, 0x400, 0x4, 0x21c30312, 0x6, 0x8, 0x80, 0xc, 0x2, 0x9, 0x9, 0x1, 0xfffffff8, 0x5, 0xb, 0x5, 0xbfc3, 0x3, 0x8, 0x8, 0x1, 0x6252, 0x7, 0x5, 0xc, 0x0, 0x9e, 0x1, 0x27, 0x3, 0x8, 0x10, 0x8001, 0xfff, 0x1ff, 0x7, 0x3, 0xfff, 0x5, 0x9, 0x16, 0x5, 0x7fffffff, 0x7f, 0x4, 0xffffff81, 0x1, 0x8, 0xc, 0x7e, 0x6, 0xfffffff2, 0x2b22, 0x2c5, 0x2db1, 0xfffffff7, 0x200, 0x8, 0x10000e46, 0x5, 0xc9b3, 0x0, 0x9, 0x9, 0x2, 0x8, 0x7, 0x5, 0xfffffc00, 0x800, 0x400, 0x9, 0x6, 0x200, 0x48, 0x40, 0x1, 0x9, 0x7, 0x8000, 0x7, 0x1ff, 0x2237, 0x6, 0x5, 0x6, 0x0, 0x4b, 0x4, 0xffff8000, 0x80000001, 0xd, 0x3, 0x3, 0x5, 0x9, 0x5, 0x3ff, 0x800, 0x9, 0x0, 0x6, 0x2, 0x93b, 0x4, 0x9, 0x200, 0x9, 0x0, 0x9, 0x401, 0xb, 0x3, 0xffffffff, 0x3, 0x0, 0x7, 0x3, 0x1, 0x2, 0x8, 0x3, 0x9, 0x0, 0x9, 0xffffffff, 0x400, 0x9, 0x61a0, 0x7, 0x2, 0x9, 0x9, 0x200, 0x9, 0x1, 0x1, 0x0, 0x4, 0x6, 0x40, 0x7, 0xf, 0x40, 0x80, 0x3, 0x1ff, 0x1, 0x9, 0xff, 0x80, 0x0, 0x4, 0x3, 0x7, 0x9, 0x8, 0x0, 0xf17, 0x0, 0xfffffff7, 0x7, 0x9, 0x0, 0x6, 0x7, 0x3, 0x0, 0xfffffffd, 0x3723, 0xf8a, 0xa, 0xcdd6, 0x1, 0x369, 0x3, 0x9, 0x7fff, 0x8, 0x10, 0xfffffff3, 0x10, 0x3ff, 0x5]}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0x10}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x9, 0x1000, 0x8000, 0x4, 0x4, 0x8, 0x8, 0x80000001, 0x74c6, 0x8, 0x4, 0x40000000, 0x101, 0xffff0a6a, 0x1, 0x7, 0x38, 0x8000, 0x5, 0x3, 0x3, 0x42d, 0x1, 0x9, 0x100, 0x1, 0x1, 0x81, 0x7ff800, 0x3, 0x4, 0x80000000, 0x0, 0x1, 0x6, 0xe, 0x5, 0x7, 0x4, 0xff, 0x2, 0x7, 0xe76, 0x10000, 0xfffffffa, 0x6, 0xd66, 0x9, 0x2, 0xb26, 0xb4, 0xa, 0x800, 0x7fffffff, 0x80, 0xace, 0x80000006, 0x3, 0x3, 0x380, 0x5, 0x100, 0x9, 0x9, 0x1000, 0x7f, 0x3, 0x7, 0x7, 0x18000000, 0x1, 0x10000, 0x2, 0x2, 0x7, 0xef, 0x3, 0x400, 0x0, 0x6, 0x5, 0x92b, 0x5, 0x1000, 0xb, 0x7, 0x5, 0x9, 0x7fffffff, 0x1000, 0x5, 0x76, 0x200, 0x8, 0x2, 0x10000006, 0x10, 0x7ff, 0x40008, 0x72, 0x7fffffff, 0x311, 0xff, 0x4, 0xffffff2f, 0x1, 0x8, 0x9, 0xa086, 0x1, 0x200, 0x800, 0x7, 0x5, 0x80000001, 0x3ff, 0x9, 0x100, 0x15d2, 0x6, 0x1, 0x1, 0x2, 0x241c1aaa, 0x2, 0x0, 0x2, 0x16b, 0x8, 0x9, 0xa, 0x981, 0x0, 0xb, 0x2, 0x2, 0x2, 0x400081, 0x3, 0x3, 0x7, 0x6, 0x4, 0x2, 0xfffffffd, 0x5, 0x40000000, 0x7a, 0x8f0a, 0x7, 0xd29, 0x7, 0x0, 0x15, 0xfffffa11, 0x2, 0x80000001, 0xfe2, 0xa, 0x8, 0x7f, 0x6, 0x4, 0x9, 0x7, 0x4, 0x6, 0xf, 0x51, 0xff, 0x2, 0xfffffffd, 0x2, 0x8, 0x3, 0xff, 0x8, 0x2c1efe9, 0x3e, 0x5d18, 0x81, 0x400, 0x4, 0x7326deb8, 0x8006, 0x7ff, 0xffffffff, 0x5, 0x9, 0x2, 0x1, 0x6, 0x9e8, 0x101, 0xb31, 0x5, 0xe2, 0x4, 0x7f1e7a56, 0x6, 0x83, 0x9, 0x203e, 0x5, 0x8, 0x5, 0x10001, 0x87, 0x9, 0x1, 0xff, 0x8, 0x9, 0x8001, 0xffffff41, 0x7, 0x0, 0xe, 0x9, 0x3, 0x3, 0x8001, 0x0, 0x401, 0xfffffff9, 0xed, 0x6, 0xb9, 0xc3, 0x200, 0x101, 0x10, 0xa, 0xc, 0x2, 0x18, 0x5, 0x1, 0xa, 0x6, 0x9, 0x7, 0x4, 0x6, 0xbdc0, 0x7, 0x9, 0x9, 0x100, 0x4, 0xfffffffe, 0x81, 0x1000, 0x1, 0x9, 0x4]}, @TCA_POLICE_TBF={0x3c, 0x1, {0xe62f, 0xffffffffffffffff, 0xf, 0x4, 0x7, {0x3, 0x0, 0x8, 0x9, 0x6, 0x6}, {0x8, 0x0, 0x9, 0x9, 0x6, 0x9}, 0x5, 0xa4de, 0x3}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x0, 0x1}}}}]}]}, 0x894}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r4}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x8081) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006800019f000000000000000002000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4005}, 0x0) sendmmsg(r5, &(0x7f0000000000), 0x4000000000001f2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640), &(0x7f00000003c0), 0x20075, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r6, 0x0, 0x80000}, 0x18) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) r7 = openat$rdma_cm(0xffffff9c, &(0x7f00000006c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r7, &(0x7f0000000380)={0xc, 0x8, 0x144, {&(0x7f0000001140)}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @loopback, 0x100009}, {0xa, 0x4e22, 0xfffffffc, @mcast1}, r8}}, 0x48) 3m29.088691227s ago: executing program 0 (id=1040): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$can_raw(0x1d, 0x3, 0x1) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000200)=[r1, r1, r2, r1, r1, r1, r0, r0, r1, 0xffffffffffffffff], 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0xfffe, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5c}, 0x1c) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r4}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r6, 0x0) r7 = gettid() process_vm_writev(r7, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002540)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x94) r8 = io_uring_setup(0x17f8, &(0x7f0000000080)={0x0, 0x94ec, 0x0, 0x1, 0x33d}) r9 = socket$nl_route(0x10, 0x3, 0x0) pwritev2(r9, &(0x7f00000003c0)=[{&(0x7f00000000c0)="e489bcdd", 0x4}], 0x1, 0xfffffffc, 0xb, 0x10) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000700)=ANY=[@ANYBLOB="0c0400001000010400000000000000000048000045f262bb85c26817cfa2cf2c0295f699b9ba232440016d9e8c239e81f3657fae8d0171a5f549fa1f7f154f3a2837a3ba1d2100ceab481f42b0a922c3e0d3154ead2f2f7627b6", @ANYRES32=r9, @ANYBLOB="10100000000000000800200005000000e4031680a40001800c00070000000000adffffff0c00", @ANYRES16=r9, @ANYRES64=r5, @ANYRESOCT=r8], 0x40c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0x3200010, &(0x7f00000003c0)={[{@bh}, {@nobh}]}, 0x5, 0x52c, &(0x7f0000000c00)="$eJzs3UFvI1cdAPD/TOJsdjeLU0CoVKJUtGi3grU3DW0jhKBc4FQJWO5LSLxRtHa8ip2yiSpIxTdASCBx4sQFiQ+AVO0BcUaVKsEFcUCAQAi2cECidJDHY8g64yRtnbiNfz/prd97npn/e2/l55nxZCaAqfVERLwQETNx5aH6tEix30+95d548PJaLyWRZTf/lkRS1A3W6ZVnI+Jysdp8RHztyxHfTA7H7ezu3VltNhvbRbnebd2td3b3rm+2VjcaG42t5eWl51aeX3l25UZWeFf9XBxkfvKlz7/66W/9/tZfrn2716zPfSQqMdSPcep3vZKPxUBvjLZPI9gEzBT9qUy6IQAAnEhvH/+DEfGJiHg6qjGT780NmZlEywAAAIBxyb6wEG8mERkAAABwbqURsRBJWiuuBViINJ0rzg18OC6lzXan+6nb7Z2t9d57EYtRSW9vNhs3IqLaLye98lJxje2g/MxQeTkiHomI71cv5uXaWru5PuFzHwAAADAtLg8d//+zmub545X8nQAAAADw3rU4sgAAAACcFw75AQAA4PwbPv5/dULtAAAAAE7FV158sZeywfOv11/a3bnTfun6eqNzp9baWauttbfv1jba7Y38nn2t47bXbLfvfia2du7Vu41Ot97Z3bvVau9sdW9tPvQIbAAAAOAMPfLx+79JImL/sxfzFMV9AAEe8sdJNwAYp5lJNwCYGHfxhulVGWTmJtsOYHKSY9538Q4AALz/Xf3o4d//B6cCKhNtGXDaXOsDANPH7/8wvSquAISplkbEB/rZC6OWGfn7/69OGiXLIl6rHqxxfhEAAM7WQp6StFYcByxEmtZqEVfyYiW5vdls3CiOD35drVzolZfyNZNjrxkGAAAAAAAAAAAAAAAAAAAAAAAAAPqyLIkMAAAAONci0j8n+d38I65Wn1oYPj8wl/yrGn8qCj+6+YN7q93u9lKv/u/5s7zmIqL7w5uVvP6ZkY8PAwAAAMYt2R/5Vv84vXhdOtNWAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAF3njw8tognWXcv34xIhbL4s/GfP46H5WIuPSPJGYPrJdExMwY4u+/EhGPlsVP4q0syxaLVpTFv3jK8RfzoSmPn0bE5THEh2l2vzf/vFD2+Uvjify1/PM3W6R3a/T8lxaRH83nubL558qhrbVKYzz2+s/qI+O/EvHYbPn8M5h/kxHxnzy0tX9nWXY4xje+vrc3Kn7244irpd8/yUOx6t3W3Xpnd+/6Zmt1o7HR2FpeXnpu5fmVZ1du1G9vNhvFv6Uxvvexn791VP8vlcT/3W/78+9R/X9q1EaH/Of1ew8+1M9WyuJfe7L0+3c+RsRPi+++Txb53vu9McyK0b86FOPxn772+FH9Xx8x/iX//xcO9v/aCfv/9Fe/+4cTLgoAnIHO7t6d1WazsX1EZv4Ey7zTTHJqWz4+84v5Mw6ajGM72XfiwLmPCQ3dGDK9Pdf/1/R7dbDmvZDJ3uZab2ZZVtTcf3uxZuIdNnXutPo+wUkJAAA4Fb/8307/pFsCAAAAAAAAAAAAAAAAAAAA0+ssbqU2HHN/Ml0FAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADjSfwMAAP//KQjhrw==") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r3}, 0x18) 3m18.796205863s ago: executing program 2 (id=1045): socket$inet6_icmp_raw(0xa, 0x3, 0x3a) gettid() socket$inet6_tcp(0xa, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x103800, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) pipe2$9p(&(0x7f00000003c0), 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket(0x2, 0x80805, 0x0) socket$unix(0x1, 0x5, 0x0) capset(0x0, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x87, 0xffffffff, 0x40}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r1, 0x4236}], 0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0xfffb, 0x5, @empty, 0xa098}, {0xa, 0x4e21, 0x9, @mcast1, 0x9}, r2, 0x8001}}, 0x48) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) 3m16.448093842s ago: executing program 0 (id=1047): syz_emit_ethernet(0x52, &(0x7f0000000040)={@multicast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x4, 0x44, 0x65, 0x0, 0x2, 0x1, 0x0, @rand_addr=0x64010101, @remote}, @dest_unreach={0x3, 0x3, 0x0, 0x0, 0x6, 0x1f, {0xa, 0x4, 0x3, 0x3a, 0x7ff, 0x68, 0x1ce2, 0xd9, 0x2f, 0xe5c, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x36}, {[@cipso={0x86, 0x11, 0x3, [{0x7, 0x9, "a88022eba18f92"}, {0x1, 0x2}]}]}}}}}}}, 0x0) 3m14.160260344s ago: executing program 2 (id=1050): sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000020601020000000000000000f6000000"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, &(0x7f00000000c0)={0x6, 0x1, 0xfc, 0x0, @vifc_lcl_addr=@local, @multicast1}, 0x10) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="00000000000057b6b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) fcntl$notify(r1, 0x402, 0x5) fcntl$notify(r1, 0x402, 0x8000003d) setsockopt$MRT_TABLE(r0, 0x0, 0xcf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000340)={'gre0\x00', 0x0, 0x708, 0x1, 0x6, 0x7fff, {{0xf, 0x4, 0x3, 0x2, 0x3c, 0x66, 0x0, 0x1, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x2d}, {[@generic={0x7, 0x7, "e509b0a6c4"}, @ssrr={0x89, 0x7, 0x4, [@private=0xa010101]}, @noop, @rr={0x7, 0x7, 0xf2, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, @ssrr={0x89, 0x7, 0x52, [@local]}, @lsrr={0x83, 0x7, 0xf6, [@dev={0xac, 0x14, 0x14, 0x3b}]}, @noop]}}}}}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) fcntl$setpipe(r6, 0x407, 0x74b8) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RWRITE(r8, &(0x7f0000000040)={0xb}, 0x11000) read(r7, &(0x7f0000032440)=""/102364, 0x18fdc) read(r7, &(0x7f0000000440)=""/52, 0x34) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x18) r9 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$binfmt_format(r9, &(0x7f0000000800)='-1\x00', 0x3) 3m13.137975998s ago: executing program 0 (id=1051): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) unshare(0x20000400) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc, 0x1ffffffff}, 0x116863, 0x4, 0xfffffffc, 0x5, 0x0, 0x88}, 0xffffffffffffffff, 0x1000003, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000980)='mm_page_free\x00', r3, 0x0, 0x3}, 0x18) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="9000000010000305000000000000000000000700", @ANYRES32=0x0, @ANYBLOB="996e06004d4c0700540012800800010068737200480002800500030008000000050003000500000005000300fd00000008000200", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5], 0x90}}, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x20000000ec072, 0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) sendto$inet6(r9, &(0x7f0000000000)="aa", 0xffe0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x6}, 0x3}, 0x1c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r6, 0x20, &(0x7f0000000140)={0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffffe}}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r10}, 0x18) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @dev, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0xffff, 0x0, 0x8, 0x2f, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x22eb, 0x0, 0x0, [0x5, 0x1]}, {0x0, 0x0, 0x0, 0x0, 0x11}, {}, {0xa888, 0x88be, 0x8000000, {{0x0, 0x1, 0x57}}}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x9}}}}}}}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000cc0), &(0x7f0000000180)='./file3\x00', 0x1004081, &(0x7f0000000500)=ANY=[@ANYRES16=0x0, @ANYRES32], 0x10, 0x7f4, &(0x7f0000000d80)="$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") ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r10) 3m6.547446138s ago: executing program 2 (id=1055): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000200400001"], 0x48) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000280)='./file0\x00', 0x180c8, &(0x7f0000000580)=ANY=[@ANYRES8=0x0], 0x1, 0x252, &(0x7f00000007c0)="$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") renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x9, 0xa3d8, &(0x7f00000005c0), 0x0, 0x8, 0x1, {0x2}}) socket$nl_netfilter(0x10, 0x3, 0xc) 3m5.404149574s ago: executing program 3 (id=1056): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000140)='.pending_reads\x00', 0x1a10c1, 0x9c37611dc13d0d83) fchown(r1, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24, 0x6, @private2={0xfc, 0x2, '\x00', 0x1}, 0x9abe}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$packet(0x11, 0x3, 0x300) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ppoll(&(0x7f0000000040)=[{r2, 0x4000}], 0x1, &(0x7f00000000c0), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x2) io_setup(0x7, &(0x7f0000000280)=0x0) syz_clone(0x100411, 0x0, 0x0, 0x0, 0x0, 0x0) io_submit(r4, 0x2, &(0x7f0000000b40)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x7, 0x8655, r3, 0x0}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x8, r3, 0x0, 0x0, 0x5, 0x0, 0x6}]) 3m2.545253275s ago: executing program 1 (id=1057): setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x670, 0x5, 0x328, 0x1e8, 0x0, 0xfeffffff, 0xa8, 0xa8, 0x290, 0x290, 0xffffffff, 0x290, 0x290, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x6800, {0x0, @multicast2, @multicast2, @port, @port=0x4e22}}}}, {{@uncond, 0x0, 0x70, 0x98, 0x0, {0x0, 0x7}}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x141}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x8, @dev={0xac, 0x14, 0x14, 0x20}, @dev={0xac, 0x14, 0x14, 0x3a}, @port=0x4e20, @port=0x4e23}}}}, {{@ip={@multicast2, @multicast2, 0x0, 0x0, 'veth1_virt_wifi\x00', 'pim6reg0\x00'}, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @port, @icmp_id=0x60}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x388) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2c, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x2}, 0x230, 0x32, 0x43a1bd76, 0x5, 0x8, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2006}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000002800)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000002880), 0x1, 0x5fd, &(0x7f0000002ec0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0xaa042, 0x100) write(r1, &(0x7f0000004200)='t', 0x1) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffffffff, 0xfd}, 0x0, 0x0, 0x1, 0x0, 0x2, 0xff, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xfff8000000000001, 0xffffffffffffffff, 0x9) sendfile(r1, r0, 0x0, 0x3ffff) sendfile(r1, r0, 0x0, 0x7ffff000) 3m1.736523497s ago: executing program 2 (id=1058): r0 = bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) write$tun(0xffffffffffffffff, 0x0, 0x27) r5 = syz_io_uring_setup(0x1104, &(0x7f00000004c0)={0x0, 0xffffffdd, 0x1000, 0xfffffffe, 0xcb}, &(0x7f00000003c0)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1fc, 0x0, 0x1}) io_uring_enter(r5, 0x47fa, 0xfd5d, 0x200000000000000, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000a40)={0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x2810000, &(0x7f0000000380)={[{@user_xattr}, {@noquota}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@jqfmt_vfsv1}, {@block_validity}, {@dioread_nolock}, {@noquota}, {@min_batch_time={'min_batch_time', 0x3d, 0x8}}, {@delalloc}, {@user_xattr}, {@quota}]}, 0x1, 0x54f, &(0x7f0000000b00)="$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") r9 = open(&(0x7f0000000000)='./file1\x00', 0x109042, 0x0) fallocate(r9, 0x11, 0x4000002, 0x3fffe) syz_io_uring_submit(r6, r7, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x2, r8, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x40032043, 0x1}) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'veth0_to_batadv\x00'}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, 0x0, &(0x7f0000000280)='%pI4 \x00'}, 0x20) syz_usb_control_io$printer(0xffffffffffffffff, 0x0, 0x0) 3m0.4283838s ago: executing program 3 (id=1060): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080), 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001740)=@newtaction={0x894, 0x30, 0x1, 0x0, 0x0, {0x7a}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0xff, 0xef02, 0xef0a, 0x9, 0x23, 0x400000, 0x80000000, 0xfffffffb, 0xc, 0x3, 0x2, 0x6, 0x73f9e023, 0x6, 0x6, 0x3e68, 0xfb, 0xeb5, 0x7, 0x24, 0x35bad662, 0x5, 0x4, 0x29, 0x6, 0x8, 0x4, 0x5, 0x1ff, 0x140000, 0x0, 0x1a, 0x8, 0x5, 0x0, 0x5, 0x9, 0x9, 0x7, 0x2, 0x8, 0x0, 0xf, 0x2, 0x98, 0x800, 0x100, 0x8000, 0xca, 0x4, 0x2, 0x3, 0x4, 0x2, 0x1d9, 0x4, 0xfffff2c2, 0x8081, 0x0, 0x1, 0x8, 0x7, 0x9, 0x0, 0x7, 0x8, 0x7, 0x6, 0x7f, 0x3ff, 0x6e09bc56, 0x81, 0x0, 0x400, 0x4, 0x21c30312, 0x6, 0x8, 0x80, 0xc, 0x2, 0x9, 0x9, 0x1, 0xfffffff8, 0x5, 0xb, 0x5, 0xbfc3, 0x3, 0x8, 0x8, 0x1, 0x6252, 0x7, 0x5, 0xc, 0x0, 0x9e, 0x1, 0x27, 0x3, 0x8, 0x10, 0x8001, 0xfff, 0x1ff, 0x7, 0x3, 0xfff, 0x5, 0x9, 0x16, 0x5, 0x7fffffff, 0x7f, 0x4, 0xffffff81, 0x1, 0x8, 0xc, 0x7e, 0x6, 0xfffffff2, 0x2b22, 0x2c5, 0x2db1, 0xfffffff7, 0x200, 0x8, 0x10000e46, 0x5, 0xc9b3, 0x0, 0x9, 0x9, 0x2, 0x8, 0x7, 0x5, 0xfffffc00, 0x800, 0x400, 0x9, 0x6, 0x200, 0x48, 0x40, 0x1, 0x9, 0x7, 0x8000, 0x7, 0x1ff, 0x2237, 0x6, 0x5, 0x6, 0x0, 0x4b, 0x4, 0xffff8000, 0x80000001, 0xd, 0x3, 0x3, 0x5, 0x9, 0x5, 0x3ff, 0x800, 0x9, 0x0, 0x6, 0x2, 0x93b, 0x4, 0x9, 0x200, 0x9, 0x0, 0x9, 0x401, 0xb, 0x3, 0xffffffff, 0x3, 0x0, 0x7, 0x3, 0x1, 0x2, 0x8, 0x3, 0x9, 0x0, 0x9, 0xffffffff, 0x400, 0x9, 0x61a0, 0x7, 0x2, 0x9, 0x9, 0x200, 0x9, 0x1, 0x1, 0x0, 0x4, 0x6, 0x40, 0x7, 0xf, 0x40, 0x80, 0x3, 0x1ff, 0x1, 0x9, 0xff, 0x80, 0x0, 0x4, 0x3, 0x7, 0x9, 0x8, 0x0, 0xf17, 0x0, 0xfffffff7, 0x7, 0x9, 0x0, 0x6, 0x7, 0x3, 0x0, 0xfffffffd, 0x3723, 0xf8a, 0xa, 0xcdd6, 0x1, 0x369, 0x3, 0x9, 0x7fff, 0x8, 0x10, 0xfffffff3, 0x10, 0x3ff, 0x5]}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0x10}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x9, 0x1000, 0x8000, 0x4, 0x4, 0x8, 0x8, 0x80000001, 0x74c6, 0x8, 0x4, 0x40000000, 0x101, 0xffff0a6a, 0x1, 0x7, 0x38, 0x8000, 0x5, 0x3, 0x3, 0x42d, 0x1, 0x9, 0x100, 0x1, 0x1, 0x81, 0x7ff800, 0x3, 0x4, 0x80000000, 0x0, 0x1, 0x6, 0xe, 0x5, 0x7, 0x4, 0xff, 0x2, 0x7, 0xe76, 0x10000, 0xfffffffa, 0x6, 0xd66, 0x9, 0x2, 0xb26, 0xb4, 0xa, 0x800, 0x7fffffff, 0x80, 0xace, 0x80000006, 0x3, 0x3, 0x380, 0x5, 0x100, 0x9, 0x9, 0x1000, 0x7f, 0x3, 0x7, 0x7, 0x18000000, 0x1, 0x10000, 0x2, 0x2, 0x7, 0xef, 0x3, 0x400, 0x0, 0x6, 0x5, 0x92b, 0x5, 0x1000, 0xb, 0x7, 0x5, 0x9, 0x7fffffff, 0x1000, 0x5, 0x76, 0x200, 0x8, 0x2, 0x10000006, 0x10, 0x7ff, 0x40008, 0x72, 0x7fffffff, 0x311, 0xff, 0x4, 0xffffff2f, 0x1, 0x8, 0x9, 0xa086, 0x1, 0x200, 0x800, 0x7, 0x5, 0x80000001, 0x3ff, 0x9, 0x100, 0x15d2, 0x6, 0x1, 0x1, 0x2, 0x241c1aaa, 0x2, 0x0, 0x2, 0x16b, 0x8, 0x9, 0xa, 0x981, 0x0, 0xb, 0x2, 0x2, 0x2, 0x400081, 0x3, 0x3, 0x7, 0x6, 0x4, 0x2, 0xfffffffd, 0x5, 0x40000000, 0x7a, 0x8f0a, 0x7, 0xd29, 0x7, 0x0, 0x15, 0xfffffa11, 0x2, 0x80000001, 0xfe2, 0xa, 0x8, 0x7f, 0x6, 0x4, 0x9, 0x7, 0x4, 0x6, 0xf, 0x51, 0xff, 0x2, 0xfffffffd, 0x2, 0x8, 0x3, 0xff, 0x8, 0x2c1efe9, 0x3e, 0x5d18, 0x81, 0x400, 0x4, 0x7326deb8, 0x8006, 0x7ff, 0xffffffff, 0x5, 0x9, 0x2, 0x1, 0x6, 0x9e8, 0x101, 0xb31, 0x5, 0xe2, 0x4, 0x7f1e7a56, 0x6, 0x83, 0x9, 0x203e, 0x5, 0x8, 0x5, 0x10001, 0x87, 0x9, 0x1, 0xff, 0x8, 0x9, 0x8001, 0xffffff41, 0x7, 0x0, 0xe, 0x9, 0x3, 0x3, 0x8001, 0x0, 0x401, 0xfffffff9, 0xed, 0x6, 0xb9, 0xc3, 0x200, 0x101, 0x10, 0xa, 0xc, 0x2, 0x18, 0x5, 0x1, 0xa, 0x6, 0x9, 0x7, 0x4, 0x6, 0xbdc0, 0x7, 0x9, 0x9, 0x100, 0x4, 0xfffffffe, 0x81, 0x1000, 0x1, 0x9, 0x4]}, @TCA_POLICE_TBF={0x3c, 0x1, {0xe62f, 0xffffffffffffffff, 0xf, 0x4, 0x7, {0x3, 0x0, 0x8, 0x9, 0x6, 0x6}, {0x8, 0x0, 0x9, 0x9, 0x6, 0x9}, 0x5, 0xa4de, 0x3}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x0, 0x1}}}}]}]}, 0x894}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r5}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x8081) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000006800019f000000000000000002000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4005}, 0x0) sendmmsg(r6, &(0x7f0000000000), 0x4000000000001f2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640), &(0x7f00000003c0), 0x20075, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r7, 0x0, 0x80000}, 0x18) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) r8 = openat$rdma_cm(0xffffff9c, &(0x7f00000006c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r8, &(0x7f0000000380)={0xc, 0x8, 0x144, {&(0x7f0000001140)}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r8, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @loopback, 0x100009}, {0xa, 0x4e22, 0xfffffffc, @mcast1}, r9}}, 0x48) 2m59.685872825s ago: executing program 0 (id=1061): sendmsg$nl_route_sched_retired(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f00000013c0)=@newtclass={0x574, 0x28, 0x20, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x80795315fa44d456, 0xe}, {0x2, 0x2}, {0x1, 0x9}}, [@c_dsmark={{0xb}, {0xc, 0x2, @TCA_DSMARK_MASK={0x5, 0x4, 0x4}}}, @c_atm={{0x8}, {0x2c, 0x2, [@TCA_ATM_HDR={0x28, 0x3, "28306e50812ca53fe3af4e6299304ad320856e3f28ef8c0bf25a9327f7e2f594987f9e29"}]}}, @c_cbq={{0x8}, {0x4}}, @c_cbq={{0x8}, {0x44, 0x2, [@TCA_CBQ_WRROPT={0x10, 0x2, {0x5, 0x8, 0xb, 0x9, 0xc}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x1c, 0x8, 0x2, 0x5, 0x4, 0x723, 0x6, 0x1}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x15, 0x0, 0x13, 0x4, 0x6, 0x2, 0x5, 0x5}}]}}, @c_atm={{0x8}, {0x2c, 0x2, [@TCA_ATM_FD={0x8}, @TCA_ATM_HDR={0x4}, @TCA_ATM_EXCESS={0x8, 0x4, {0x0, 0xfff2}}, @TCA_ATM_HDR={0x13, 0x3, "ba443bf89778df79578e22979e9e31"}]}}, @c_dsmark={{0xb}, {0xc, 0x2, @TCA_DSMARK_MASK={0x5, 0x4, 0xe6}}}, @c_cbq={{0x8}, {0x458, 0x2, [@TCA_CBQ_FOPT={0x10, 0x3, {{0xfff3, 0xd}, 0x7, 0x6}}, @TCA_CBQ_FOPT={0x10, 0x3, {{0xfff3, 0xa}, 0x8, 0x1}}, @TCA_CBQ_FOPT={0x10, 0x3, {{0xb, 0xf}, 0x39063258, 0x77}}, @TCA_CBQ_RTAB={0x404, 0x6, [0x3, 0xd5, 0x0, 0x2, 0x2, 0x4e8d, 0x255dbff0, 0xed80, 0x5, 0x8, 0x7, 0xb, 0x9, 0x1, 0x5, 0x6, 0x3, 0x0, 0x875, 0x200, 0xf098, 0x0, 0x4, 0x9, 0x9, 0x8, 0x3, 0x8b, 0x9e1f, 0x2, 0x9, 0x7, 0xb278, 0x1, 0x1, 0xf, 0x10001, 0x0, 0x1, 0x3, 0xff, 0x6, 0xfffffffe, 0x80000000, 0x8, 0x15f6bb8e, 0x4, 0x5, 0x3, 0x7, 0x0, 0xffffffff, 0xf94c, 0x3, 0x0, 0x4bd3, 0x5, 0x4, 0x400, 0xd23, 0x0, 0x9, 0x0, 0x40, 0x43, 0xffffffff, 0xaf, 0x9, 0x2, 0x3, 0x6, 0x7, 0x8, 0xffffffff, 0x6, 0x401, 0x5, 0x6, 0xb89, 0x2, 0x6, 0x9, 0x8, 0x9, 0x100, 0x0, 0x58db, 0x10000, 0xa, 0x4, 0x3, 0x100, 0xbef, 0x5, 0xe9, 0x40000000, 0x3, 0x1, 0x7fff, 0x9, 0x6, 0x4c, 0xffff0001, 0xf, 0x3, 0x9, 0x20, 0x3, 0xffffffff, 0x8, 0x1, 0x8, 0x8e1, 0x8, 0xd, 0x1, 0x7, 0x52f9, 0x7, 0x6, 0x80000000, 0x4, 0xfffffff8, 0x8, 0x10, 0xf679, 0x80000000, 0x8, 0x4, 0x980a, 0x40, 0x0, 0xfffffffa, 0x1, 0x2, 0x5, 0x1000, 0xffff, 0x6, 0x40, 0x1, 0x2, 0x1, 0x8, 0x7fffffff, 0xfffffffe, 0x8000, 0x2, 0x8f7, 0x7, 0xffffff08, 0x4b46, 0x7, 0x1ff, 0x6, 0x3ff, 0x6, 0x3, 0x5c1, 0x0, 0x3, 0x2, 0x1, 0x3, 0x9, 0xd19, 0x5, 0x4e70, 0x10000, 0x0, 0x3, 0x8, 0x7, 0x1, 0x100, 0xac, 0x1000, 0xffff, 0x323b, 0x3, 0xb3c, 0x9, 0x10000, 0xfffffffb, 0xfffffff0, 0xfffffffa, 0xffff8000, 0x9, 0x3, 0x401, 0x6, 0x7, 0x9, 0x13, 0x5, 0x7, 0x5, 0x4, 0x4, 0x6, 0x8, 0x93, 0x5, 0x7fffffff, 0x7, 0x5, 0x4, 0x8, 0x800, 0x401, 0x9, 0x1, 0x1b1f1a6a, 0x2, 0x1000, 0x100, 0xd, 0x80000000, 0x2, 0x6, 0x8, 0x1, 0x4, 0x8, 0x2, 0x1, 0x0, 0x4, 0x3ff, 0x9, 0xa, 0x556d747e, 0x2, 0x3, 0xaa30, 0x10, 0x4, 0x2, 0x28, 0x0, 0x1000, 0x7, 0x2, 0x9, 0x1, 0x6, 0x8001, 0x6, 0x6, 0x7, 0x0, 0x800, 0x8, 0x9, 0x836d, 0x1]}, @TCA_CBQ_WRROPT={0x10, 0x2, {0xdd, 0x6, 0x2, 0x2, 0xa, 0x2}}, @TCA_CBQ_FOPT={0x10, 0x3, {{0xffe0, 0x9}, 0xffff, 0x4}}]}}]}, 0x574}, 0x1, 0x0, 0x0, 0x4000800}, 0x4004) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f00000002c0)='./bus\x00', 0x3c9c9b, 0x0, 0x4, 0x0, &(0x7f00000000c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = fsopen(&(0x7f00000001c0)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0f000000040000000800000001"], 0x50) semctl$SEM_STAT(0x0, 0x2, 0x12, 0x0) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0xcc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="7fff0000000000002800128009000100766c616e000000001800028006000100340200000c0002001f0000001e00000008000500", @ANYRES32=r5], 0x50}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)=ANY=[@ANYBLOB="500000001000210400000000fedbdf2500000000", @ANYRES32=0x0, @ANYBLOB="adffa888e16000002800128009000100766c616e00000000180002800c0002000e0000000a000000060001000001000008000500", @ANYRES32=r9], 0x50}}, 0x2) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0x70bd2c, 0x0, {0x0, 0x0, 0x74, r10, {}, {0x0, 0x1}, {0xb, 0xffe0}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x4}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="14"], 0x0, 0x0) open_by_handle_at(0xffffffffffffff9c, 0x0, 0x0) 2m57.814019386s ago: executing program 1 (id=1062): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$can_raw(0x1d, 0x3, 0x1) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000200)=[r1, r1, r2, r1, r1, r1, r0, r0, r1, 0xffffffffffffffff], 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000280)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0xfffe, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5c}, 0x1c) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000280)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r5}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r7, 0x0) r8 = gettid() process_vm_writev(r8, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002540)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x94) r9 = io_uring_setup(0x17f8, &(0x7f0000000080)={0x0, 0x94ec, 0x0, 0x1, 0x33d}) r10 = socket$nl_route(0x10, 0x3, 0x0) pwritev2(r10, &(0x7f00000003c0)=[{&(0x7f00000000c0)="e489bcdd", 0x4}], 0x1, 0xfffffffc, 0xb, 0x10) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000700)=ANY=[@ANYBLOB="0c0400001000010400000000000000000048000045f262bb85c26817cfa2cf2c0295f699b9ba232440016d9e8c239e81f3657fae8d0171a5f549fa1f7f154f3a2837a3ba1d2100ceab481f42b0a922c3e0d3154ead2f2f7627b6", @ANYRES32=r10, @ANYBLOB="10100000000000000800200005000000e4031680a40001800c00070000000000adffffff0c00", @ANYRES16=r10, @ANYRES64=r6, @ANYRESOCT=r9], 0x40c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0x3200010, &(0x7f00000003c0)={[{@bh}, {@nobh}]}, 0x5, 0x52c, &(0x7f0000000c00)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r3}, 0x18) 2m53.780333626s ago: executing program 3 (id=1064): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$can_raw(0x1d, 0x3, 0x1) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000200)=[r1, r1, r2, r1, r1, r1, r0, r0, r1, 0xffffffffffffffff], 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000280)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0xfffe, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5c}, 0x1c) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r5}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r7, 0x0) r8 = gettid() process_vm_writev(r8, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002540)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x94) r9 = io_uring_setup(0x17f8, &(0x7f0000000080)={0x0, 0x94ec, 0x0, 0x1, 0x33d}) r10 = socket$nl_route(0x10, 0x3, 0x0) pwritev2(r10, &(0x7f00000003c0)=[{&(0x7f00000000c0)="e489bcdd", 0x4}], 0x1, 0xfffffffc, 0xb, 0x10) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000700)=ANY=[@ANYBLOB="0c0400001000010400000000000000000048000045f262bb85c26817cfa2cf2c0295f699b9ba232440016d9e8c239e81f3657fae8d0171a5f549fa1f7f154f3a2837a3ba1d2100ceab481f42b0a922c3e0d3154ead2f2f7627b6", @ANYRES32=r10, @ANYBLOB="10100000000000000800200005000000e4031680a40001800c00070000000000adffffff0c00", @ANYRES16=r10, @ANYRES64=r6, @ANYRESOCT=r9], 0x40c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0x3200010, &(0x7f00000003c0)={[{@bh}, {@nobh}]}, 0x5, 0x52c, &(0x7f0000000c00)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r3}, 0x18) 2m49.50669149s ago: executing program 0 (id=1066): epoll_create1(0x0) epoll_create1(0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x8, 0x5}, 0x120, 0x10000, 0x33f8, 0x1, 0x8, 0x20007, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000000000000000000fdffffff18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) socket$rds(0x15, 0x5, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xb2570000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x2000000}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_io_uring_setup(0x499, &(0x7f0000000400)={0x0, 0x7945, 0x400, 0x2, 0x16d}, &(0x7f0000000340), &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_9p2000}]}}) 2m47.356919408s ago: executing program 2 (id=1067): r0 = socket$inet6(0xa, 0x3, 0x5) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@dev, 0x400, 0x0, 0xff, 0x1}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x4001, 0x3, 0x3e8, 0x0, 0x0, 0x148, 0x0, 0x148, 0x350, 0x240, 0x240, 0x350, 0x240, 0x7fffffe, 0x0, {[{{@ip={@private=0xa010102, @local, 0x0, 0x0, 'ip6gretap0\x00', 'nicvf0\x00', {}, {}, 0x88, 0x3, 0x10}, 0x0, 0xf8, 0x158, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'wg1\x00', {0x0, 0x0, 0x1ff, 0x100000, 0x0, 0xed, 0x7}}}, @common=@unspec=@connmark={{0x30}, {0xfffffff9, 0x8}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0x85d, 0xf, [0x10, 0x32, 0x1e, 0x32, 0x2b, 0x25, 0x3f, 0x17, 0x19, 0x22, 0x2c, 0x3d, 0x7, 0x3f, 0x1e, 0x31], 0x0, 0x2, 0x2}}}, {{@ip={@rand_addr=0x64010101, @local, 0xff, 0x0, 'wg0\x00', 'lo\x00', {0xff}, {}, 0x2e, 0x3, 0x4}, 0x0, 0x190, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x8, 0x9, 0x1, 0x1, 'syz1\x00', 0x2}}, @inet=@rpfilter={{0x28}, {0x8}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0xfff, 0x7e, 0x1c, 'netbios-ns\x00', 'syz0\x00', {0x3}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x8, 0x3, 0x3f0, 0xc8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x320, 0xffffffff, 0xffffffff, 0x320, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x33}, 0x0, 0x238, 0x258, 0x0, {}, [@common=@unspec=@quota={{0x38}, {0x1, 0x0, 0x7, {0x4}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x7, 0x69, 0x4, 0x0, 0x1000, 0x6, 0x3}}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x450) unshare(0x28000600) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xe7fd}, 0x100002, 0x3, 0xfffffffc, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x48844) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000014", @ANYRES32=0x0, @ANYRES32], 0x50) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0e0000000400000004000000020000000000", @ANYBLOB='\x00\x00', @ANYRESHEX], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r4, &(0x7f0000000100), &(0x7f0000000000), 0x2}, 0x20) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831371900000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000001f80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002a20702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000001600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001811", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unshare(0x6a040000) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=@newnexthop={0x24, 0x68, 0x1, 0x2, 0x7ffffffc, {}, [@NHA_GROUP={0xc, 0x2, [{0x1, 0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x24008000}, 0x4000) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000280)={0x0, 0xfffffffffffffda3, &(0x7f0000000180)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x20}}, 0x4000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x18) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8, &(0x7f0000000580), 0x5, 0x4f3, &(0x7f00000005c0)="$eJzs3d1rW+cZAPBHku3YibN8bIwkgyWQQfZBLH8wYm+DsattF4GxwG42yDxb8TLLkbHkLDa5cLa7XOxibLRQetH7/gW9aa4aAqXXLb3tVUloUxfakoKKjiTHH5KjtraU+Px+cKJzzqvoeV/Zz+uj97xHJ4DUOlf7JxMxHBHvRMSx+ubWJ5yrP6w/vj1TWzJRrV75KJM8r7bdfGrz/x2JiLWIGIyIP/424m+ZnXHLK6vz08ViYamxna8sLObLK6sXry9MzxXmCjfGJi9NTU2OToxP7Vlb7/7nH3cvv/H7gdc/+/fD+/99681atYYbZZvbsZfqTe+PE5v29UXEr/YjWA/kGu0Z6nVF+EZqP7/vRsT5JP+PRS75aXbmyb7WDNhv1Wq1+mX1ULvitSpwYGWTY+BMdiQi6uvZ7MhI/Rj+e3E4WyyVKz+7Vlq+MVs/Vj4e/dlr14uF0cZnhePRn6ltjyXrT7fHt21PRCTHwP/LDSXbIzOl4mx3uzpgmyPb8v/TXD3/gZTo/CM/cNDIf0gv+Q/pJf8hveQ/pJf8h/SS/5Be8h/SS/5DerXK/6M9qAfQfbv9/R/oYj2ArvrD5cu1pdq8/n325sryfOnmxdlCeX5kYXlmZKa0tDgyVyrNJdfsLDzr9Yql0uLYz2P5Vr5SKFfy5ZXVqwul5RuVq8l1/VcL/V1pFdCJE2fvvZeJiLVfDCVLbPqTL1fhYKtWM9Hra5CB3sj1ugMCesapP0ivr/EZv+2XhAEvthZf0bth8Ejbol/H4r5UB+iC7G6FTx50ryJA11047fwfpJXxf0gv4/+QXo7xgd3G/6NxL7+WjP/DC2vX8X/gQBtuc/+vo5vu3TUaEd+JiHdz/Yea9/oCDoLsh5nG8f+FYz8a3l46kPk8OUUwEBH/fOXKS7emK5Wlsdr+jzf2V15u7B/vRf2B9raO8DXztJnHAEB6rT++PdNcuhn30W/qkxB2xu9rjE0OJkcwh9czW+YqZPZo7sLanYg41Sp+pnG/8/qZj8PruR3xTzYeM/WXSOrbl9w3vTvxT2+K/8NN8c9863cF0uFerf8ZbZV/2SSnYyP/tvY/w3s0d6LZ/zXnXG+O3+z/cm36v7Mdxvj7q/9qdXo3mez96E7EmZb9bzPeYBJre/xa3S50GP/hX/70/XZl1dfqr9MqflNtLV9ZWMyXV1YvXm/WYvLS1NTk6MT4VD4Zo843R6p3+uWpt++3i19rf0Ob9r+/o/1DjTr9pMP2f/GDB38+t0v8H59v/ft3Mnnc9v5Xqxt1+GmH8T8Z/+Cv7cpq8WfbvP/ZVvGjWRox0WH88v9/59phAHiOlFdW56eLxcKSFStWnu+Vvuhi0Gf1HGvd6aCAffM06XtdEwAAAAAAAAAAAKBT7Wb/3tvD6cS9biMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwEHwVQAAAP//QUvQlg==") mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='kfree\x00', r5}, 0x18) 2m46.74743909s ago: executing program 3 (id=1068): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000200400001"], 0x48) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000280)='./file0\x00', 0x180c8, &(0x7f0000000580)=ANY=[@ANYRES8=0x0], 0x1, 0x252, &(0x7f00000007c0)="$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") renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x9, 0xa3d8, &(0x7f00000005c0)=[{0x0}], 0x1, 0x8, 0x1, {0x2}}) socket$nl_netfilter(0x10, 0x3, 0xc) 2m45.934611823s ago: executing program 1 (id=1069): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001340)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000002c0)="6321a178", 0x4}], 0x1}}], 0x1, 0x20000001) recvmmsg(r0, &(0x7f0000003900)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/248, 0xf8}], 0x1}, 0x8}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/109, 0x6d}], 0x1}, 0x8}], 0x2, 0x100, 0x0) sendmmsg$sock(r0, &(0x7f0000004bc0)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000280)="893aa000c21f858ab40be89578b329ab89dd4cee7b796b2ba8c3703248df26a20dba4361f2f837565f07c93ff2c15760b3dd", 0x32}, {&(0x7f0000001bc0)="8efd2a7d5d93d6124b3e96620aa50701d902fd1765ad3e31512652a6e5db71041917d5df3e1c", 0x26}], 0x2}}], 0x1, 0x44000) 2m42.597252292s ago: executing program 3 (id=1070): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xf, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x20040000}, 0x0) 2m41.14731652s ago: executing program 1 (id=1071): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000000000000000000fdffffff18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r3}, 0x10) pipe2$9p(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_9p2000}]}}) 2m37.978138172s ago: executing program 3 (id=1073): bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB, @ANYBLOB, @ANYRES32=0x0], 0x50) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000007c0)=ANY=[@ANYBLOB="020000000000000002000000e000000200e70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000200fffc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x190) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x4e23, @multicast2}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000100000000000010080000000040"], 0x0, 0x26}, 0x28) r2 = socket(0x28, 0x4, 0x9) accept4$llc(r2, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000400)=0x10, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000010000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4, 0x0, 0x1}, 0x18) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) r5 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x800) ioctl$SG_GET_VERSION_NUM(r5, 0x2284, &(0x7f0000000080)) 2m36.22392253s ago: executing program 0 (id=1074): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d0000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x18) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x4, {{0x2, 0x4e21, @multicast1}}}, 0x88) getsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x24b) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000000)=0x1ff, 0x4) r3 = socket$netlink(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) syz_io_uring_setup(0x4e0, 0x0, &(0x7f0000000640), 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5}, &(0x7f0000000000), 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) sendmsg$DEVLINK_CMD_RATE_NEW(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000fbdbdf25250000000e0001006e657464657673696d0000000f0002006e657464657673697d300000"], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) pipe2(&(0x7f0000000340), 0x80) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000380)=ANY=[@ANYRES64=r0], 0xa8}, 0x1, 0x0, 0x0, 0x40c0850}, 0x24000850) sendto$inet(r2, 0x0, 0xffef, 0x20000000, &(0x7f0000000240)={0x2, 0x4e24, @rand_addr=0x64010102}, 0xfffffffffffffee3) setsockopt$inet_int(r2, 0x0, 0xb, 0x0, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r8, 0x8982, &(0x7f0000000400)={0x0, 'batadv0\x00', {0x5}}) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000300020400bf050005001206", 0x2e}, {&(0x7f0000000580)="c9c58fea294c", 0x6}, {&(0x7f0000000740)="21e2a95627016c4fa3cc0084aedf7016d5dfa8d0e092dc697e905d748bf60e463593ade44c516d4618fc8c60a45f71a79b702f44115ef1292fcdeaa2ea7962362327e8fd8538853f06c05ffa329fd11ed25382cf73050ebc930ae7b90c7c1e98f2d6968346effcf4063a6338ab5e9786bf9794462087dac471d33d15808c62bcec5e1a99e316c1e426bca7a0c0b3072ee8bb33d0b1aade767a25ab93dc352956635d0287d78b3aa129648d237c06791f0c4212e167ebb766b51bd95b64926067982b9bcda3bd", 0xc6}, {&(0x7f0000000600)="9bb4bd1176309bcde6", 0x9}, {&(0x7f0000000680)="da1d3bb684ddf436bdb8", 0xa}, {&(0x7f00000006c0)="2d2d642a9476a1", 0x7}], 0x6}, 0x48000) 2m35.694927134s ago: executing program 1 (id=1075): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0xc, 0x0, 0x0, 0x80000}, {0x5c, 0xd, 0x9}]}) 2m33.356322132s ago: executing program 1 (id=1076): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) unshare(0x20000400) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc, 0x1ffffffff}, 0x116863, 0x4, 0xfffffffc, 0x5, 0x0, 0x88}, 0xffffffffffffffff, 0x1000003, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000980)='mm_page_free\x00', r3, 0x0, 0x3}, 0x18) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="9000000010000305000000000000000000000700", @ANYRES32=0x0, @ANYBLOB="996e06004d4c0700540012800800010068737200480002800500030008000000050003000500000005000300fd00000008000200", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5], 0x90}}, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x20000000ec072, 0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26}, 0x20) ioctl$BTRFS_IOC_BALANCE_CTL(r1, 0x40049421, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) sendto$inet6(r9, &(0x7f0000000000)="aa", 0xffe0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x6}, 0x3}, 0x1c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r6, 0x20, &(0x7f0000000140)={0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffffe}}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r10}, 0x18) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @dev, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0xffff, 0x0, 0x8, 0x2f, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x22eb, 0x0, 0x0, [0x5, 0x1]}, {0x0, 0x0, 0x0, 0x0, 0x11}, {}, {0xa888, 0x88be, 0x8000000, {{0x0, 0x1, 0x57}}}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x9}}}}}}}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000cc0), &(0x7f0000000180)='./file3\x00', 0x1004081, &(0x7f0000000500)=ANY=[@ANYRES16=0x0, @ANYRES32], 0x10, 0x7f4, &(0x7f0000000d80)="$eJzs3U9oHOfZAPBnFMl2FD5/Id9HPmMcZ2znA5s6ymqVKBU5pJvVSJ5ktSt2V8WmlMTEcjCWk5AQ0pjS1JekLS2lpx7TXEMuubUUWuih7anQHHrpoRDIpSUtLZSWUnDZ2V1r9Wcl/5HlNP39RPadfeeZd953drLPznpnJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACASKqzpdJkErW8vnQ6Ha4622wsbDG/395P1xRbrDci6fwX+/bFgW7Vgf9dnX1/5+FoHOo+OxT7OsW+uHzP/fc+8T+jI/3lt+jQzToyfNbY4JMk4uudTl08u7Ky/Mpt6Mgu+taPexP7rnuRv1/tPM5n9bzVyBcq81matxrpzPR06ZFTc610Lq9lrTOtdraQVptZpd1opserJ9LJmZmpNJs401iqz89Walm/8vGHy6XSdPr0xGJWabYa9UeenmhVT+W1Wl6fL2LKpdejE/N4Z0d8Jm+n7ayykKbnL6wsT23X1U7Q5JqavWt2nEMP3fvxax/95cJyZ4cc1kjS2zHLk5Pl8uT0YzOPPV4qjZZL5bUVpXXiWkSMRHQibstOy511zyZ1o709ZsOMiKv/vTNv3nCLRnr5P2qRRz2W4nSkkcZI8bj6NxbVmI1mNGKh8/w3Y+vmb8j////IH3+11XoH838/yx9YnX0wivx/uPvs8LD8v6EXO/A3OqzV+vvd3gzWvRpvxOW4GGdjJVZiOV65mTXuWd/qbfwb2dn25iOLeuTRikbksRCVoibt1aQxE9MxHaV4Nk7FXLQijbnIoxZZtOJMtKIdWbFHVaMZWVSiHY1oRhrHoxonIo3JmImZmIo0spiIM9GIpajHfMxGpWjlfFwotvvUun7d/7XnfvTCrz9+pzN9LWhyi4EknQ9znaA/bxG0Id3fQP7vRIz09u5dyUnskn03+Kru0Ds33LqrRf4fvdPdAAAAAG6jpPj2PYmIsXigmJrLa9mX7nS3AAAAgB1U/K75UKcY60w9EEnn+L+0SeSHu943AAAAYGckxTl2SUSMx4Pdqf7pUpt9CQAAAAD8Gyr+/f9wpxiPeLOocPwPAAAAnzHfGHaN/Y/29K6x21rcm/zkT9FsjiVXFk8/lFyqdOIql+7qLtcrvnitxfbcwWR/r5GimB69fE8SEaPV7FDSv/rlP/d2y0+Kx4OrFyAcdq3/ZJsOxNYdKJ7Ft+NIN+bIuW55rj+nu5bxubyWTVQbtScmk96XI+3XXrzwlSiG/836wv4kzl9YWZ54/qWVc0VfrnRauXKpd3n4pL9URPeEii36crW3BeKBzUc8VpyI0VvveHe9pcHx964mO7L1+JPBdb4VR7sxR8e75fja8e/rrHNy4onJqFT2j7Sz0+3Xrg6MvteLydWR7+2PNrmBV+GtONaNOXb8WLfYpBflNb14cWMvyoPb//q2xXX34p0jb57+688bSTa1XS+mbrEXAHfK+eKqP6tZ6O4iC/3jalcnoa3Lu3f3l7yRd7nzq58y+ssP5LrR2JDd05vJ7m/F8W7M8e7nidGDm+SV0ibv6C9fePkXvXf0R9/7/g++fPiXH6zL6zfQi/fiRDemV8R9PxuSYztj/s66rPpuZ4l3h663VSsnr++dGku6Nx+Kyw9fuHT2heUXll8sl6emS4+WSo+VY6z4qNArhvRU5gH4z7bdPXY++Oq10GF34Uke3eao+r5rPymYiOfjpViJc3GyONsgIh7cvNXxgZ8hnNzmqHV84A4vJ7c5tlyNLa+P3XssiSGxUwNb7P++VxR/u00vCADsgqPb5OEk7u3Of/2/ekusi7grSU5uc9y9Npef6N44t390HMNz+aDf98rP3/YtAgCffVnzk2S8/XbSbOaLz07OzExW2qeytNmoPpM289n5LM3r7axZPVWpz2fpYrPRblT7Xx3PZq20tbS42Gi207lGM11stPLTxZ3f096t31vZQqXezqutxVpWaWVptVFvV6rtdDZvVdPFpadqeetU1iwWbi1m1Xwur1baeaOethpLzWo2kaatLBsIzGezejufy7OxNK+ni818odK8EhG1pYUsnc1a1Wa+2G50G+yvK6/PNZoLRbMTG4f/h93e3gDwafDqG5cvnl1ZWX7l5iZ+ez3Bd3qMAMBasjQAAAAAAAAAAAAAAHz6bTxdr1N7QycCjsVNnz746t64lbMPP3sTn3u/+7LsRIO30s7da17TPb2d5c5vnxueeO7JJy+u1iSjg5v3qTcPnPpdFv3RbdHO5v+nbHaq69v7I/b88Lvdmi8MCU5Gd3ikH0bETSx+NdkiZvffiwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgO/8KAAD//wifUTs=") ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r10) 2m31.736298716s ago: executing program 32 (id=1067): r0 = socket$inet6(0xa, 0x3, 0x5) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@dev, 0x400, 0x0, 0xff, 0x1}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x4001, 0x3, 0x3e8, 0x0, 0x0, 0x148, 0x0, 0x148, 0x350, 0x240, 0x240, 0x350, 0x240, 0x7fffffe, 0x0, {[{{@ip={@private=0xa010102, @local, 0x0, 0x0, 'ip6gretap0\x00', 'nicvf0\x00', {}, {}, 0x88, 0x3, 0x10}, 0x0, 0xf8, 0x158, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'wg1\x00', {0x0, 0x0, 0x1ff, 0x100000, 0x0, 0xed, 0x7}}}, @common=@unspec=@connmark={{0x30}, {0xfffffff9, 0x8}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0x85d, 0xf, [0x10, 0x32, 0x1e, 0x32, 0x2b, 0x25, 0x3f, 0x17, 0x19, 0x22, 0x2c, 0x3d, 0x7, 0x3f, 0x1e, 0x31], 0x0, 0x2, 0x2}}}, {{@ip={@rand_addr=0x64010101, @local, 0xff, 0x0, 'wg0\x00', 'lo\x00', {0xff}, {}, 0x2e, 0x3, 0x4}, 0x0, 0x190, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x8, 0x9, 0x1, 0x1, 'syz1\x00', 0x2}}, @inet=@rpfilter={{0x28}, {0x8}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0xfff, 0x7e, 0x1c, 'netbios-ns\x00', 'syz0\x00', {0x3}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x8, 0x3, 0x3f0, 0xc8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x320, 0xffffffff, 0xffffffff, 0x320, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x33}, 0x0, 0x238, 0x258, 0x0, {}, [@common=@unspec=@quota={{0x38}, {0x1, 0x0, 0x7, {0x4}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x7, 0x69, 0x4, 0x0, 0x1000, 0x6, 0x3}}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x450) unshare(0x28000600) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xe7fd}, 0x100002, 0x3, 0xfffffffc, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x48844) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000014", @ANYRES32=0x0, @ANYRES32], 0x50) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0e0000000400000004000000020000000000", @ANYBLOB='\x00\x00', @ANYRESHEX], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r4, &(0x7f0000000100), &(0x7f0000000000), 0x2}, 0x20) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831371900000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000001f80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002a20702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000001600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001811", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unshare(0x6a040000) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=@newnexthop={0x24, 0x68, 0x1, 0x2, 0x7ffffffc, {}, [@NHA_GROUP={0xc, 0x2, [{0x1, 0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x24008000}, 0x4000) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000280)={0x0, 0xfffffffffffffda3, &(0x7f0000000180)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x20}}, 0x4000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x18) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8, &(0x7f0000000580), 0x5, 0x4f3, &(0x7f00000005c0)="$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") mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='kfree\x00', r5}, 0x18) 2m21.692341657s ago: executing program 33 (id=1073): bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB, @ANYBLOB, @ANYRES32=0x0], 0x50) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000007c0)=ANY=[@ANYBLOB="020000000000000002000000e000000200e70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000200fffc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x190) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x4e23, @multicast2}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000100000000000010080000000040"], 0x0, 0x26}, 0x28) r2 = socket(0x28, 0x4, 0x9) accept4$llc(r2, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000400)=0x10, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000010000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4, 0x0, 0x1}, 0x18) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) r5 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x800) ioctl$SG_GET_VERSION_NUM(r5, 0x2284, &(0x7f0000000080)) 2m19.790021171s ago: executing program 34 (id=1074): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d0000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x18) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x4, {{0x2, 0x4e21, @multicast1}}}, 0x88) getsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x24b) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000000)=0x1ff, 0x4) r3 = socket$netlink(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socket$inet_mptcp(0x2, 0x1, 0x106) syz_io_uring_setup(0x4e0, 0x0, &(0x7f0000000640), 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5}, &(0x7f0000000000), 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) sendmsg$DEVLINK_CMD_RATE_NEW(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000fbdbdf25250000000e0001006e657464657673696d0000000f0002006e657464657673697d300000"], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) pipe2(&(0x7f0000000340), 0x80) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000380)=ANY=[@ANYRES64=r0], 0xa8}, 0x1, 0x0, 0x0, 0x40c0850}, 0x24000850) sendto$inet(r2, 0x0, 0xffef, 0x20000000, &(0x7f0000000240)={0x2, 0x4e24, @rand_addr=0x64010102}, 0xfffffffffffffee3) setsockopt$inet_int(r2, 0x0, 0xb, 0x0, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r8, 0x8982, &(0x7f0000000400)={0x0, 'batadv0\x00', {0x5}}) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000300020400bf050005001206", 0x2e}, {&(0x7f0000000580)="c9c58fea294c", 0x6}, {&(0x7f0000000740)="21e2a95627016c4fa3cc0084aedf7016d5dfa8d0e092dc697e905d748bf60e463593ade44c516d4618fc8c60a45f71a79b702f44115ef1292fcdeaa2ea7962362327e8fd8538853f06c05ffa329fd11ed25382cf73050ebc930ae7b90c7c1e98f2d6968346effcf4063a6338ab5e9786bf9794462087dac471d33d15808c62bcec5e1a99e316c1e426bca7a0c0b3072ee8bb33d0b1aade767a25ab93dc352956635d0287d78b3aa129648d237c06791f0c4212e167ebb766b51bd95b64926067982b9bcda3bd", 0xc6}, {&(0x7f0000000600)="9bb4bd1176309bcde6", 0x9}, {&(0x7f0000000680)="da1d3bb684ddf436bdb8", 0xa}, {&(0x7f00000006c0)="2d2d642a9476a1", 0x7}], 0x6}, 0x48000) 2m17.462802727s ago: executing program 35 (id=1076): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) unshare(0x20000400) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc, 0x1ffffffff}, 0x116863, 0x4, 0xfffffffc, 0x5, 0x0, 0x88}, 0xffffffffffffffff, 0x1000003, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000980)='mm_page_free\x00', r3, 0x0, 0x3}, 0x18) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="9000000010000305000000000000000000000700", @ANYRES32=0x0, @ANYBLOB="996e06004d4c0700540012800800010068737200480002800500030008000000050003000500000005000300fd00000008000200", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5], 0x90}}, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x20000000ec072, 0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26}, 0x20) ioctl$BTRFS_IOC_BALANCE_CTL(r1, 0x40049421, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) sendto$inet6(r9, &(0x7f0000000000)="aa", 0xffe0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x6}, 0x3}, 0x1c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r6, 0x20, &(0x7f0000000140)={0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffffe}}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r10}, 0x18) syz_emit_ethernet(0x6a, &(0x7f0000000240)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @dev, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0xffff, 0x0, 0x8, 0x2f, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x22eb, 0x0, 0x0, [0x5, 0x1]}, {0x0, 0x0, 0x0, 0x0, 0x11}, {}, {0xa888, 0x88be, 0x8000000, {{0x0, 0x1, 0x57}}}, {0x8, 0x22eb, 0x0, {{}, 0x2, {0x9}}}}}}}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000cc0), &(0x7f0000000180)='./file3\x00', 0x1004081, &(0x7f0000000500)=ANY=[@ANYRES16=0x0, @ANYRES32], 0x10, 0x7f4, &(0x7f0000000d80)="$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") ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r10) 53.431468839s ago: executing program 4 (id=1100): syz_open_dev$vcsu(&(0x7f0000000400), 0x1, 0x220081) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_io_uring_setup(0x497, &(0x7f0000000400)={0x0, 0x717e, 0x100, 0x14, 0x37a}, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r1, 0x3516, 0x0, 0x0, 0x0, 0x0) syz_usb_connect(0x3, 0x3b9, &(0x7f0000000000)=ANY=[], 0x0) 48.546303825s ago: executing program 4 (id=1101): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) r1 = syz_io_uring_setup(0x1104, &(0x7f00000004c0)={0x0, 0xffffffdd, 0x1000, 0xfffffffe, 0xcb}, &(0x7f00000003c0)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1fc, 0x0, 0x1}) io_uring_enter(r1, 0x47fa, 0xfd5d, 0x200000000000000, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000a40)={0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x2, r4, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x40032043, 0x1}) syz_usb_control_io$printer(0xffffffffffffffff, 0x0, 0x0) 41.91247626s ago: executing program 4 (id=1102): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in, @in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x0, 0x2, 0x0, 0x2}, {0xfffffffffffffffe, 0xffffffffffffffff}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}}, 0xb8}}, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x1c) 31.230038125s ago: executing program 4 (id=1103): bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="07000000040000008000000004000000280000", @ANYBLOB, @ANYRES32=0x0], 0x50) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000007c0)=ANY=[@ANYBLOB="020000000000000002000000e000000200e70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000200fffc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x190) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x4e23, @multicast2}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000100000000000010080000000040"], 0x0, 0x26}, 0x28) r2 = socket(0x28, 0x4, 0x9) accept4$llc(r2, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000400)=0x10, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000010000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4, 0x0, 0x1}, 0x18) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) r5 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x800) ioctl$SG_GET_VERSION_NUM(r5, 0x2284, &(0x7f0000000080)) 20.594627836s ago: executing program 4 (id=1104): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000001840)={0x1, &(0x7f0000001880)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000001340)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000002c0)="6321a1780e3fe8d9098f1f28f3c1f1895857b6b4afebba414b5998fa7c73702eb715d85b6a7709a53bf91325a9fbf7387371592c3533a8a34a28e9364405bb05cdeedb9ddfbe45a6933c33e5019991d691e8e8817a584f5392630d34c12a00aac5c546266df9fbb755447a0ff32acb32fc4b9c54b7fa15f82a9848478df5354f7158ece711c634aead9f427b8a3e580b3bd0920814473069f285753c945e0baa9072f76c542acf2986649075a243126f6d736b8bfa9a88672388eaa7902fc6c9a3c1b2781d", 0xc5}], 0x1}}], 0x1, 0x20000001) recvmmsg(r0, 0x0, 0x0, 0x100, 0x0) sendmmsg$sock(r0, &(0x7f0000004bc0)=[{{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000280)="893aa000c21f858ab40be89578b329ab89dd4cee7b796b2ba8c3703248df26a20dba4361f2f837565f07c93ff2c15760b3dd", 0x32}, {&(0x7f0000001bc0)="8efd2a7d5d93d6124b3e96620aa50701d902fd1765ad3e31512652a6e5db71041917d5df3e1cf4acee6773dd4cc5241476f21f0b322c327f9a385b892d453c7aebc76eb9831290f15f103a2e8508aae1359a0c8e81476d54f66580730f03e34223ea576f6cf6a25baaf47c586f1a3248d47b370a0fda288c4529c6e03ac9eeff668875c0174ba1e98af40e71828a505deee77c", 0x93}], 0x2}}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e80)="781f30d8968ec2504fc92612b7086c7fccc301e0c11dfc91f5c557025e65691df9407a901b", 0x25}], 0x1}}], 0x2, 0x44000) 16.503576792s ago: executing program 4 (id=1105): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$can_raw(0x1d, 0x3, 0x1) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000200)=[r1, r1, r2, r1, r1, r1, r0, r0, r1, 0xffffffffffffffff], 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000280)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0xfffe, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5c}, 0x1c) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r5}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r7, 0x0) r8 = gettid() process_vm_writev(r8, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002540)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x94) r9 = io_uring_setup(0x17f8, &(0x7f0000000080)={0x0, 0x94ec, 0x0, 0x1, 0x33d}) r10 = socket$nl_route(0x10, 0x3, 0x0) pwritev2(r10, &(0x7f00000003c0)=[{&(0x7f00000000c0)="e489bcdd", 0x4}], 0x1, 0xfffffffc, 0xb, 0x10) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000700)=ANY=[@ANYBLOB="0c0400001000010400000000000000000048000045f262bb85c26817cfa2cf2c0295f699b9ba232440016d9e8c239e81f3657fae8d0171a5f549fa1f7f154f3a2837a3ba1d2100ceab481f42b0a922c3e0d3154ead2f2f7627b6", @ANYRES32=r10, @ANYBLOB="10100000000000000800200005000000e4031680a40001800c00070000000000adffffff0c00", @ANYRES16=r10, @ANYRES64=r6, @ANYRESOCT=r9], 0x40c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0x3200010, &(0x7f00000003c0)={[{@bh}, {@nobh}]}, 0x5, 0x52c, &(0x7f0000000c00)="$eJzs3UFvI1cdAPD/TOJsdjeLU0CoVKJUtGi3grU3DW0jhKBc4FQJWO5LSLxRtHa8ip2yiSpIxTdASCBx4sQFiQ+AVO0BcUaVKsEFcUCAQAi2cECidJDHY8g64yRtnbiNfz/prd97npn/e2/l55nxZCaAqfVERLwQETNx5aH6tEix30+95d548PJaLyWRZTf/lkRS1A3W6ZVnI+Jysdp8RHztyxHfTA7H7ezu3VltNhvbRbnebd2td3b3rm+2VjcaG42t5eWl51aeX3l25UZWeFf9XBxkfvKlz7/66W/9/tZfrn2716zPfSQqMdSPcep3vZKPxUBvjLZPI9gEzBT9qUy6IQAAnEhvH/+DEfGJiHg6qjGT780NmZlEywAAAIBxyb6wEG8mERkAAABwbqURsRBJWiuuBViINJ0rzg18OC6lzXan+6nb7Z2t9d57EYtRSW9vNhs3IqLaLye98lJxje2g/MxQeTkiHomI71cv5uXaWru5PuFzHwAAADAtLg8d//+zmub545X8nQAAAADw3rU4sgAAAACcFw75AQAA4PwbPv5/dULtAAAAAE7FV158sZeywfOv11/a3bnTfun6eqNzp9baWauttbfv1jba7Y38nn2t47bXbLfvfia2du7Vu41Ot97Z3bvVau9sdW9tPvQIbAAAAOAMPfLx+79JImL/sxfzFMV9AAEe8sdJNwAYp5lJNwCYGHfxhulVGWTmJtsOYHKSY9538Q4AALz/Xf3o4d//B6cCKhNtGXDaXOsDANPH7/8wvSquAISplkbEB/rZC6OWGfn7/69OGiXLIl6rHqxxfhEAAM7WQp6StFYcByxEmtZqEVfyYiW5vdls3CiOD35drVzolZfyNZNjrxkGAAAAAAAAAAAAAAAAAAAAAAAAAPqyLIkMAAAAONci0j8n+d38I65Wn1oYPj8wl/yrGn8qCj+6+YN7q93u9lKv/u/5s7zmIqL7w5uVvP6ZkY8PAwAAAMYt2R/5Vv84vXhdOtNWAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAF3njw8tognWXcv34xIhbL4s/GfP46H5WIuPSPJGYPrJdExMwY4u+/EhGPlsVP4q0syxaLVpTFv3jK8RfzoSmPn0bE5THEh2l2vzf/vFD2+Uvjify1/PM3W6R3a/T8lxaRH83nubL558qhrbVKYzz2+s/qI+O/EvHYbPn8M5h/kxHxnzy0tX9nWXY4xje+vrc3Kn7244irpd8/yUOx6t3W3Xpnd+/6Zmt1o7HR2FpeXnpu5fmVZ1du1G9vNhvFv6Uxvvexn791VP8vlcT/3W/78+9R/X9q1EaH/Of1ew8+1M9WyuJfe7L0+3c+RsRPi+++Txb53vu9McyK0b86FOPxn772+FH9Xx8x/iX//xcO9v/aCfv/9Fe/+4cTLgoAnIHO7t6d1WazsX1EZv4Ey7zTTHJqWz4+84v5Mw6ajGM72XfiwLmPCQ3dGDK9Pdf/1/R7dbDmvZDJ3uZab2ZZVtTcf3uxZuIdNnXutPo+wUkJAAA4Fb/8307/pFsCAAAAAAAAAAAAAAAAAAAA0+ssbqU2HHN/Ml0FAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADjSfwMAAP//KQjhrw==") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r3}, 0x18) 0s ago: executing program 36 (id=1105): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$can_raw(0x1d, 0x3, 0x1) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000200)=[r1, r1, r2, r1, r1, r1, r0, r0, r1, 0xffffffffffffffff], 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000280)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0xfffe, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5c}, 0x1c) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r5}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r7, 0x0) r8 = gettid() process_vm_writev(r8, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002540)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x94) r9 = io_uring_setup(0x17f8, &(0x7f0000000080)={0x0, 0x94ec, 0x0, 0x1, 0x33d}) r10 = socket$nl_route(0x10, 0x3, 0x0) pwritev2(r10, &(0x7f00000003c0)=[{&(0x7f00000000c0)="e489bcdd", 0x4}], 0x1, 0xfffffffc, 0xb, 0x10) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000700)=ANY=[@ANYBLOB="0c0400001000010400000000000000000048000045f262bb85c26817cfa2cf2c0295f699b9ba232440016d9e8c239e81f3657fae8d0171a5f549fa1f7f154f3a2837a3ba1d2100ceab481f42b0a922c3e0d3154ead2f2f7627b6", @ANYRES32=r10, @ANYBLOB="10100000000000000800200005000000e4031680a40001800c00070000000000adffffff0c00", @ANYRES16=r10, @ANYRES64=r6, @ANYRESOCT=r9], 0x40c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0x3200010, &(0x7f00000003c0)={[{@bh}, {@nobh}]}, 0x5, 0x52c, &(0x7f0000000c00)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r3}, 0x18) kernel console output (not intermixed with test programs): al port ptm0 [ 75.325790][ T5457] EXT4-fs error (device loop2): ext4_dirty_inode:6502: inode #3: comm syz.2.631: mark_inode_dirty error [ 75.339794][ T5457] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #3: comm syz.2.631: corrupted inode contents [ 75.351763][ T5457] EXT4-fs error (device loop2): __ext4_ext_dirty:206: inode #3: comm syz.2.631: mark_inode_dirty error [ 75.363412][ T5457] __quota_error: 345 callbacks suppressed [ 75.363445][ T5457] Quota error (device loop2): write_blk: dquota write failed [ 75.376923][ T5457] Quota error (device loop2): qtree_write_dquot: Error -117 occurred while creating quota [ 75.387347][ T5457] EXT4-fs error (device loop2): ext4_acquire_dquot:6986: comm syz.2.631: Failed to acquire dquot type 0 [ 75.405860][ T5457] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #16: comm syz.2.631: corrupted inode contents [ 75.418336][ T5457] EXT4-fs error (device loop2): ext4_dirty_inode:6502: inode #16: comm syz.2.631: mark_inode_dirty error [ 75.431029][ T5473] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 75.443930][ T5473] ext4 filesystem being mounted at /128/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 75.459682][ T5473] EXT4-fs (loop1): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 75.468231][ T5457] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #16: comm syz.2.631: corrupted inode contents [ 75.480264][ T5457] EXT4-fs error (device loop2): __ext4_ext_dirty:206: inode #16: comm syz.2.631: mark_inode_dirty error [ 75.491716][ T5457] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #16: comm syz.2.631: corrupted inode contents [ 75.503814][ T5457] EXT4-fs error (device loop2) in ext4_orphan_del:303: Corrupt filesystem [ 75.512990][ T5457] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #16: comm syz.2.631: corrupted inode contents [ 75.525282][ T5457] EXT4-fs error (device loop2): ext4_truncate:4635: inode #16: comm syz.2.631: mark_inode_dirty error [ 75.537023][ T5457] EXT4-fs error (device loop2) in ext4_process_orphan:345: Corrupt filesystem [ 75.546862][ T5457] EXT4-fs (loop2): 1 truncate cleaned up [ 75.553028][ T5457] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 75.565659][ T5457] ext4 filesystem being mounted at /124/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 75.612662][ T3313] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 75.627090][ T3322] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 75.652118][ T5484] netlink: 32 bytes leftover after parsing attributes in process `syz.1.642'. [ 75.661059][ T5484] netlink: 32 bytes leftover after parsing attributes in process `syz.1.642'. [ 75.791813][ C0] blk_print_req_error: 29 callbacks suppressed [ 75.791829][ C0] I/O error, dev loop8, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 75.807605][ C0] buffer_io_error: 29 callbacks suppressed [ 75.807616][ C0] Buffer I/O error on dev loop8, logical block 0, async page read [ 75.821378][ C1] I/O error, dev loop8, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 75.830981][ C1] Buffer I/O error on dev loop8, logical block 0, async page read [ 75.839148][ T5495] loop8: unable to read partition table [ 75.845227][ T5495] loop_reread_partitions: partition scan of loop8 (úùƒå¡™‰ü¾CêjÌ–ã¢P=ý?ã}X‹ºÐ œë) failed (rc=-5) [ 75.867983][ C1] I/O error, dev loop8, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 75.877581][ C1] Buffer I/O error on dev loop8, logical block 0, async page read [ 76.065137][ C1] I/O error, dev loop8, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 76.074744][ C1] Buffer I/O error on dev loop8, logical block 0, async page read [ 76.100436][ C1] I/O error, dev loop8, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 76.110093][ C1] Buffer I/O error on dev loop8, logical block 0, async page read [ 76.134250][ C1] I/O error, dev loop8, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 76.143861][ C1] Buffer I/O error on dev loop8, logical block 0, async page read [ 76.158672][ C1] I/O error, dev loop8, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 76.168270][ C1] Buffer I/O error on dev loop8, logical block 0, async page read [ 76.216301][ T5496] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.244273][ T29] audit: type=1400 audit(1768194694.041:2592): avc: denied { watch watch_reads } for pid=5505 comm="syz.0.652" path="/131" dev="tmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 76.280913][ T5508] EXT4-fs: inline encryption not supported [ 76.300488][ T5508] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.332245][ T29] audit: type=1400 audit(1768194694.131:2593): avc: denied { map_create } for pid=5517 comm="syz.2.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 76.366993][ T5518] ext4: Unknown parameter 'noacl' [ 76.370676][ T5519] netlink: 1004 bytes leftover after parsing attributes in process `syz.3.654'. [ 76.381622][ T3313] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 76.413363][ T29] audit: type=1400 audit(1768194694.131:2594): avc: denied { map_read map_write } for pid=5517 comm="syz.2.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 76.433219][ T29] audit: type=1400 audit(1768194694.131:2595): avc: denied { prog_load } for pid=5517 comm="syz.2.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 76.452335][ T29] audit: type=1400 audit(1768194694.131:2596): avc: denied { bpf } for pid=5517 comm="syz.2.655" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 76.472803][ T29] audit: type=1400 audit(1768194694.131:2597): avc: denied { perfmon } for pid=5517 comm="syz.2.655" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 76.493744][ T29] audit: type=1400 audit(1768194694.131:2598): avc: denied { prog_run } for pid=5517 comm="syz.2.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 76.501948][ T5519] EXT4-fs: Ignoring removed bh option [ 76.512670][ T29] audit: type=1400 audit(1768194694.151:2599): avc: denied { unmount } for pid=3313 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 76.518053][ T5519] EXT4-fs: Ignoring removed nobh option [ 76.556941][ T5525] netlink: 28 bytes leftover after parsing attributes in process `syz.1.658'. [ 76.571089][ T5519] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #3: comm syz.3.654: corrupted inode contents [ 76.589498][ T5519] EXT4-fs error (device loop3): ext4_dirty_inode:6502: inode #3: comm syz.3.654: mark_inode_dirty error [ 76.601532][ T5519] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #3: comm syz.3.654: corrupted inode contents [ 76.613800][ T5519] EXT4-fs error (device loop3): __ext4_ext_dirty:206: inode #3: comm syz.3.654: mark_inode_dirty error [ 76.625493][ T5519] EXT4-fs error (device loop3): ext4_acquire_dquot:6986: comm syz.3.654: Failed to acquire dquot type 0 [ 76.637580][ T5519] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #16: comm syz.3.654: corrupted inode contents [ 76.649795][ T5519] EXT4-fs error (device loop3): ext4_dirty_inode:6502: inode #16: comm syz.3.654: mark_inode_dirty error [ 76.661250][ T5519] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #16: comm syz.3.654: corrupted inode contents [ 76.673442][ T5519] EXT4-fs error (device loop3): __ext4_ext_dirty:206: inode #16: comm syz.3.654: mark_inode_dirty error [ 76.684836][ T5519] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #16: comm syz.3.654: corrupted inode contents [ 76.697015][ T5519] EXT4-fs error (device loop3) in ext4_orphan_del:303: Corrupt filesystem [ 76.707780][ T5519] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #16: comm syz.3.654: corrupted inode contents [ 76.720479][ T5519] EXT4-fs error (device loop3): ext4_truncate:4635: inode #16: comm syz.3.654: mark_inode_dirty error [ 76.732076][ T5519] EXT4-fs error (device loop3) in ext4_process_orphan:345: Corrupt filesystem [ 76.735441][ C0] I/O error, dev loop8, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 76.741355][ T5519] EXT4-fs (loop3): 1 truncate cleaned up [ 76.750535][ C0] Buffer I/O error on dev loop8, logical block 0, async page read [ 76.756894][ T5519] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.764142][ C0] I/O error, dev loop8, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 76.777175][ T5519] ext4 filesystem being mounted at /123/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 76.785906][ C0] Buffer I/O error on dev loop8, logical block 0, async page read [ 76.805029][ T3722] loop8: unable to read partition table [ 76.812379][ C0] I/O error, dev loop8, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 76.821972][ C0] Buffer I/O error on dev loop8, logical block 0, async page read [ 76.829914][ T5533] loop8: unable to read partition table [ 76.836819][ T5533] loop_reread_partitions: partition scan of loop8 (úùƒå¡™‰ü¾CêjÌ–ã¢P=ý?ã}X‹ºÐ œë) failed (rc=-5) [ 76.858712][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 76.883348][ T5536] netlink: 8 bytes leftover after parsing attributes in process `syz.3.662'. [ 76.909950][ T5539] set_capacity_and_notify: 7 callbacks suppressed [ 76.909983][ T5539] loop3: detected capacity change from 0 to 1024 [ 76.923596][ T5539] EXT4-fs: inline encryption not supported [ 76.939534][ T5539] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.963367][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 77.131679][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 77.379376][ T5571] loop0: detected capacity change from 0 to 1024 [ 77.384269][ T5572] loop2: detected capacity change from 0 to 512 [ 77.404144][ T5571] EXT4-fs: inline encryption not supported [ 77.414076][ T5572] EXT4-fs error (device loop2): ext4_orphan_get:1391: inode #15: comm syz.2.675: inode has both inline data and extents flags [ 77.443534][ T5572] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.675: couldn't read orphan inode 15 (err -117) [ 77.460251][ T5571] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 77.467155][ T5572] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 77.508089][ T5572] EXT4-fs error (device loop2): ext4_mb_generate_buddy:1306: group 0, block bitmap and bg descriptor inconsistent: 7934 vs 220 free clusters [ 77.529068][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 77.554234][ T3322] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 78.059017][ T5597] loop0: detected capacity change from 0 to 512 [ 78.068063][ T5597] ext4: Unknown parameter 'noacl' [ 78.247299][ T5609] loop3: detected capacity change from 0 to 512 [ 78.264375][ T5609] EXT4-fs error (device loop3): ext4_orphan_get:1391: inode #15: comm syz.3.690: inode has both inline data and extents flags [ 78.293734][ T5609] EXT4-fs error (device loop3): ext4_orphan_get:1396: comm syz.3.690: couldn't read orphan inode 15 (err -117) [ 78.342176][ T5613] loop1: detected capacity change from 0 to 1024 [ 78.390194][ T5613] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 78.426787][ T5609] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 78.528957][ T5609] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1306: group 0, block bitmap and bg descriptor inconsistent: 7934 vs 220 free clusters [ 78.742435][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 79.050594][ T3313] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 79.081994][ T5621] loop2: detected capacity change from 0 to 512 [ 79.099826][ T5633] serio: Serial port ptm0 [ 79.132783][ T5621] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 79.145482][ T5621] ext4 filesystem being mounted at /132/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 79.203758][ T3322] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 79.217618][ T5645] __nla_validate_parse: 5 callbacks suppressed [ 79.217671][ T5645] netlink: 8 bytes leftover after parsing attributes in process `syz.0.700'. [ 79.232769][ T5645] netlink: 8 bytes leftover after parsing attributes in process `syz.0.700'. [ 79.256035][ T5633] serio: Serial port ptm0 [ 79.411047][ T5656] netlink: 12 bytes leftover after parsing attributes in process `syz.2.705'. [ 79.423389][ T5654] loop3: detected capacity change from 0 to 512 [ 79.449306][ T5654] ext4: Unknown parameter 'noacl' [ 79.814011][ T5665] loop2: detected capacity change from 0 to 1024 [ 79.940971][ T5665] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 80.365736][ T5680] netlink: 8 bytes leftover after parsing attributes in process `syz.4.712'. [ 80.374558][ T5680] netlink: 8 bytes leftover after parsing attributes in process `syz.4.712'. [ 80.596888][ T5684] loop1: detected capacity change from 0 to 1024 [ 80.604459][ T29] kauditd_printk_skb: 260 callbacks suppressed [ 80.610655][ T29] audit: type=1400 audit(1768194698.191:2858): avc: denied { watch watch_reads } for pid=5681 comm="syz.3.713" path="/135" dev="tmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 80.633557][ T29] audit: type=1400 audit(1768194698.201:2859): avc: denied { open } for pid=5673 comm="syz.0.711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 80.652818][ T29] audit: type=1400 audit(1768194698.201:2860): avc: denied { kernel } for pid=5673 comm="syz.0.711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 80.738980][ T3322] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 80.809057][ T29] audit: type=1400 audit(1768194698.521:2861): avc: denied { module_request } for pid=5673 comm="syz.0.711" kmod="ip6t_" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.830228][ T29] audit: type=1400 audit(1768194698.531:2862): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 80.849904][ T29] audit: type=1400 audit(1768194698.551:2863): avc: denied { read write } for pid=3322 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 80.874129][ T29] audit: type=1400 audit(1768194698.551:2864): avc: denied { open } for pid=3322 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 80.898297][ T29] audit: type=1400 audit(1768194698.551:2865): avc: denied { ioctl } for pid=3322 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=102 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 80.923935][ T29] audit: type=1400 audit(1768194698.581:2866): avc: denied { map_create } for pid=5690 comm="syz.2.714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 80.943159][ T29] audit: type=1400 audit(1768194698.581:2867): avc: denied { map_read map_write } for pid=5690 comm="syz.2.714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 80.963195][ T5684] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 80.969357][ T5683] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 81.005965][ T5683] ext4 filesystem being mounted at /148/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 81.039527][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 81.078352][ T5708] ext4: Unknown parameter 'noacl' [ 82.012275][ T5729] netlink: 8 bytes leftover after parsing attributes in process `syz.0.727'. [ 82.021170][ T5729] netlink: 8 bytes leftover after parsing attributes in process `syz.0.727'. [ 82.234183][ T5740] set_capacity_and_notify: 2 callbacks suppressed [ 82.234198][ T5740] loop2: detected capacity change from 0 to 1024 [ 82.574488][ T5757] netlink: 12 bytes leftover after parsing attributes in process `syz.0.736'. [ 82.611310][ T5759] loop0: detected capacity change from 0 to 512 [ 82.620603][ T5759] ext4: Unknown parameter 'noacl' [ 82.632216][ T5739] loop1: detected capacity change from 0 to 512 [ 82.656242][ T5739] ext4 filesystem being mounted at /153/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 82.667871][ T5739] EXT4-fs (loop1): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 82.726856][ T5766] netlink: 8 bytes leftover after parsing attributes in process `syz.4.740'. [ 82.735773][ T5766] netlink: 8 bytes leftover after parsing attributes in process `syz.4.740'. [ 82.824388][ T5776] serio: Serial port ptm1 [ 82.904299][ T5782] loop2: detected capacity change from 0 to 1024 [ 82.911757][ T5782] EXT4-fs: inline encryption not supported [ 82.986340][ T5776] serio: Serial port ptm1 [ 83.483853][ T5798] loop0: detected capacity change from 0 to 512 [ 83.490881][ T5798] ext4: Unknown parameter 'noacl' [ 83.946471][ T5808] loop1: detected capacity change from 0 to 512 [ 84.033870][ T5818] loop4: detected capacity change from 0 to 1024 [ 84.127135][ T5808] ext4 filesystem being mounted at /157/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 84.229693][ T5808] EXT4-fs (loop1): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 84.280759][ T5828] loop2: detected capacity change from 0 to 128 [ 84.793520][ T5869] __nla_validate_parse: 2 callbacks suppressed [ 84.793535][ T5869] netlink: 28 bytes leftover after parsing attributes in process `syz.2.770'. [ 84.808746][ T5869] netlink: 28 bytes leftover after parsing attributes in process `syz.2.770'. [ 84.929019][ T5870] loop2: detected capacity change from 0 to 764 [ 84.948824][ T5870] rock: corrupted directory entry. extent=32, offset=2044, size=237 [ 85.474028][ T5886] serio: Serial port ptm0 [ 85.656397][ T5886] serio: Serial port ptm0 [ 85.670929][ T29] kauditd_printk_skb: 409 callbacks suppressed [ 85.670944][ T29] audit: type=1400 audit(1768194703.471:3268): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 85.771198][ T5897] loop4: detected capacity change from 0 to 1024 [ 86.057663][ T5907] ext4: Unknown parameter 'noacl' [ 86.141847][ T29] audit: type=1400 audit(1768194703.561:3269): avc: denied { allowed } for pid=5893 comm="syz.4.780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 86.161201][ T29] audit: type=1400 audit(1768194703.561:3270): avc: denied { create } for pid=5893 comm="syz.4.780" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 86.182369][ T29] audit: type=1400 audit(1768194703.561:3271): avc: denied { map } for pid=5893 comm="syz.4.780" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=12312 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 86.206501][ T29] audit: type=1400 audit(1768194703.561:3272): avc: denied { read write } for pid=5893 comm="syz.4.780" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=12312 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 86.231194][ T29] audit: type=1400 audit(1768194703.571:3273): avc: denied { mounton } for pid=5893 comm="syz.4.780" path="/152/file1" dev="tmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.253699][ T29] audit: type=1400 audit(1768194703.661:3274): avc: denied { mount } for pid=5893 comm="syz.4.780" name="/" dev="loop4" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.275390][ T29] audit: type=1400 audit(1768194703.721:3275): avc: denied { read write } for pid=5882 comm="syz.0.775" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 86.299630][ T29] audit: type=1400 audit(1768194703.721:3276): avc: denied { open } for pid=5882 comm="syz.0.775" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 86.324597][ T29] audit: type=1400 audit(1768194703.901:3277): avc: denied { create } for pid=5906 comm="syz.1.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 86.917932][ T5927] netlink: 28 bytes leftover after parsing attributes in process `syz.1.791'. [ 86.926980][ T5927] netlink: 28 bytes leftover after parsing attributes in process `syz.1.791'. [ 86.952149][ T5929] serio: Serial port ptm0 [ 87.082571][ T5932] rock: corrupted directory entry. extent=32, offset=2044, size=237 [ 87.106554][ T5929] serio: Serial port ptm0 [ 87.571801][ T5948] set_capacity_and_notify: 2 callbacks suppressed [ 87.571887][ T5948] loop4: detected capacity change from 0 to 1024 [ 88.008836][ T5956] loop1: detected capacity change from 0 to 512 [ 88.055730][ T5956] ext4 filesystem being mounted at /167/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 88.293861][ T5970] loop1: detected capacity change from 0 to 512 [ 88.308499][ T5968] loop4: detected capacity change from 0 to 1024 [ 88.319952][ T5968] EXT4-fs: inline encryption not supported [ 88.414372][ T5978] serio: Serial port ptm1 [ 88.567599][ T5978] serio: Serial port ptm1 [ 88.684429][ T5988] netlink: 28 bytes leftover after parsing attributes in process `syz.0.809'. [ 88.693354][ T5988] netlink: 28 bytes leftover after parsing attributes in process `syz.0.809'. [ 88.887291][ T5988] loop0: detected capacity change from 0 to 764 [ 88.911169][ T5988] rock: corrupted directory entry. extent=32, offset=2044, size=237 [ 89.354148][ T6000] loop2: detected capacity change from 0 to 512 [ 89.393072][ T6000] ext4 filesystem being mounted at /163/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 89.537771][ T6017] loop4: detected capacity change from 0 to 1024 [ 89.570734][ T6016] serio: Serial port ptm0 [ 89.880973][ T6029] netlink: 4 bytes leftover after parsing attributes in process `syz.2.821'. [ 89.899030][ T6016] serio: Serial port ptm0 [ 89.941509][ T6029] netlink: 'syz.2.821': attribute type 1 has an invalid length. [ 89.949219][ T6029] netlink: 'syz.2.821': attribute type 2 has an invalid length. [ 89.957224][ T6029] netlink: 4 bytes leftover after parsing attributes in process `syz.2.821'. [ 90.391015][ T6041] loop2: detected capacity change from 0 to 512 [ 90.410798][ T6041] ext4 filesystem being mounted at /170/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 90.554348][ T6053] netlink: 28 bytes leftover after parsing attributes in process `syz.0.830'. [ 90.563294][ T6053] netlink: 28 bytes leftover after parsing attributes in process `syz.0.830'. [ 90.707486][ T6060] loop0: detected capacity change from 0 to 764 [ 90.775370][ T29] kauditd_printk_skb: 193 callbacks suppressed [ 90.775387][ T29] audit: type=1400 audit(1768194708.431:3471): avc: denied { create } for pid=6052 comm="syz.0.830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 90.801130][ T29] audit: type=1400 audit(1768194708.431:3472): avc: denied { write } for pid=6052 comm="syz.0.830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 90.820535][ T29] audit: type=1400 audit(1768194708.431:3473): avc: denied { connect } for pid=6052 comm="syz.0.830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 90.840075][ T29] audit: type=1400 audit(1768194708.431:3474): avc: denied { name_connect } for pid=6052 comm="syz.0.830" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 90.875074][ T6060] rock: corrupted directory entry. extent=32, offset=2044, size=237 [ 90.930967][ T29] audit: type=1400 audit(1768194708.731:3475): avc: denied { watch watch_reads } for pid=6061 comm="syz.1.831" path="/174" dev="tmpfs" ino=949 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 91.032054][ T29] audit: type=1400 audit(1768194708.831:3476): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 91.056412][ T29] audit: type=1400 audit(1768194708.831:3477): avc: denied { open } for pid=3313 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 91.095149][ T6065] loop1: detected capacity change from 0 to 1024 [ 91.119059][ T6065] EXT4-fs: inline encryption not supported [ 91.119491][ T29] audit: type=1400 audit(1768194708.851:3478): avc: denied { ioctl } for pid=3313 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=101 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 91.150819][ T29] audit: type=1400 audit(1768194708.921:3479): avc: denied { mounton } for pid=6064 comm="syz.1.832" path="/175/file1" dev="tmpfs" ino=959 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 91.179522][ T29] audit: type=1400 audit(1768194708.981:3480): avc: denied { mount } for pid=6064 comm="syz.1.832" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 91.237245][ T6072] EXT4-fs: inline encryption not supported [ 91.276830][ T6078] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 91.483391][ T6089] netlink: 1004 bytes leftover after parsing attributes in process `syz.2.841'. [ 91.497485][ T6089] EXT4-fs: Ignoring removed bh option [ 91.503044][ T6089] EXT4-fs: Ignoring removed nobh option [ 91.525471][ T6094] ext4: Unknown parameter 'noacl' [ 91.770957][ T6089] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #3: comm syz.2.841: corrupted inode contents [ 91.786172][ T6091] ext4 filesystem being mounted at /171/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 91.799298][ T6089] EXT4-fs error (device loop2): ext4_dirty_inode:6502: inode #3: comm syz.2.841: mark_inode_dirty error [ 91.812985][ T6091] EXT4-fs (loop0): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 91.822832][ T6089] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #3: comm syz.2.841: corrupted inode contents [ 91.835006][ T6089] EXT4-fs error (device loop2): __ext4_ext_dirty:206: inode #3: comm syz.2.841: mark_inode_dirty error [ 91.847180][ T6089] EXT4-fs error (device loop2): ext4_acquire_dquot:6986: comm syz.2.841: Failed to acquire dquot type 0 [ 91.859841][ T6089] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #16: comm syz.2.841: corrupted inode contents [ 91.874969][ T6089] EXT4-fs error (device loop2): ext4_dirty_inode:6502: inode #16: comm syz.2.841: mark_inode_dirty error [ 91.887296][ T6089] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #16: comm syz.2.841: corrupted inode contents [ 91.899650][ T6089] EXT4-fs error (device loop2): __ext4_ext_dirty:206: inode #16: comm syz.2.841: mark_inode_dirty error [ 91.911990][ T6089] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #16: comm syz.2.841: corrupted inode contents [ 91.924371][ T6089] EXT4-fs error (device loop2) in ext4_orphan_del:303: Corrupt filesystem [ 91.933534][ T6089] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #16: comm syz.2.841: corrupted inode contents [ 91.945932][ T6089] EXT4-fs error (device loop2): ext4_truncate:4635: inode #16: comm syz.2.841: mark_inode_dirty error [ 91.957639][ T6089] EXT4-fs error (device loop2) in ext4_process_orphan:345: Corrupt filesystem [ 91.967830][ T6089] EXT4-fs (loop2): 1 truncate cleaned up [ 91.974966][ T6089] ext4 filesystem being mounted at /172/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 92.228985][ T6109] EXT4-fs error (device loop2): ext4_orphan_get:1391: inode #15: comm syz.2.843: inode has both inline data and extents flags [ 92.242286][ T6109] EXT4-fs error (device loop2): ext4_orphan_get:1396: comm syz.2.843: couldn't read orphan inode 15 (err -117) [ 92.282636][ T6113] EXT4-fs: inline encryption not supported [ 92.290807][ T6109] EXT4-fs error (device loop2): ext4_mb_generate_buddy:1306: group 0, block bitmap and bg descriptor inconsistent: 7934 vs 220 free clusters [ 92.385980][ T6124] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 92.402384][ T6128] netlink: 28 bytes leftover after parsing attributes in process `syz.4.851'. [ 92.411292][ T6128] netlink: 28 bytes leftover after parsing attributes in process `syz.4.851'. [ 92.511804][ T6128] rock: corrupted directory entry. extent=32, offset=2044, size=237 [ 92.581358][ T6139] netlink: 1004 bytes leftover after parsing attributes in process `syz.1.853'. [ 92.705123][ T6139] set_capacity_and_notify: 8 callbacks suppressed [ 92.705138][ T6139] loop1: detected capacity change from 0 to 512 [ 92.721379][ T6143] loop4: detected capacity change from 0 to 512 [ 92.749124][ T6139] EXT4-fs: Ignoring removed bh option [ 92.754612][ T6139] EXT4-fs: Ignoring removed nobh option [ 92.781304][ T6143] ext4 filesystem being mounted at /165/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 92.820470][ T6139] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #3: comm syz.1.853: corrupted inode contents [ 92.843752][ T6139] EXT4-fs error (device loop1): ext4_dirty_inode:6502: inode #3: comm syz.1.853: mark_inode_dirty error [ 92.860634][ T6139] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #3: comm syz.1.853: corrupted inode contents [ 92.875975][ T6139] EXT4-fs error (device loop1): __ext4_ext_dirty:206: inode #3: comm syz.1.853: mark_inode_dirty error [ 92.894923][ T6139] EXT4-fs error (device loop1): ext4_acquire_dquot:6986: comm syz.1.853: Failed to acquire dquot type 0 [ 92.906668][ T6139] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #16: comm syz.1.853: corrupted inode contents [ 92.920511][ T6139] EXT4-fs error (device loop1): ext4_dirty_inode:6502: inode #16: comm syz.1.853: mark_inode_dirty error [ 92.979151][ T6152] SELinux: failed to load policy [ 92.987392][ T6139] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #16: comm syz.1.853: corrupted inode contents [ 93.013438][ T6139] EXT4-fs error (device loop1): __ext4_ext_dirty:206: inode #16: comm syz.1.853: mark_inode_dirty error [ 93.042328][ T6139] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #16: comm syz.1.853: corrupted inode contents [ 93.054591][ T6139] EXT4-fs error (device loop1) in ext4_orphan_del:303: Corrupt filesystem [ 93.063776][ T6139] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #16: comm syz.1.853: corrupted inode contents [ 93.076171][ T6139] EXT4-fs error (device loop1): ext4_truncate:4635: inode #16: comm syz.1.853: mark_inode_dirty error [ 93.087549][ T6139] EXT4-fs error (device loop1) in ext4_process_orphan:345: Corrupt filesystem [ 93.128448][ T6139] EXT4-fs (loop1): 1 truncate cleaned up [ 93.269351][ T6139] ext4 filesystem being mounted at /180/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 93.393326][ T6162] loop1: detected capacity change from 0 to 512 [ 93.400144][ T6165] loop4: detected capacity change from 0 to 512 [ 93.419198][ T6162] ext4: Unknown parameter 'noacl' [ 93.439141][ T6165] EXT4-fs error (device loop4): ext4_orphan_get:1391: inode #15: comm syz.4.860: inode has both inline data and extents flags [ 93.477968][ T6165] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.860: couldn't read orphan inode 15 (err -117) [ 93.491798][ T6165] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1306: group 0, block bitmap and bg descriptor inconsistent: 7934 vs 220 free clusters [ 93.632242][ T6182] loop2: detected capacity change from 0 to 128 [ 93.816344][ T6192] loop4: detected capacity change from 0 to 512 [ 93.840707][ T6192] ext4 filesystem being mounted at /172/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 93.938033][ T6194] SELinux: failed to load policy [ 94.065266][ T6210] netlink: 1004 bytes leftover after parsing attributes in process `syz.3.871'. [ 94.083492][ T6203] loop3: detected capacity change from 0 to 512 [ 94.090602][ T6203] EXT4-fs: Ignoring removed bh option [ 94.096214][ T6203] EXT4-fs: Ignoring removed nobh option [ 94.110918][ T6203] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #3: comm syz.3.871: corrupted inode contents [ 94.122817][ T6203] EXT4-fs error (device loop3): ext4_dirty_inode:6502: inode #3: comm syz.3.871: mark_inode_dirty error [ 94.134997][ T6203] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #3: comm syz.3.871: corrupted inode contents [ 94.146912][ T6203] EXT4-fs error (device loop3): __ext4_ext_dirty:206: inode #3: comm syz.3.871: mark_inode_dirty error [ 94.146971][ T6216] loop0: detected capacity change from 0 to 512 [ 94.158966][ T6203] EXT4-fs error (device loop3): ext4_acquire_dquot:6986: comm syz.3.871: Failed to acquire dquot type 0 [ 94.176544][ T6216] EXT4-fs error (device loop0): ext4_orphan_get:1391: inode #15: comm syz.0.875: inode has both inline data and extents flags [ 94.176631][ T6203] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #16: comm syz.3.871: corrupted inode contents [ 94.202713][ T6216] EXT4-fs error (device loop0): ext4_orphan_get:1396: comm syz.0.875: couldn't read orphan inode 15 (err -117) [ 94.203869][ T6203] EXT4-fs error (device loop3): ext4_dirty_inode:6502: inode #16: comm syz.3.871: mark_inode_dirty error [ 94.226106][ T6203] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #16: comm syz.3.871: corrupted inode contents [ 94.228287][ T6216] EXT4-fs error (device loop0): ext4_mb_generate_buddy:1306: group 0, block bitmap and bg descriptor inconsistent: 7934 vs 220 free clusters [ 94.238037][ T6203] EXT4-fs error (device loop3): __ext4_ext_dirty:206: inode #16: comm syz.3.871: mark_inode_dirty error [ 94.278312][ T6203] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #16: comm syz.3.871: corrupted inode contents [ 94.291594][ T6203] EXT4-fs error (device loop3) in ext4_orphan_del:303: Corrupt filesystem [ 94.314300][ T6203] EXT4-fs error (device loop3): ext4_do_update_inode:5617: inode #16: comm syz.3.871: corrupted inode contents [ 94.329456][ T6203] EXT4-fs error (device loop3): ext4_truncate:4635: inode #16: comm syz.3.871: mark_inode_dirty error [ 94.340888][ T6203] EXT4-fs error (device loop3) in ext4_process_orphan:345: Corrupt filesystem [ 94.352930][ T6203] EXT4-fs (loop3): 1 truncate cleaned up [ 94.359328][ T6203] ext4 filesystem being mounted at /159/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 94.473904][ T6227] loop1: detected capacity change from 0 to 512 [ 94.501577][ T6227] ext4 filesystem being mounted at /183/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 94.597217][ T6235] loop1: detected capacity change from 0 to 128 [ 94.932619][ T6250] SELinux: failed to load policy [ 95.036805][ T6261] ext4: Unknown parameter 'noacl' [ 95.120153][ T6269] netlink: 1004 bytes leftover after parsing attributes in process `syz.2.890'. [ 95.150456][ T6269] EXT4-fs: Ignoring removed bh option [ 95.155937][ T6269] EXT4-fs: Ignoring removed nobh option [ 95.191633][ T6269] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #3: comm syz.2.890: corrupted inode contents [ 95.213325][ T6269] EXT4-fs error (device loop2): ext4_dirty_inode:6502: inode #3: comm syz.2.890: mark_inode_dirty error [ 95.233142][ T6269] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #3: comm syz.2.890: corrupted inode contents [ 95.332695][ T6269] EXT4-fs error (device loop2): __ext4_ext_dirty:206: inode #3: comm syz.2.890: mark_inode_dirty error [ 95.344530][ T6269] EXT4-fs error (device loop2): ext4_acquire_dquot:6986: comm syz.2.890: Failed to acquire dquot type 0 [ 95.363745][ T6269] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #16: comm syz.2.890: corrupted inode contents [ 95.376432][ T6269] EXT4-fs error (device loop2): ext4_dirty_inode:6502: inode #16: comm syz.2.890: mark_inode_dirty error [ 95.388688][ T6269] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #16: comm syz.2.890: corrupted inode contents [ 95.422915][ T6269] EXT4-fs error (device loop2): __ext4_ext_dirty:206: inode #16: comm syz.2.890: mark_inode_dirty error [ 95.448450][ T6269] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #16: comm syz.2.890: corrupted inode contents [ 95.478485][ T6269] EXT4-fs error (device loop2) in ext4_orphan_del:303: Corrupt filesystem [ 95.501037][ T6269] EXT4-fs error (device loop2): ext4_do_update_inode:5617: inode #16: comm syz.2.890: corrupted inode contents [ 95.514352][ T6269] EXT4-fs error (device loop2): ext4_truncate:4635: inode #16: comm syz.2.890: mark_inode_dirty error [ 95.526166][ T6269] EXT4-fs error (device loop2) in ext4_process_orphan:345: Corrupt filesystem [ 95.535640][ T6269] EXT4-fs (loop2): 1 truncate cleaned up [ 95.544563][ T6269] ext4 filesystem being mounted at /185/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 95.615201][ T6281] netlink: 8 bytes leftover after parsing attributes in process `syz.4.894'. [ 95.624078][ T6281] netlink: 8 bytes leftover after parsing attributes in process `syz.4.894'. [ 95.858158][ T29] kauditd_printk_skb: 249 callbacks suppressed [ 95.858173][ T29] audit: type=1400 audit(1768194713.651:3722): avc: denied { create } for pid=6287 comm="syz.1.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 95.903162][ T29] audit: type=1400 audit(1768194713.681:3723): avc: denied { setopt } for pid=6287 comm="syz.1.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 95.922671][ T29] audit: type=1400 audit(1768194713.691:3724): avc: denied { prog_run } for pid=6287 comm="syz.1.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 95.941542][ T29] audit: type=1400 audit(1768194713.691:3725): avc: denied { create } for pid=6287 comm="syz.1.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 95.960922][ T29] audit: type=1400 audit(1768194713.691:3726): avc: denied { write } for pid=6287 comm="syz.1.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 95.980129][ T29] audit: type=1400 audit(1768194713.691:3727): avc: denied { module_request } for pid=6287 comm="syz.1.897" kmod="crypto-echainiv(authenc(digest_null,cbc(aes)))" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 96.029859][ T29] audit: type=1400 audit(1768194713.831:3728): avc: denied { open } for pid=6287 comm="syz.1.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 96.049072][ T29] audit: type=1400 audit(1768194713.831:3729): avc: denied { kernel } for pid=6287 comm="syz.1.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 96.088511][ T29] audit: type=1400 audit(1768194713.871:3730): avc: denied { mounton } for pid=6287 comm="syz.1.897" path="/186/file2" dev="tmpfs" ino=1024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 96.111207][ T29] audit: type=1400 audit(1768194713.871:3731): avc: denied { mount } for pid=6287 comm="syz.1.897" name="/" dev="loop1" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 96.219393][ T6296] EXT4-fs: inline encryption not supported [ 96.250808][ T6302] EXT4-fs: inline encryption not supported [ 96.271588][ T6302] EXT4-fs mount: 55 callbacks suppressed [ 96.271603][ T6302] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 96.305890][ T6296] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 96.345079][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 96.390262][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 96.737996][ T6319] futex_wake_op: syz.3.901 tries to shift op by 32; fix this program [ 96.933086][ T6324] netlink: 1004 bytes leftover after parsing attributes in process `syz.1.905'. [ 97.054848][ T6325] EXT4-fs: Ignoring removed bh option [ 97.060339][ T6325] EXT4-fs: Ignoring removed nobh option [ 97.094512][ T6325] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #3: comm syz.1.905: corrupted inode contents [ 97.146374][ T6325] EXT4-fs error (device loop1): ext4_dirty_inode:6502: inode #3: comm syz.1.905: mark_inode_dirty error [ 97.171852][ T6325] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #3: comm syz.1.905: corrupted inode contents [ 97.196224][ T6325] EXT4-fs error (device loop1): __ext4_ext_dirty:206: inode #3: comm syz.1.905: mark_inode_dirty error [ 97.259892][ T6325] EXT4-fs error (device loop1): ext4_acquire_dquot:6986: comm syz.1.905: Failed to acquire dquot type 0 [ 97.297331][ T6325] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #16: comm syz.1.905: corrupted inode contents [ 97.329145][ T6325] EXT4-fs error (device loop1): ext4_dirty_inode:6502: inode #16: comm syz.1.905: mark_inode_dirty error [ 97.429643][ T6333] EXT4-fs error (device loop4): ext4_orphan_get:1391: inode #15: comm syz.4.906: inode has both inline data and extents flags [ 97.458233][ T6325] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #16: comm syz.1.905: corrupted inode contents [ 97.474657][ T6333] EXT4-fs error (device loop4): ext4_orphan_get:1396: comm syz.4.906: couldn't read orphan inode 15 (err -117) [ 97.493984][ T6325] EXT4-fs error (device loop1): __ext4_ext_dirty:206: inode #16: comm syz.1.905: mark_inode_dirty error [ 97.510248][ T6333] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 97.541530][ T6325] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #16: comm syz.1.905: corrupted inode contents [ 97.557402][ T6333] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1306: group 0, block bitmap and bg descriptor inconsistent: 7934 vs 220 free clusters [ 97.659813][ T6325] EXT4-fs error (device loop1) in ext4_orphan_del:303: Corrupt filesystem [ 97.671756][ T6325] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #16: comm syz.1.905: corrupted inode contents [ 97.708002][ T6325] EXT4-fs error (device loop1): ext4_truncate:4635: inode #16: comm syz.1.905: mark_inode_dirty error [ 97.719372][ T6325] EXT4-fs error (device loop1) in ext4_process_orphan:345: Corrupt filesystem [ 97.826432][ T6325] EXT4-fs (loop1): 1 truncate cleaned up [ 97.860011][ T6325] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 97.899965][ T6325] ext4 filesystem being mounted at /188/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 97.920534][ T6332] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 97.923979][ T6349] set_capacity_and_notify: 8 callbacks suppressed [ 97.923992][ T6349] loop0: detected capacity change from 0 to 1024 [ 97.952304][ T6349] EXT4-fs: inline encryption not supported [ 97.958789][ T6332] ext4 filesystem being mounted at /163/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 97.999838][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 98.032505][ T3313] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 98.039569][ T6332] EXT4-fs (loop3): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 98.068206][ T6350] loop2: detected capacity change from 0 to 512 [ 98.076143][ T6350] ext4: Unknown parameter 'noacl' [ 98.098224][ T6349] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 98.151535][ T6355] netlink: 8 bytes leftover after parsing attributes in process `syz.1.913'. [ 98.160796][ T6355] netlink: 8 bytes leftover after parsing attributes in process `syz.1.913'. [ 98.178351][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 98.214769][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 98.809666][ T6364] loop4: detected capacity change from 0 to 1024 [ 98.865742][ T6364] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 98.963256][ T6377] loop2: detected capacity change from 0 to 1024 [ 98.979472][ T6377] EXT4-fs: inline encryption not supported [ 99.052558][ T6387] serio: Serial port ptm0 [ 99.075040][ T6377] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 99.148924][ T3322] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 99.227751][ T6387] serio: Serial port ptm0 [ 99.327328][ T6408] netlink: 8 bytes leftover after parsing attributes in process `syz.2.927'. [ 99.336248][ T6408] netlink: 8 bytes leftover after parsing attributes in process `syz.2.927'. [ 99.701781][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 99.935278][ T6419] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=io+mem:owns=io+mem [ 99.958346][ T6433] loop4: detected capacity change from 0 to 1024 [ 100.100176][ T6433] EXT4-fs: inline encryption not supported [ 100.689048][ T6433] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 100.923140][ T29] kauditd_printk_skb: 181 callbacks suppressed [ 100.923153][ T29] audit: type=1400 audit(1768194718.721:3911): avc: denied { read write } for pid=6432 comm="syz.4.938" name="file1" dev="loop4" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 100.956864][ T29] audit: type=1400 audit(1768194718.721:3912): avc: denied { open } for pid=6432 comm="syz.4.938" path="/185/file1/file1" dev="loop4" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 101.365748][ T29] audit: type=1400 audit(1768194718.911:3913): avc: denied { ioctl } for pid=6432 comm="syz.4.938" path="/185/file1/file1" dev="loop4" ino=15 ioctlcmd=0x662a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 101.682652][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 102.981076][ T29] audit: type=1400 audit(1768194720.771:3914): avc: denied { allowed } for pid=6441 comm="syz.0.945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 103.002889][ T29] audit: type=1400 audit(1768194720.771:3915): avc: denied { create } for pid=6441 comm="syz.0.945" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 103.291851][ T29] audit: type=1400 audit(1768194720.941:3916): avc: denied { map } for pid=6441 comm="syz.0.945" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14029 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 103.318520][ T29] audit: type=1400 audit(1768194720.941:3917): avc: denied { read write } for pid=6441 comm="syz.0.945" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14029 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 105.698931][ T29] audit: type=1400 audit(1768194723.491:3918): avc: denied { watch watch_reads } for pid=6455 comm="syz.1.948" path="/205" dev="tmpfs" ino=1120 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 106.397827][ T29] audit: type=1400 audit(1768194724.191:3919): avc: denied { map_create } for pid=6460 comm="syz.2.950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 106.937502][ T6465] loop0: detected capacity change from 0 to 1024 [ 107.250622][ T29] audit: type=1400 audit(1768194724.281:3920): avc: denied { perfmon } for pid=6451 comm="syz.4.947" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 107.274167][ T29] audit: type=1400 audit(1768194724.291:3921): avc: denied { map_read map_write } for pid=6451 comm="syz.4.947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 107.296202][ T29] audit: type=1400 audit(1768194724.311:3922): avc: denied { prog_load } for pid=6460 comm="syz.2.950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 107.317705][ T29] audit: type=1400 audit(1768194724.311:3923): avc: denied { bpf } for pid=6460 comm="syz.2.950" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 107.340667][ T29] audit: type=1400 audit(1768194724.461:3924): avc: denied { allowed } for pid=6458 comm="syz.0.949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 107.362614][ T29] audit: type=1400 audit(1768194724.471:3925): avc: denied { create } for pid=6458 comm="syz.0.949" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 107.386239][ T29] audit: type=1400 audit(1768194724.471:3926): avc: denied { map } for pid=6458 comm="syz.0.949" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=12874 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 107.412841][ T29] audit: type=1400 audit(1768194724.471:3927): avc: denied { read write } for pid=6458 comm="syz.0.949" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=12874 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 107.440032][ T29] audit: type=1400 audit(1768194724.731:3928): avc: denied { read write } for pid=6458 comm="syz.0.949" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 107.500754][ T6465] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 109.420739][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 111.083226][ T6474] loop2: detected capacity change from 0 to 1024 [ 111.961365][ T6474] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 112.335234][ T3322] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 112.432047][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 112.432063][ T29] audit: type=1400 audit(1768194730.161:3944): avc: denied { create } for pid=6477 comm="syz.1.952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 112.539923][ T29] audit: type=1400 audit(1768194730.281:3945): avc: denied { write } for pid=6477 comm="syz.1.952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 113.075737][ T29] audit: type=1400 audit(1768194730.841:3946): avc: denied { read } for pid=6477 comm="syz.1.952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 113.201036][ T29] audit: type=1400 audit(1768194730.941:3947): avc: denied { create } for pid=6481 comm="syz.4.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 113.400391][ T29] audit: type=1400 audit(1768194731.201:3948): avc: denied { create } for pid=6483 comm="syz.0.953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 114.340079][ T29] audit: type=1400 audit(1768194732.111:3949): avc: denied { create } for pid=6481 comm="syz.4.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 114.754843][ T29] audit: type=1400 audit(1768194732.551:3950): avc: denied { connect } for pid=6490 comm="syz.2.955" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 115.011536][ T29] audit: type=1400 audit(1768194732.811:3951): avc: denied { setopt } for pid=6490 comm="syz.2.955" laddr=fe80::a8aa:aaff:feaa:aa16 lport=255 faddr=ff01::1 fport=19489 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 115.204691][ T29] audit: type=1400 audit(1768194732.911:3952): avc: denied { write } for pid=6490 comm="syz.2.955" path="socket:[14083]" dev="sockfs" ino=14083 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 115.890562][ T29] audit: type=1400 audit(1768194733.691:3953): avc: denied { create } for pid=6497 comm="syz.0.957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 117.203038][ T6500] netlink: 1004 bytes leftover after parsing attributes in process `syz.0.957'. [ 117.741912][ T6500] loop0: detected capacity change from 0 to 512 [ 117.889223][ T6500] EXT4-fs: Ignoring removed bh option [ 117.894710][ T6500] EXT4-fs: Ignoring removed nobh option [ 118.533885][ T6500] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #3: comm syz.0.957: corrupted inode contents [ 118.622449][ T6500] EXT4-fs error (device loop0): ext4_dirty_inode:6502: inode #3: comm syz.0.957: mark_inode_dirty error [ 118.753200][ T6500] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #3: comm syz.0.957: corrupted inode contents [ 118.917354][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 118.917370][ T29] audit: type=1400 audit(1768194736.691:3955): avc: denied { listen } for pid=6507 comm="syz.2.959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 118.963030][ T6500] EXT4-fs error (device loop0): __ext4_ext_dirty:206: inode #3: comm syz.0.957: mark_inode_dirty error [ 119.218340][ T6500] Quota error (device loop0): write_blk: dquota write failed [ 119.250676][ T6500] Quota error (device loop0): qtree_write_dquot: Error -117 occurred while creating quota [ 119.401089][ T6500] EXT4-fs error (device loop0): ext4_acquire_dquot:6986: comm syz.0.957: Failed to acquire dquot type 0 [ 119.821504][ T6500] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #16: comm syz.0.957: corrupted inode contents [ 120.080772][ T6500] EXT4-fs error (device loop0): ext4_dirty_inode:6502: inode #16: comm syz.0.957: mark_inode_dirty error [ 120.189121][ T29] audit: type=1400 audit(1768194737.991:3956): avc: denied { bind } for pid=6517 comm="syz.1.961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 120.289012][ T6500] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #16: comm syz.0.957: corrupted inode contents [ 120.457272][ T6500] EXT4-fs error (device loop0): __ext4_ext_dirty:206: inode #16: comm syz.0.957: mark_inode_dirty error [ 120.771064][ T6500] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #16: comm syz.0.957: corrupted inode contents [ 121.095847][ T6500] EXT4-fs error (device loop0) in ext4_orphan_del:303: Corrupt filesystem [ 121.224651][ T6500] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #16: comm syz.0.957: corrupted inode contents [ 121.242142][ T29] audit: type=1400 audit(1768194739.011:3957): avc: denied { read } for pid=6523 comm="syz.3.962" dev="nsfs" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 121.242174][ T29] audit: type=1400 audit(1768194739.011:3958): avc: denied { open } for pid=6523 comm="syz.3.962" path="net:[4026532650]" dev="nsfs" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 121.351300][ T29] audit: type=1400 audit(1768194739.141:3959): avc: denied { create } for pid=6523 comm="syz.3.962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 121.516039][ T29] audit: type=1400 audit(1768194739.161:3960): avc: denied { bind } for pid=6523 comm="syz.3.962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 121.806563][ T6500] EXT4-fs error (device loop0): ext4_truncate:4635: inode #16: comm syz.0.957: mark_inode_dirty error [ 121.931959][ T6500] EXT4-fs error (device loop0) in ext4_process_orphan:345: Corrupt filesystem [ 122.012597][ T6500] EXT4-fs (loop0): 1 truncate cleaned up [ 122.021266][ T6500] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 122.121042][ T6500] ext4 filesystem being mounted at /194/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 122.903924][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 124.356792][ T6532] loop1: detected capacity change from 0 to 1024 [ 124.775074][ T6532] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 125.362075][ T3313] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 126.179140][ T6541] netlink: 28 bytes leftover after parsing attributes in process `syz.0.967'. [ 126.188041][ T6541] netlink: 28 bytes leftover after parsing attributes in process `syz.0.967'. [ 127.514380][ T6539] loop0: detected capacity change from 0 to 764 [ 127.834501][ T6541] erspan0: entered promiscuous mode [ 128.083499][ T6539] rock: corrupted directory entry. extent=32, offset=2044, size=237 [ 128.172795][ T29] audit: type=1400 audit(1768194745.951:3961): avc: denied { mount } for pid=6538 comm="syz.0.967" name="/" dev="loop0" ino=1792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 128.328826][ T6541] gretap0: entered promiscuous mode [ 128.769131][ T29] audit: type=1400 audit(1768194746.551:3962): avc: denied { load_policy } for pid=6549 comm="syz.1.969" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 128.845790][ T6550] SELinux: failed to load policy [ 129.524773][ T29] audit: type=1400 audit(1768194747.321:3963): avc: denied { write } for pid=6553 comm="syz.4.971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 129.830617][ T29] audit: type=1400 audit(1768194747.321:3964): avc: denied { connect } for pid=6553 comm="syz.4.971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 129.852671][ T29] audit: type=1400 audit(1768194747.331:3965): avc: denied { name_connect } for pid=6553 comm="syz.4.971" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 129.877311][ T29] audit: type=1400 audit(1768194747.391:3966): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 136.190161][ T29] audit: type=1400 audit(1768194753.981:3967): avc: denied { create } for pid=6579 comm="syz.3.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 136.891553][ T6576] netlink: 1004 bytes leftover after parsing attributes in process `syz.0.977'. [ 137.352664][ T6587] loop0: detected capacity change from 0 to 512 [ 137.558000][ T6587] EXT4-fs: Ignoring removed bh option [ 137.566201][ T6587] EXT4-fs: Ignoring removed nobh option [ 138.456315][ T6594] loop4: detected capacity change from 0 to 1024 [ 138.723996][ T6587] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #3: comm syz.0.977: corrupted inode contents [ 138.742368][ T6594] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 139.179861][ T6587] EXT4-fs error (device loop0): ext4_dirty_inode:6502: inode #3: comm syz.0.977: mark_inode_dirty error [ 139.386064][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 139.470171][ T6587] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #3: comm syz.0.977: corrupted inode contents [ 139.606775][ T6587] EXT4-fs error (device loop0): __ext4_ext_dirty:206: inode #3: comm syz.0.977: mark_inode_dirty error [ 139.818806][ T6587] Quota error (device loop0): write_blk: dquota write failed [ 139.849943][ T6587] Quota error (device loop0): qtree_write_dquot: Error -117 occurred while creating quota [ 139.868666][ T6587] EXT4-fs error (device loop0): ext4_acquire_dquot:6986: comm syz.0.977: Failed to acquire dquot type 0 [ 140.100942][ T6587] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #16: comm syz.0.977: corrupted inode contents [ 140.240689][ T6587] EXT4-fs error (device loop0): ext4_dirty_inode:6502: inode #16: comm syz.0.977: mark_inode_dirty error [ 140.401463][ T6587] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #16: comm syz.0.977: corrupted inode contents [ 140.602955][ T6587] EXT4-fs error (device loop0): __ext4_ext_dirty:206: inode #16: comm syz.0.977: mark_inode_dirty error [ 140.741131][ T6587] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #16: comm syz.0.977: corrupted inode contents [ 140.829602][ T6587] EXT4-fs error (device loop0) in ext4_orphan_del:303: Corrupt filesystem [ 141.011072][ T6587] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #16: comm syz.0.977: corrupted inode contents [ 141.296759][ T6587] EXT4-fs error (device loop0): ext4_truncate:4635: inode #16: comm syz.0.977: mark_inode_dirty error [ 141.408447][ T6587] EXT4-fs error (device loop0) in ext4_process_orphan:345: Corrupt filesystem [ 141.665288][ T6587] EXT4-fs (loop0): 1 truncate cleaned up [ 141.704208][ T6587] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 141.856262][ T6587] ext4 filesystem being mounted at /197/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 142.105258][ T6606] SELinux: failed to load policy [ 142.419306][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 142.909194][ T6612] netlink: 28 bytes leftover after parsing attributes in process `syz.4.983'. [ 142.918095][ T6612] netlink: 28 bytes leftover after parsing attributes in process `syz.4.983'. [ 144.452642][ T6614] loop4: detected capacity change from 0 to 764 [ 144.611968][ T6612] erspan0: entered promiscuous mode [ 145.049716][ T6612] gretap0: entered promiscuous mode [ 145.175207][ T6612] debugfs: 'hsr1' already exists in 'hsr' [ 145.187016][ T6612] Cannot create hsr debugfs directory [ 145.439152][ T6614] rock: corrupted directory entry. extent=32, offset=2044, size=237 [ 148.069363][ T29] audit: type=1400 audit(1768194765.871:3968): avc: denied { name_connect } for pid=6631 comm="syz.2.989" dest=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 155.214576][ T6651] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 155.580284][ T6651] SELinux: failed to load policy [ 156.861176][ T6655] netlink: 1004 bytes leftover after parsing attributes in process `syz.0.996'. [ 157.442644][ T6661] loop0: detected capacity change from 0 to 512 [ 157.759398][ T6661] EXT4-fs: Ignoring removed bh option [ 157.767632][ T6661] EXT4-fs: Ignoring removed nobh option [ 158.171896][ T6661] workqueue: Failed to create a rescuer kthread for wq "ext4-rsv-conversion": -EINTR [ 158.171998][ T6661] EXT4-fs: failed to create workqueue [ 158.192670][ T6661] EXT4-fs (loop0): mount failed [ 163.350443][ T29] audit: type=1400 audit(1768194781.051:3969): avc: denied { open } for pid=6671 comm="syz.2.1000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 163.372538][ T29] audit: type=1400 audit(1768194781.051:3970): avc: denied { kernel } for pid=6671 comm="syz.2.1000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 164.599579][ T29] audit: type=1400 audit(1768194782.321:3971): avc: denied { name_connect } for pid=6671 comm="syz.2.1000" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 164.855600][ T6674] loop2: detected capacity change from 0 to 764 [ 165.209501][ T6674] rock: corrupted directory entry. extent=32, offset=2044, size=237 [ 165.630752][ T6680] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1001'. [ 165.645612][ T29] audit: type=1400 audit(1768194783.371:3972): avc: denied { name_bind } for pid=6678 comm="syz.3.1002" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 165.670294][ T29] audit: type=1400 audit(1768194783.371:3973): avc: denied { node_bind } for pid=6678 comm="syz.3.1002" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 174.020046][ T6702] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 174.199774][ T6702] SELinux: failed to load policy [ 177.992089][ T6716] loop3: detected capacity change from 0 to 1024 [ 179.056518][ T6716] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 179.759005][ T6714] netlink: 1004 bytes leftover after parsing attributes in process `syz.0.1011'. [ 180.314038][ T6728] loop0: detected capacity change from 0 to 512 [ 180.472296][ T6728] EXT4-fs: Ignoring removed bh option [ 180.477729][ T6728] EXT4-fs: Ignoring removed nobh option [ 180.636643][ T3321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 180.929969][ T6728] EXT4-fs warning (device loop0): ext4_multi_mount_protect:394: Unable to create kmmpd thread for loop0. [ 186.359301][ T29] audit: type=1400 audit(1768194804.111:3974): avc: denied { write } for pid=6738 comm="syz.4.1018" name="event2" dev="devtmpfs" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 186.385632][ T29] audit: type=1400 audit(1768194804.121:3975): avc: denied { open } for pid=6738 comm="syz.4.1018" path="/dev/input/event2" dev="devtmpfs" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 189.041392][ T29] audit: type=1400 audit(1768194806.841:3976): avc: denied { bind } for pid=6750 comm="syz.3.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 189.258677][ T29] audit: type=1400 audit(1768194806.911:3977): avc: denied { setopt } for pid=6750 comm="syz.3.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 189.282210][ T29] audit: type=1400 audit(1768194806.941:3978): avc: denied { write } for pid=6750 comm="syz.3.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 196.588020][ T29] audit: type=1400 audit(1768194814.331:3979): avc: denied { watch watch_reads } for pid=6766 comm="syz.4.1025" path="/202" dev="tmpfs" ino=1090 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 196.813753][ T29] audit: type=1400 audit(1768194814.551:3980): avc: denied { read } for pid=6766 comm="syz.4.1025" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 196.839781][ T29] audit: type=1400 audit(1768194814.551:3981): avc: denied { open } for pid=6766 comm="syz.4.1025" path="/dev/snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 199.650918][ T6775] loop2: detected capacity change from 0 to 512 [ 199.715161][ T6775] ext4: Unknown parameter 'noacl' [ 200.204299][ T6786] netlink: 1004 bytes leftover after parsing attributes in process `syz.3.1029'. [ 200.422508][ T29] audit: type=1400 audit(1768194818.221:3982): avc: denied { ioctl } for pid=6771 comm="syz.2.1028" path="socket:[13236]" dev="sockfs" ino=13236 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 201.757314][ T6795] loop3: detected capacity change from 0 to 512 [ 202.049749][ T6795] EXT4-fs: Ignoring removed bh option [ 202.058015][ T6795] EXT4-fs: Ignoring removed nobh option [ 202.800298][ T6795] EXT4-fs warning (device loop3): ext4_multi_mount_protect:394: Unable to create kmmpd thread for loop3. [ 206.234228][ T29] audit: type=1326 audit(1768194824.031:3983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6800 comm="syz.0.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 206.509732][ T29] audit: type=1326 audit(1768194824.141:3984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6800 comm="syz.0.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 206.661785][ T29] audit: type=1326 audit(1768194824.391:3985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6800 comm="syz.0.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 206.688157][ T29] audit: type=1326 audit(1768194824.411:3986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6800 comm="syz.0.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=68 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 206.989529][ T29] audit: type=1326 audit(1768194824.621:3987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6800 comm="syz.0.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 207.015952][ T29] audit: type=1326 audit(1768194824.681:3988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6800 comm="syz.0.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 207.042210][ T29] audit: type=1326 audit(1768194824.681:3989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6800 comm="syz.0.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 207.068619][ T29] audit: type=1326 audit(1768194824.691:3990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6800 comm="syz.0.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 207.459581][ T6807] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 207.542592][ T6807] SELinux: failed to load policy [ 210.775703][ T6818] loop0: detected capacity change from 0 to 1024 [ 210.980212][ T6818] EXT4-fs: inline encryption not supported [ 211.891825][ T6818] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 212.309296][ T29] audit: type=1400 audit(1768194830.111:3991): avc: denied { ioctl } for pid=6817 comm="syz.0.1035" path="/208/file1/file1" dev="loop0" ino=15 ioctlcmd=0x662a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 212.601637][ T29] audit: type=1400 audit(1768194830.321:3992): avc: denied { read } for pid=6825 comm="syz.4.1037" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 212.636846][ T29] audit: type=1400 audit(1768194830.331:3993): avc: denied { open } for pid=6825 comm="syz.4.1037" path="/dev/cpu/0/msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 212.663430][ T29] audit: type=1400 audit(1768194830.391:3994): avc: denied { setopt } for pid=6825 comm="syz.4.1037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 213.213659][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 213.341264][ T29] audit: type=1400 audit(1768194830.451:3995): avc: denied { bind } for pid=6825 comm="syz.4.1037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 213.363845][ T29] audit: type=1400 audit(1768194830.461:3996): avc: denied { name_bind } for pid=6825 comm="syz.4.1037" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 213.391765][ T29] audit: type=1400 audit(1768194830.461:3997): avc: denied { node_bind } for pid=6825 comm="syz.4.1037" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 218.359377][ T6837] netlink: 1004 bytes leftover after parsing attributes in process `syz.0.1040'. [ 219.491770][ T6837] loop0: detected capacity change from 0 to 512 [ 219.632370][ T6837] EXT4-fs: Ignoring removed bh option [ 219.637773][ T6837] EXT4-fs: Ignoring removed nobh option [ 220.066989][ T6837] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #3: comm syz.0.1040: corrupted inode contents [ 220.250949][ T6837] EXT4-fs error (device loop0): ext4_dirty_inode:6502: inode #3: comm syz.0.1040: mark_inode_dirty error [ 220.361480][ T6837] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #3: comm syz.0.1040: corrupted inode contents [ 220.733019][ T6837] EXT4-fs error (device loop0): __ext4_ext_dirty:206: inode #3: comm syz.0.1040: mark_inode_dirty error [ 220.953627][ T29] audit: type=1326 audit(1768194838.741:3998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6848 comm="syz.4.1042" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 220.980161][ T29] audit: type=1326 audit(1768194838.741:3999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6848 comm="syz.4.1042" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7f3f4158de97 code=0x7ffc0000 [ 221.039421][ T6837] Quota error (device loop0): write_blk: dquota write failed [ 221.182676][ T6837] Quota error (device loop0): qtree_write_dquot: Error -117 occurred while creating quota [ 221.311738][ T29] audit: type=1326 audit(1768194839.111:4000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6848 comm="syz.4.1042" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 221.381304][ T6837] EXT4-fs error (device loop0): ext4_acquire_dquot:6986: comm syz.0.1040: Failed to acquire dquot type 0 [ 221.456379][ T29] audit: type=1326 audit(1768194839.201:4001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6848 comm="syz.4.1042" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 221.609947][ T29] audit: type=1326 audit(1768194839.291:4002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6848 comm="syz.4.1042" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 221.636384][ T29] audit: type=1326 audit(1768194839.341:4003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6848 comm="syz.4.1042" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 221.662730][ T29] audit: type=1326 audit(1768194839.381:4004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6848 comm="syz.4.1042" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 221.710244][ T6837] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #16: comm syz.0.1040: corrupted inode contents [ 221.930072][ T29] audit: type=1326 audit(1768194839.451:4005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6848 comm="syz.4.1042" exe="/root/syz-executor" sig=0 arch=c000003e syscall=430 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 222.000453][ T6837] EXT4-fs error (device loop0): ext4_dirty_inode:6502: inode #16: comm syz.0.1040: mark_inode_dirty error [ 222.036847][ T6837] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #16: comm syz.0.1040: corrupted inode contents [ 222.188081][ T6837] EXT4-fs error (device loop0): __ext4_ext_dirty:206: inode #16: comm syz.0.1040: mark_inode_dirty error [ 222.347317][ T6837] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #16: comm syz.0.1040: corrupted inode contents [ 222.693051][ T6837] EXT4-fs error (device loop0) in ext4_orphan_del:303: Corrupt filesystem [ 222.959616][ T6850] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1042'. [ 223.270560][ T6837] EXT4-fs error (device loop0): ext4_do_update_inode:5617: inode #16: comm syz.0.1040: corrupted inode contents [ 223.579123][ T6837] EXT4-fs error (device loop0): ext4_truncate:4635: inode #16: comm syz.0.1040: mark_inode_dirty error [ 223.751327][ T6837] EXT4-fs error (device loop0) in ext4_process_orphan:345: Corrupt filesystem [ 223.917920][ T6837] EXT4-fs (loop0): 1 truncate cleaned up [ 224.031898][ T6837] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 224.189953][ T6837] ext4 filesystem being mounted at /209/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 224.793838][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 228.189871][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 228.189886][ T29] audit: type=1326 audit(1768194845.991:4022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6864 comm="syz.1.1048" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f049fd9f749 code=0x7ffc0000 [ 228.378339][ T29] audit: type=1326 audit(1768194846.101:4023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6864 comm="syz.1.1048" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7f049fd9de97 code=0x7ffc0000 [ 228.558638][ T29] audit: type=1326 audit(1768194846.301:4024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6864 comm="syz.1.1048" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f049fd9f749 code=0x7ffc0000 [ 228.585080][ T29] audit: type=1326 audit(1768194846.341:4025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6864 comm="syz.1.1048" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f049fd9f749 code=0x7ffc0000 [ 228.611558][ T29] audit: type=1326 audit(1768194846.351:4026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6864 comm="syz.1.1048" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f049fd9f749 code=0x7ffc0000 [ 229.139414][ T29] audit: type=1326 audit(1768194846.571:4027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6864 comm="syz.1.1048" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f049fd9f749 code=0x7ffc0000 [ 229.165809][ T29] audit: type=1326 audit(1768194846.621:4028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6864 comm="syz.1.1048" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f049fd9f749 code=0x7ffc0000 [ 229.192278][ T29] audit: type=1326 audit(1768194846.661:4029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6864 comm="syz.1.1048" exe="/root/syz-executor" sig=0 arch=c000003e syscall=431 compat=0 ip=0x7f049fd9f749 code=0x7ffc0000 [ 229.218731][ T29] audit: type=1326 audit(1768194846.931:4030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6864 comm="syz.1.1048" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f049fd9f749 code=0x7ffc0000 [ 230.361451][ T29] audit: type=1326 audit(1768194847.201:4031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6864 comm="syz.1.1048" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f049fd9f749 code=0x7ffc0000 [ 231.590053][ T6865] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1048'. [ 232.494097][ T6882] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1051'. [ 232.505959][ T6882] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1051'. [ 234.153857][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 234.153874][ T29] audit: type=1400 audit(1768194851.871:4060): avc: denied { map_create } for pid=6880 comm="syz.0.1051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 234.514636][ T29] audit: type=1400 audit(1768194852.311:4061): avc: denied { map_read map_write } for pid=6880 comm="syz.0.1051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 234.638951][ T29] audit: type=1400 audit(1768194852.311:4062): avc: denied { prog_load } for pid=6880 comm="syz.0.1051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 234.748795][ T29] audit: type=1400 audit(1768194852.491:4063): avc: denied { name_bind } for pid=6888 comm="syz.3.1052" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 234.773493][ T29] audit: type=1400 audit(1768194852.491:4064): avc: denied { node_bind } for pid=6888 comm="syz.3.1052" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 235.121609][ T29] audit: type=1400 audit(1768194852.601:4065): avc: denied { perfmon } for pid=6880 comm="syz.0.1051" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 235.331635][ T29] audit: type=1400 audit(1768194852.951:4066): avc: denied { create } for pid=6880 comm="syz.0.1051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 235.736495][ T29] audit: type=1400 audit(1768194853.511:4067): avc: denied { write } for pid=6880 comm="syz.0.1051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 235.919794][ T29] audit: type=1400 audit(1768194853.641:4068): avc: denied { connect } for pid=6880 comm="syz.0.1051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 235.942192][ T29] audit: type=1400 audit(1768194853.651:4069): avc: denied { name_connect } for pid=6880 comm="syz.0.1051" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 236.492267][ T6886] loop0: detected capacity change from 0 to 764 [ 238.952594][ T6907] loop2: detected capacity change from 0 to 512 [ 239.320246][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 239.320262][ T29] audit: type=1400 audit(1768194857.051:4076): avc: denied { mounton } for pid=6905 comm="syz.2.1055" path="/215/file0" dev="tmpfs" ino=1180 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 239.571625][ T29] audit: type=1400 audit(1768194857.291:4077): avc: denied { mount } for pid=6905 comm="syz.2.1055" name="/" dev="loop2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 240.229107][ T29] audit: type=1400 audit(1768194858.011:4078): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 241.434047][ T29] audit: type=1400 audit(1768194859.231:4079): avc: denied { open } for pid=6913 comm="syz.1.1057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 241.642346][ T6915] loop1: detected capacity change from 0 to 1024 [ 241.671223][ T29] audit: type=1400 audit(1768194859.231:4080): avc: denied { kernel } for pid=6913 comm="syz.1.1057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 242.716129][ T6915] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz.1.1057: bad orphan inode 134217728 [ 242.814134][ T6915] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 243.124777][ T29] audit: type=1400 audit(1768194860.771:4081): avc: denied { mount } for pid=6913 comm="syz.1.1057" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 243.149301][ T29] audit: type=1400 audit(1768194860.831:4082): avc: denied { add_name } for pid=6913 comm="syz.1.1057" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 243.172777][ T29] audit: type=1400 audit(1768194860.831:4083): avc: denied { create } for pid=6913 comm="syz.1.1057" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 243.666913][ T29] audit: type=1400 audit(1768194861.451:4084): avc: denied { read write } for pid=6913 comm="syz.1.1057" name="bus" dev="loop1" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 243.692228][ T29] audit: type=1400 audit(1768194861.451:4085): avc: denied { open } for pid=6913 comm="syz.1.1057" path="/228/bus/bus" dev="loop1" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 244.487524][ T3313] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 245.111056][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 245.111071][ T29] audit: type=1326 audit(1768194862.911:4088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6929 comm="syz.0.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 245.599510][ T29] audit: type=1326 audit(1768194863.041:4089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6929 comm="syz.0.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7fa99057de97 code=0x7ffc0000 [ 245.625766][ T29] audit: type=1400 audit(1768194863.131:4090): avc: denied { write } for pid=6922 comm="syz.4.1059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 245.649052][ T29] audit: type=1326 audit(1768194863.351:4091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6929 comm="syz.0.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 246.182078][ T29] audit: type=1326 audit(1768194863.541:4092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6929 comm="syz.0.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 246.208477][ T29] audit: type=1326 audit(1768194863.691:4093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6929 comm="syz.0.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 246.234830][ T29] audit: type=1326 audit(1768194863.731:4094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6929 comm="syz.0.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 246.261214][ T29] audit: type=1326 audit(1768194863.801:4095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6929 comm="syz.0.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 246.287659][ T29] audit: type=1326 audit(1768194863.891:4096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6929 comm="syz.0.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=430 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 246.314126][ T29] audit: type=1326 audit(1768194863.911:4097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6929 comm="syz.0.1061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa99057f749 code=0x7ffc0000 [ 247.424990][ T6932] loop2: detected capacity change from 0 to 1024 [ 247.640351][ T6938] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1061'. [ 248.091421][ T6932] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 248.873970][ T6943] netlink: 1004 bytes leftover after parsing attributes in process `syz.1.1062'. [ 248.999133][ T6933] vlan2: entered promiscuous mode [ 249.013133][ T6933] vlan2: entered allmulticast mode [ 249.018259][ T6933] hsr_slave_1: entered allmulticast mode [ 249.731090][ T6946] loop1: detected capacity change from 0 to 512 [ 249.791710][ T6946] EXT4-fs: Ignoring removed bh option [ 249.797108][ T6946] EXT4-fs: Ignoring removed nobh option [ 250.262707][ T6946] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #3: comm syz.1.1062: corrupted inode contents [ 250.320725][ T6946] EXT4-fs error (device loop1): ext4_dirty_inode:6502: inode #3: comm syz.1.1062: mark_inode_dirty error [ 250.399191][ T6946] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #3: comm syz.1.1062: corrupted inode contents [ 250.873225][ T6946] EXT4-fs error (device loop1): __ext4_ext_dirty:206: inode #3: comm syz.1.1062: mark_inode_dirty error [ 251.161278][ T6946] __quota_error: 23 callbacks suppressed [ 251.161319][ T6946] Quota error (device loop1): write_blk: dquota write failed [ 251.320955][ T6946] Quota error (device loop1): qtree_write_dquot: Error -117 occurred while creating quota [ 251.690676][ T6946] EXT4-fs error (device loop1): ext4_acquire_dquot:6986: comm syz.1.1062: Failed to acquire dquot type 0 [ 252.118884][ T6954] netlink: 1004 bytes leftover after parsing attributes in process `syz.3.1064'. [ 252.309046][ T6946] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #16: comm syz.1.1062: corrupted inode contents [ 252.651185][ T6946] EXT4-fs error (device loop1): ext4_dirty_inode:6502: inode #16: comm syz.1.1062: mark_inode_dirty error [ 252.898729][ T6946] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #16: comm syz.1.1062: corrupted inode contents [ 253.036442][ T6958] loop3: detected capacity change from 0 to 512 [ 253.109607][ T6946] EXT4-fs error (device loop1): __ext4_ext_dirty:206: inode #16: comm syz.1.1062: mark_inode_dirty error [ 253.247287][ T6946] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #16: comm syz.1.1062: corrupted inode contents [ 253.403508][ T6958] EXT4-fs: Ignoring removed bh option [ 253.411803][ T6958] EXT4-fs: Ignoring removed nobh option [ 253.457408][ T6946] EXT4-fs error (device loop1) in ext4_orphan_del:303: Corrupt filesystem [ 253.580171][ T6946] EXT4-fs error (device loop1): ext4_do_update_inode:5617: inode #16: comm syz.1.1062: corrupted inode contents [ 253.751776][ T6958] EXT4-fs warning (device loop3): ext4_multi_mount_protect:394: Unable to create kmmpd thread for loop3. [ 253.840020][ T6946] EXT4-fs error (device loop1): ext4_truncate:4635: inode #16: comm syz.1.1062: mark_inode_dirty error [ 254.021335][ T6946] EXT4-fs error (device loop1) in ext4_process_orphan:345: Corrupt filesystem [ 254.415900][ T3322] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 254.514470][ T6946] EXT4-fs (loop1): 1 truncate cleaned up [ 254.708081][ T6946] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 254.739935][ T6946] ext4 filesystem being mounted at /229/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 254.879330][ T29] audit: type=1400 audit(1768194872.611:4121): avc: denied { tracepoint } for pid=6963 comm="syz.0.1066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 255.313664][ T29] audit: type=1400 audit(1768194873.101:4122): avc: denied { create } for pid=6963 comm="syz.0.1066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 255.541464][ T3313] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 258.460361][ T29] audit: type=1400 audit(1768194875.991:4123): avc: denied { mounton } for pid=6963 comm="syz.0.1066" path="/213/file0" dev="tmpfs" ino=1159 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 258.583731][ T6970] loop3: detected capacity change from 0 to 512 [ 258.737189][ T29] audit: type=1400 audit(1768194876.481:4124): avc: denied { create } for pid=6971 comm="syz.2.1067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 259.129033][ T29] audit: type=1400 audit(1768194876.861:4125): avc: denied { setopt } for pid=6971 comm="syz.2.1067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 259.579188][ T6973] netlink: 'syz.2.1067': attribute type 39 has an invalid length. [ 260.090931][ T6973] loop2: detected capacity change from 0 to 512 [ 261.343821][ T6973] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 261.543168][ T6973] ext4 filesystem being mounted at /217/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 263.149450][ T29] audit: type=1400 audit(1768194880.951:4126): avc: denied { bind } for pid=6988 comm="syz.3.1070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 263.569528][ T29] audit: type=1400 audit(1768194881.271:4127): avc: denied { write } for pid=6988 comm="syz.3.1070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 264.958404][ T29] audit: type=1400 audit(1768194882.651:4128): avc: denied { setopt } for pid=6994 comm="syz.4.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 265.410070][ T6992] 9p: Bad value for 'rfdno' [ 266.189149][ T29] audit: type=1400 audit(1768194883.911:4129): avc: denied { create } for pid=6994 comm="syz.4.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 266.369359][ T29] audit: type=1400 audit(1768194884.051:4130): avc: denied { write } for pid=6994 comm="syz.4.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 266.446455][ T6997] loop4: detected capacity change from 0 to 128 [ 268.022365][ T29] audit: type=1400 audit(1768194885.821:4131): avc: denied { create } for pid=7003 comm="syz.3.1073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 268.342062][ T29] audit: type=1400 audit(1768194886.141:4132): avc: denied { read } for pid=7003 comm="syz.3.1073" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 268.368504][ T29] audit: type=1400 audit(1768194886.141:4133): avc: denied { open } for pid=7003 comm="syz.3.1073" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 272.001211][ T29] audit: type=1400 audit(1768194889.751:4134): avc: denied { read } for pid=7018 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 272.025474][ T29] audit: type=1400 audit(1768194889.751:4135): avc: denied { open } for pid=7018 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 272.610390][ T29] audit: type=1400 audit(1768194889.851:4136): avc: denied { mounton } for pid=7018 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 273.261739][ T29] audit: type=1400 audit(1768194891.061:4137): avc: denied { sys_module } for pid=7018 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 274.288886][ T7024] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 274.369853][ T7024] SELinux: failed to load policy [ 274.372365][ T29] audit: type=1400 audit(1768194892.041:4138): avc: denied { load_policy } for pid=7022 comm="syz.4.1078" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 274.393716][ T7021] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1076'. [ 274.409573][ T7021] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1076'. [ 276.515982][ T7027] loop1: detected capacity change from 0 to 764 [ 276.897663][ T7027] rock: corrupted directory entry. extent=32, offset=2044, size=237 [ 277.278698][ T29] audit: type=1400 audit(1768194895.021:4139): avc: denied { mount } for pid=7020 comm="syz.1.1076" name="/" dev="loop1" ino=1792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 281.413696][ T29] audit: type=1400 audit(1768194899.211:4140): avc: denied { watch watch_reads } for pid=7033 comm="syz.4.1080" path="/214" dev="tmpfs" ino=1154 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 282.979238][ T29] audit: type=1400 audit(1768194900.781:4141): avc: denied { execmem } for pid=7042 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 284.041170][ T29] audit: type=1400 audit(1768194901.751:4142): avc: denied { read } for pid=7043 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 284.065646][ T29] audit: type=1400 audit(1768194901.761:4143): avc: denied { open } for pid=7043 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 284.092120][ T29] audit: type=1400 audit(1768194901.811:4144): avc: denied { mounton } for pid=7043 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 284.451588][ T29] audit: type=1400 audit(1768194901.951:4145): avc: denied { module_request } for pid=7043 comm="syz-executor" kmod="netdev-nr7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 284.476703][ T29] audit: type=1400 audit(1768194902.111:4146): avc: denied { sys_module } for pid=7043 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 287.599398][ T29] audit: type=1400 audit(1768194905.371:4147): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 287.626489][ T29] audit: type=1400 audit(1768194905.381:4148): avc: denied { open } for pid=3314 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 288.153375][ T29] audit: type=1400 audit(1768194905.431:4149): avc: denied { ioctl } for pid=3314 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=104 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 290.916981][ T29] audit: type=1400 audit(1768194908.711:4150): avc: denied { prog_load } for pid=7059 comm="syz.4.1084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 290.939054][ T29] audit: type=1400 audit(1768194908.711:4151): avc: denied { bpf } for pid=7059 comm="syz.4.1084" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 290.962568][ T29] audit: type=1400 audit(1768194908.711:4152): avc: denied { perfmon } for pid=7059 comm="syz.4.1084" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 291.259058][ T29] audit: type=1400 audit(1768194908.951:4153): avc: denied { prog_run } for pid=7059 comm="syz.4.1084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 291.720720][ T29] audit: type=1400 audit(1768194909.461:4154): avc: denied { create } for pid=7059 comm="syz.4.1084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 291.893106][ T29] audit: type=1400 audit(1768194909.691:4155): avc: denied { map_create } for pid=7059 comm="syz.4.1084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 292.722728][ T29] audit: type=1400 audit(1768194910.491:4156): avc: denied { map_read map_write } for pid=7059 comm="syz.4.1084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 298.079364][ T29] audit: type=1400 audit(1768194915.871:4157): avc: denied { create } for pid=7066 comm="syz.4.1085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 301.681412][ T29] audit: type=1326 audit(1768194919.401:4158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 302.359102][ T29] audit: type=1326 audit(1768194919.931:4159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 302.385548][ T29] audit: type=1326 audit(1768194919.971:4160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 302.411927][ T29] audit: type=1326 audit(1768194919.971:4161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 302.438468][ T29] audit: type=1400 audit(1768194919.981:4162): avc: denied { create } for pid=7073 comm="syz.4.1086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 302.709655][ T29] audit: type=1400 audit(1768194920.181:4163): avc: denied { write } for pid=7073 comm="syz.4.1086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 302.733112][ T29] audit: type=1326 audit(1768194920.281:4164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 302.759723][ T29] audit: type=1326 audit(1768194920.331:4165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 302.949706][ T29] audit: type=1326 audit(1768194920.721:4166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 303.769577][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 303.769605][ T29] audit: type=1326 audit(1768194921.451:4168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 303.802095][ T29] audit: type=1326 audit(1768194921.461:4169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 303.828537][ T29] audit: type=1326 audit(1768194921.461:4170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=295 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 303.855030][ T29] audit: type=1326 audit(1768194921.501:4171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 303.881532][ T29] audit: type=1400 audit(1768194921.551:4172): avc: denied { read } for pid=7073 comm="syz.4.1086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 304.545062][ T29] audit: type=1326 audit(1768194921.611:4173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 304.571447][ T29] audit: type=1326 audit(1768194921.611:4174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=68 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 304.597793][ T29] audit: type=1326 audit(1768194921.841:4175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 304.624010][ T29] audit: type=1326 audit(1768194922.101:4176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 304.650418][ T29] audit: type=1326 audit(1768194922.131:4177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7073 comm="syz.4.1086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f3f4158f749 code=0x7ffc0000 [ 310.622382][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 310.622395][ T29] audit: type=1400 audit(1768194928.421:4181): avc: denied { open } for pid=7088 comm="syz.4.1088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 310.653029][ T29] audit: type=1400 audit(1768194928.421:4182): avc: denied { kernel } for pid=7088 comm="syz.4.1088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 311.396385][ T7089] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1088'. [ 311.408408][ T7089] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1088'. [ 312.737995][ T29] audit: type=1400 audit(1768194930.341:4183): avc: denied { create } for pid=7088 comm="syz.4.1088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 313.000187][ T29] audit: type=1400 audit(1768194930.581:4184): avc: denied { write } for pid=7088 comm="syz.4.1088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 313.168864][ T29] audit: type=1400 audit(1768194930.951:4185): avc: denied { connect } for pid=7088 comm="syz.4.1088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 313.191210][ T29] audit: type=1400 audit(1768194930.951:4186): avc: denied { name_connect } for pid=7088 comm="syz.4.1088" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 318.190752][ T1697] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 320.549351][ T29] audit: type=1400 audit(1768194938.351:4187): avc: denied { mounton } for pid=7095 comm="syz.4.1089" path="/220/file0" dev="tmpfs" ino=1189 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 324.109387][ T29] audit: type=1400 audit(1768194941.901:4188): avc: denied { name_bind } for pid=7098 comm="syz.4.1090" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 324.134097][ T29] audit: type=1400 audit(1768194941.911:4189): avc: denied { node_bind } for pid=7098 comm="syz.4.1090" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 326.973522][ T1697] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 328.752086][ T7109] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1091'. [ 334.777004][ T7120] loop4: detected capacity change from 0 to 1024 [ 334.836469][ T29] audit: type=1400 audit(1768194952.631:4190): avc: denied { mounton } for pid=7119 comm="syz.4.1093" path="/224/bus" dev="tmpfs" ino=1211 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 335.043932][ T7120] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz.4.1093: bad orphan inode 134217728 [ 335.123423][ T7120] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 335.340588][ T29] audit: type=1400 audit(1768194953.101:4191): avc: denied { mount } for pid=7119 comm="syz.4.1093" name="/" dev="loop4" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 335.461047][ T29] audit: type=1400 audit(1768194953.171:4192): avc: denied { add_name } for pid=7119 comm="syz.4.1093" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 335.484353][ T29] audit: type=1400 audit(1768194953.171:4193): avc: denied { create } for pid=7119 comm="syz.4.1093" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 336.069964][ T29] audit: type=1400 audit(1768194953.401:4194): avc: denied { read open } for pid=7119 comm="syz.4.1093" path="/224/bus/bus" dev="loop4" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 336.413417][ T29] audit: type=1400 audit(1768194954.211:4195): avc: denied { write } for pid=7119 comm="syz.4.1093" name="bus" dev="loop4" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 337.709471][ T1697] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.441956][ T29] audit: type=1400 audit(1768194956.191:4196): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 338.584674][ T3314] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 341.116995][ T29] audit: type=1400 audit(1768194958.891:4197): avc: denied { create } for pid=7127 comm="syz.4.1094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 341.245584][ T29] audit: type=1400 audit(1768194958.971:4198): avc: denied { setopt } for pid=7127 comm="syz.4.1094" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 341.555903][ T29] audit: type=1400 audit(1768194959.331:4199): avc: denied { watch watch_reads } for pid=7127 comm="syz.4.1094" path="/225" dev="tmpfs" ino=1212 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 343.251181][ T29] audit: type=1400 audit(1768194961.041:4200): avc: denied { read } for pid=7133 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 343.275454][ T29] audit: type=1400 audit(1768194961.041:4201): avc: denied { open } for pid=7133 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 343.540593][ T29] audit: type=1400 audit(1768194961.131:4202): avc: denied { mounton } for pid=7133 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 343.564971][ T29] audit: type=1400 audit(1768194961.161:4203): avc: denied { module_request } for pid=7133 comm="syz-executor" kmod="netdev-nr6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 343.589710][ T29] audit: type=1400 audit(1768194961.311:4204): avc: denied { execmem } for pid=7134 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 344.053561][ T29] audit: type=1400 audit(1768194961.851:4205): avc: denied { sys_module } for pid=7136 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 346.861954][ T1697] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.960399][ T29] audit: type=1400 audit(1768194965.741:4206): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 347.987481][ T29] audit: type=1400 audit(1768194965.741:4207): avc: denied { open } for pid=3314 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 348.359399][ T29] audit: type=1400 audit(1768194965.881:4208): avc: denied { ioctl } for pid=3314 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=104 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 351.978848][ T29] audit: type=1400 audit(1768194969.741:4209): avc: denied { create } for pid=7153 comm="syz.4.1095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 353.332783][ T29] audit: type=1400 audit(1768194971.131:4210): avc: denied { write } for pid=7153 comm="syz.4.1095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 356.079157][ T29] audit: type=1400 audit(1768194973.851:4211): avc: denied { map_create } for pid=7157 comm="syz.4.1096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 356.101222][ T29] audit: type=1400 audit(1768194973.851:4212): avc: denied { bpf } for pid=7157 comm="syz.4.1096" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 356.387483][ T29] audit: type=1400 audit(1768194973.971:4213): avc: denied { map_read map_write } for pid=7157 comm="syz.4.1096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 356.410276][ T29] audit: type=1400 audit(1768194974.121:4214): avc: denied { prog_load } for pid=7157 comm="syz.4.1096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 356.431913][ T29] audit: type=1400 audit(1768194974.121:4215): avc: denied { perfmon } for pid=7157 comm="syz.4.1096" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 356.455606][ T29] audit: type=1400 audit(1768194974.141:4216): avc: denied { create } for pid=7157 comm="syz.4.1096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 359.040793][ T29] audit: type=1400 audit(1768194976.801:4217): avc: denied { create } for pid=7161 comm="syz.4.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 359.226032][ T29] audit: type=1400 audit(1768194977.021:4218): avc: denied { prog_run } for pid=7161 comm="syz.4.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 359.482366][ T29] audit: type=1400 audit(1768194977.111:4219): avc: denied { write } for pid=7161 comm="syz.4.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 359.504554][ T29] audit: type=1400 audit(1768194977.161:4220): avc: denied { allowed } for pid=7161 comm="syz.4.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 359.526734][ T29] audit: type=1400 audit(1768194977.211:4221): avc: denied { create } for pid=7161 comm="syz.4.1097" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 359.843575][ T6972] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 359.989557][ T29] audit: type=1400 audit(1768194977.411:4222): avc: denied { map } for pid=7161 comm="syz.4.1097" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14873 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 360.016916][ T29] audit: type=1400 audit(1768194977.411:4223): avc: denied { read write } for pid=7161 comm="syz.4.1097" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14873 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 360.044686][ T29] audit: type=1400 audit(1768194977.481:4224): avc: denied { create } for pid=7161 comm="syz.4.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 360.068025][ T29] audit: type=1400 audit(1768194977.591:4225): avc: denied { append } for pid=7161 comm="syz.4.1097" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 360.094442][ T29] audit: type=1400 audit(1768194977.591:4226): avc: denied { open } for pid=7161 comm="syz.4.1097" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 364.700592][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 364.700608][ T29] audit: type=1400 audit(1768194982.381:4231): avc: denied { create } for pid=7169 comm="syz.4.1098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 367.683205][ T29] audit: type=1400 audit(1768194985.441:4232): avc: denied { load_policy } for pid=7173 comm="syz.4.1099" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 368.021493][ T7174] SELinux: failed to load policy [ 370.694660][ T29] audit: type=1400 audit(1768194988.491:4233): avc: denied { mounton } for pid=7177 comm="syz.4.1100" path="/231" dev="tmpfs" ino=1243 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 370.720560][ T5672] kernel read not supported for file /vcsu1 (pid: 5672 comm: kworker/1:11) [ 370.826223][ T29] audit: type=1400 audit(1768194988.621:4234): avc: denied { read write } for pid=7177 comm="syz.4.1100" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 370.852454][ T29] audit: type=1400 audit(1768194988.621:4235): avc: denied { open } for pid=7177 comm="syz.4.1100" path="/dev/raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 371.912411][ T7178] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 371.967400][ T29] audit: type=1400 audit(1768194989.691:4236): avc: denied { ioctl } for pid=7177 comm="syz.4.1100" path="/dev/raw-gadget" dev="devtmpfs" ino=142 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 372.089640][ T7178] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 393.645815][ T7208] sd 0:0:1:0: device reset [ 393.729895][ T29] audit: type=1400 audit(1768195011.431:4237): avc: denied { read } for pid=7204 comm="syz.4.1103" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 397.532706][ T29] audit: type=1400 audit(1768195015.331:4238): avc: denied { read } for pid=3044 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 404.049008][ T29] audit: type=1400 audit(1768195021.831:4239): avc: denied { name_bind } for pid=7222 comm="syz.4.1104" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 404.073614][ T29] audit: type=1400 audit(1768195021.841:4240): avc: denied { node_bind } for pid=7222 comm="syz.4.1104" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 407.480817][ T1697] bridge_slave_1: left allmulticast mode [ 407.489413][ T1697] bridge_slave_1: left promiscuous mode [ 407.503381][ T1697] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.619503][ T29] audit: type=1400 audit(1768195025.421:4241): avc: denied { create } for pid=7248 comm="syz.4.1105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 408.019891][ T1697] bridge_slave_0: left allmulticast mode [ 408.031290][ T1697] bridge_slave_0: left promiscuous mode [ 408.045691][ T1697] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.479562][ T7255] netlink: 1004 bytes leftover after parsing attributes in process `syz.4.1105'. [ 408.583655][ T7254] loop4: detected capacity change from 0 to 512 [ 408.868843][ T7254] EXT4-fs: Ignoring removed bh option [ 408.874338][ T7254] EXT4-fs: Ignoring removed nobh option [ 409.620579][ T7254] EXT4-fs error (device loop4): ext4_do_update_inode:5617: inode #3: comm syz.4.1105: corrupted inode contents [ 409.718860][ T7254] EXT4-fs error (device loop4): ext4_dirty_inode:6502: inode #3: comm syz.4.1105: mark_inode_dirty error [ 409.795397][ T7254] EXT4-fs error (device loop4): ext4_do_update_inode:5617: inode #3: comm syz.4.1105: corrupted inode contents [ 409.855610][ T7254] EXT4-fs error (device loop4): __ext4_ext_dirty:206: inode #3: comm syz.4.1105: mark_inode_dirty error [ 410.148039][ T7254] Quota error (device loop4): write_blk: dquota write failed [ 410.187003][ T7254] Quota error (device loop4): qtree_write_dquot: Error -117 occurred while creating quota [ 410.312548][ T7254] EXT4-fs error (device loop4): ext4_acquire_dquot:6986: comm syz.4.1105: Failed to acquire dquot type 0 [ 410.864032][ T7254] EXT4-fs error (device loop4): ext4_do_update_inode:5617: inode #16: comm syz.4.1105: corrupted inode contents [ 410.960809][ T7254] EXT4-fs error (device loop4): ext4_dirty_inode:6502: inode #16: comm syz.4.1105: mark_inode_dirty error [ 411.107853][ T7254] EXT4-fs error (device loop4): ext4_do_update_inode:5617: inode #16: comm syz.4.1105: corrupted inode contents [ 411.663657][ T7254] EXT4-fs error (device loop4): __ext4_ext_dirty:206: inode #16: comm syz.4.1105: mark_inode_dirty error [ 411.749007][ T7254] EXT4-fs error (device loop4): ext4_do_update_inode:5617: inode #16: comm syz.4.1105: corrupted inode contents [ 411.975928][ T7254] EXT4-fs error (device loop4) in ext4_orphan_del:303: Corrupt filesystem [ 412.110165][ T7254] EXT4-fs error (device loop4): ext4_do_update_inode:5617: inode #16: comm syz.4.1105: corrupted inode contents [ 412.217672][ T7254] EXT4-fs error (device loop4): ext4_truncate:4635: inode #16: comm syz.4.1105: mark_inode_dirty error [ 412.331868][ T7254] EXT4-fs error (device loop4) in ext4_process_orphan:345: Corrupt filesystem [ 412.421700][ T7254] EXT4-fs (loop4): 1 truncate cleaned up [ 412.590061][ T7254] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 412.649202][ T7254] ext4 filesystem being mounted at /236/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 412.671016][ T29] audit: type=1400 audit(1768195030.411:4242): avc: denied { mount } for pid=7248 comm="syz.4.1105" name="/" dev="loop4" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 412.695670][ T7254] syz.4.1105 (7254) used greatest stack depth: 9544 bytes left [ 426.528558][ C0] ================================================================== [ 426.536667][ C0] BUG: KCSAN: data-race in wq_worker_tick / wq_worker_tick [ 426.543882][ C0] [ 426.546193][ C0] read-write to 0xffff8881000738b8 of 8 bytes by interrupt on cpu 1: [ 426.554245][ C0] wq_worker_tick+0x60/0x230 [ 426.558844][ C0] sched_tick+0xd7/0x220 [ 426.563090][ C0] update_process_times+0x15f/0x190 [ 426.568294][ C0] tick_nohz_handler+0x276/0x3d0 [ 426.573262][ C0] __hrtimer_run_queues+0x20f/0x5a0 [ 426.578459][ C0] hrtimer_interrupt+0x21a/0x460 [ 426.583395][ C0] __sysvec_apic_timer_interrupt+0x5f/0x1d0 [ 426.589284][ C0] sysvec_apic_timer_interrupt+0x32/0x80 [ 426.594918][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 426.600897][ C0] __tsan_read1+0xf8/0x180 [ 426.605320][ C0] nf_nat_inet_fn+0x10d/0x690 [ 426.610002][ C0] nf_nat_ipv4_pre_routing+0x124/0x210 [ 426.615465][ C0] nf_hook_slow+0x78/0x180 [ 426.619888][ C0] ip_rcv+0xfe/0x140 [ 426.623775][ C0] __netif_receive_skb+0xff/0x270 [ 426.628802][ C0] process_backlog+0x228/0x420 [ 426.633559][ C0] __napi_poll+0x5f/0x300 [ 426.637892][ C0] net_rx_action+0x425/0x8c0 [ 426.642477][ C0] handle_softirqs+0xba/0x290 [ 426.647159][ C0] do_softirq+0x45/0x60 [ 426.651318][ C0] __local_bh_enable_ip+0x70/0x80 [ 426.656347][ C0] __alloc_skb+0x476/0x4b0 [ 426.660812][ C0] nsim_dev_trap_report_work+0x18a/0x630 [ 426.666461][ C0] process_scheduled_works+0x4ce/0x9d0 [ 426.672043][ C0] worker_thread+0x582/0x770 [ 426.676642][ C0] kthread+0x489/0x510 [ 426.680718][ C0] ret_from_fork+0x149/0x290 [ 426.685318][ C0] ret_from_fork_asm+0x1a/0x30 [ 426.690081][ C0] [ 426.692390][ C0] read-write to 0xffff8881000738b8 of 8 bytes by interrupt on cpu 0: [ 426.700444][ C0] wq_worker_tick+0x60/0x230 [ 426.705035][ C0] sched_tick+0xd7/0x220 [ 426.709281][ C0] update_process_times+0x15f/0x190 [ 426.714486][ C0] tick_nohz_handler+0x276/0x3d0 [ 426.719425][ C0] __hrtimer_run_queues+0x20f/0x5a0 [ 426.724622][ C0] hrtimer_interrupt+0x21a/0x460 [ 426.729656][ C0] __sysvec_apic_timer_interrupt+0x5f/0x1d0 [ 426.735573][ C0] sysvec_apic_timer_interrupt+0x32/0x80 [ 426.741217][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 426.747197][ C0] kcsan_setup_watchpoint+0x406/0x420 [ 426.752579][ C0] ipt_do_table+0x1d3/0xab0 [ 426.757084][ C0] iptable_mangle_hook+0xd6/0x260 [ 426.762106][ C0] nf_hook_slow+0x78/0x180 [ 426.766526][ C0] __ip_local_out+0x2cb/0x2f0 [ 426.771197][ C0] ip_local_out+0x2a/0xe0 [ 426.775523][ C0] synproxy_send_tcp+0x2ae/0x2f0 [ 426.780465][ C0] synproxy_send_client_synack+0x57c/0x5d0 [ 426.786275][ C0] nft_synproxy_eval_v4+0x22a/0x280 [ 426.791479][ C0] nft_synproxy_do_eval+0x1cf/0x270 [ 426.796700][ C0] nft_synproxy_eval+0x29/0x40 [ 426.801479][ C0] nft_do_chain+0x1e2/0xc90 [ 426.806002][ C0] nft_do_chain_inet+0x1eb/0x220 [ 426.810943][ C0] nf_hook_slow+0x78/0x180 [ 426.815370][ C0] ip_local_deliver+0x178/0x1c0 [ 426.820217][ C0] ip_rcv_finish+0x194/0x1c0 [ 426.824799][ C0] ip_rcv+0x62/0x140 [ 426.828688][ C0] __netif_receive_skb+0xff/0x270 [ 426.833716][ C0] process_backlog+0x228/0x420 [ 426.838475][ C0] __napi_poll+0x5f/0x300 [ 426.842821][ C0] net_rx_action+0x425/0x8c0 [ 426.847403][ C0] handle_softirqs+0xba/0x290 [ 426.852077][ C0] do_softirq+0x45/0x60 [ 426.856246][ C0] __local_bh_enable_ip+0x70/0x80 [ 426.861281][ C0] __alloc_skb+0x476/0x4b0 [ 426.865712][ C0] nsim_dev_trap_report_work+0x18a/0x630 [ 426.871356][ C0] process_scheduled_works+0x4ce/0x9d0 [ 426.876820][ C0] worker_thread+0x582/0x770 [ 426.881407][ C0] kthread+0x489/0x510 [ 426.885476][ C0] ret_from_fork+0x149/0x290 [ 426.890068][ C0] ret_from_fork_asm+0x1a/0x30 [ 426.894831][ C0] [ 426.897143][ C0] value changed: 0x00000000053aa750 -> 0x00000000053ace60 [ 426.904235][ C0] [ 426.906545][ C0] Reported by Kernel Concurrency Sanitizer on: [ 426.912706][ C0] CPU: 0 UID: 0 PID: 41 Comm: kworker/u8:2 Not tainted syzkaller #0 PREEMPT(voluntary) [ 426.922420][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 426.932479][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 426.939261][ C0] ================================================================== [ 427.920635][ T29] audit: type=1400 audit(1768195045.491:4243): avc: denied { write } for pid=3301 comm="syz-executor" path="pipe:[483]" dev="pipefs" ino=483 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor)