last executing test programs: 4.415573115s ago: executing program 4 (id=71): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='kfree\x00', r0, 0x0, 0x100000000}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$tty1(0xc, 0x4, 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x509a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$key(0xf, 0x3, 0x2) close(r2) getpeername$l2tp(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @empty}, &(0x7f00000003c0)=0x10) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX=r1, @ANYRESHEX, @ANYRESHEX, @ANYRES32, @ANYRES16], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) time(0x0) r4 = semget$private(0x0, 0x4000000009, 0x0) semop(r4, &(0x7f0000000140)=[{0x0, 0xffff}], 0x1) semtimedop(r4, &(0x7f0000000000)=[{0x4, 0x2}, {0x2, 0xfb7d, 0x1000}], 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtaction={0xa4, 0x30, 0xffffffffffffffff, 0x70bd2b, 0xfffffffd, {}, [{0x90, 0x1, [@m_bpf={0x8c, 0x1, 0x0, 0x0, {{0x8}, {0x64, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x1}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x3, 0x10, 0xffffffffffffffff, 0x7fffffff, 0x3ff}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_FD={0x8, 0x5, r3}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) fstatfs(r5, &(0x7f00000007c0)=""/205) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x810) 3.590061021s ago: executing program 3 (id=80): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000100)="0100", 0x2, 0xffffffffffffffff) mkdir(&(0x7f0000000580)='./file0\x00', 0x92) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001140)='/proc/zoneinfo\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x2) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001100)=ANY=[], 0x28}}, 0x4) stat(&(0x7f0000000380)='./file3\x00', &(0x7f00000004c0)) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$setregs(0xf, r4, 0x9, &(0x7f0000000100)="10b73ce10e87f5e02dbc182713135d640a9c4b75a99a5bae09da102a9fb48926529c1a11d8feebdd3f0bbb2a7ba7355a465761c0dedbb7718b0ab6c806e1dd7512931d786a2b647249e6c75674b0faf29bf5b13865c71b3a636de9f8de759afb7c8212841041e9a0eac93399fde130fb0139c1f69aeb46f01dd8d1cea13626eccc3bed49463122b3a7247a90eba7c1af2156a5a7db4836a7bed8d437ce601b296bcc7be322bb4d4ed242cde4855b99937f368d47fd28311480") r5 = syz_open_dev$vcsa(&(0x7f00000003c0), 0x8, 0x440000) mount$9p_tcp(&(0x7f0000001380), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x801, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e20,afid=0x0000000000000004,uname=(},fowner<', @ANYRESDEC=0x0, @ANYBLOB="0175a0143e", @ANYRESDEC=0x0, @ANYBLOB=',hash,dont_hash,uid>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$pppl2tp(0x18, 0x1, 0x1) inotify_add_watch(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x100080c) ptrace$setregs(0xf, r4, 0x7fbb, &(0x7f00000013c0)="5657ea9ca3ce8f22efd1e4563b809cf6dd285dd954807dc34a4dd02f6087b3dc2ab9113eb773299eadbd63333484733950de597ff15406") readv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000005c0)=""/121, 0x79}], 0x1) r6 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000001080), 0x1, 0x0) inotify_init1(0x0) lseek(r6, 0xfffffffffffffff7, 0x4) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, &(0x7f00000010c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xeb}}, './file1\x00'}) lsetxattr$security_ima(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300), &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0x12, 0x1) poll(&(0x7f0000000180)=[{r7, 0x2}], 0x1, 0x7) 3.589505172s ago: executing program 3 (id=81): r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000400)={0x0, 'batadv0\x00', {0xb}}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848140000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5e04000000ff00000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) uname(0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000100240248ff05000500", 0x2c}, {&(0x7f00000019c0)="06bb", 0x2}], 0x2}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) io_uring_register$IORING_REGISTER_MEM_REGION(0xffffffffffffffff, 0x22, 0x0, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5, 0x0, 0x8ece}, 0x18) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x1208002, &(0x7f0000000100)={[{@grpquota}, {@delalloc}, {@resuid}, {@debug}, {@dioread_nolock}, {}, {@nomblk_io_submit}, {@noauto_da_alloc}]}, 0x1, 0x5d8, &(0x7f00000005c0)="$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") lchown(&(0x7f00000006c0)='./file0\x00', 0x0, 0xee01) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) perf_event_open(&(0x7f0000000040)={0x4, 0x5a, 0x64, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000c40)}, 0x0, 0x5, 0x800002, 0x0, 0x2, 0x2, 0x1ff, 0x0, 0xff}, 0x0, 0x3, 0xffffffffffffffff, 0x1) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x20, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x20}}, 0x24024800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000000)=@sg0, 0x0, &(0x7f0000000bc0)={0xc, 0x3e0, 0xca, 0x7fffffffffffffff, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x5}) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x1, 0x3, 0x0, 0x80000000000000, 0xfffffffffffffffa, 0x7}, 0x0) 3.531610376s ago: executing program 2 (id=82): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write$char_usb(r2, &(0x7f0000000000)='-0', 0x2) 3.527505077s ago: executing program 4 (id=83): bpf$TOKEN_CREATE(0x24, &(0x7f0000000200), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x5, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x7, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/xfrm_stat\x00') r1 = socket(0x1, 0x5, 0x0) sendfile(r1, r0, 0x0, 0x8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000380)=[{0x200000000006, 0x1, 0x7, 0x7ffc1ffb}]}) r2 = shmget$private(0x0, 0x7000, 0x4, &(0x7f0000ff8000/0x7000)=nil) shmctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0x1, 0x0, 0x0, 0x0, 0x0, 0x65, 0x3ff}, 0xb, 0x8000, 0xb0f0, 0x2, 0x0, 0x0, 0x4}) shmctl$SHM_LOCK(r2, 0xb) shmctl$IPC_RMID(r2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = getpid() r5 = syz_pidfd_open(r4, 0x0) setns(r5, 0x24020000) creat(0x0, 0xecf86c37d5304986) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x77359400}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r7, 0x7, &(0x7f00000031c0)={0x1, 0x1, 0x8002, 0x8}) syz_open_procfs(0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000040)={'ip6gre0\x00', 0x0}) fcntl$lock(r7, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7fffffff}) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000040)) 3.48180691s ago: executing program 2 (id=84): r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./control\x00', 0x480, &(0x7f0000000000), 0x1, 0x786, &(0x7f0000000f80)="$eJzs3c9rHGUfAPDvbLNJ37Tv27zwwms9BQQNlG5Mja2Ch4oHESwU9Gy7bLahZpMt2U1pQkCLCF4EFQ+CXnq2Wm9e/XHVP8C7B2mpmhYjHiQym9102+ymmzSbbdnPByZ5npnZfOc7z8w8T3aG3QD61mj6IxNxOCI+SCIO1ecnEZGtlQYiTq6vt7qyXEinJNbWXvstqa1ze2W5EE2vSR2oVx6LiO/ejTiS2Ry3srg0ky+VivP1+nh19sJ4ZXHp6PnZ/HRxujh3fGJy8tiJZ08c371c//hx6eCND19+6suTf73z/2vvf5/EyThYX9acx24ZjdH6Psmmu/AuL8Vbux2up5JebwA7kp6a+9bP8jicpOWBXm8SANBl6Sh0DQDoM4n+HwD6TON9gNsry4XG1Nt3JPbWzRcjYv96/o37m+tLBur37PbX7oMO307uujOSRMTILsQfjYjPvn7jajpFl+5DArTy9uWIODsyuvn6n2x6ZmG7nu5gndF76hvxf8o+YHTgfr5Jxz/PtRr/ZTbGP9Fi/DPU4tzdibbn/4bM9V0I01Y6/nuh6dm21ab860b21Wv/ro35ssm586Viem37T0SMRXYorU9sEWPs1t+32i1rHv/9/tGbn6fx09931shcHxi6+zVT+Wr+QXJudvNyxOMDrfJPNto/aTP+Pd1hjFeef+/TdsvS/NN8G9Pm/Ltr7UrEky3b/84TbcmWzyeO1w6H8cZB0cJXP38y3C5+c/un0+rK8loScXX3M20tbf/hrfMfSZqf16xsP8YPVw59225Zi/wLjf+F1rU+/geT12vlwfq8S/lqdX4iYjB5dfP8Y3de26g31k/zH3ui9fm/1fGfjk7Odpj/wI1fv9h5/t2V5j+1rfbffuHa6sy+dvE7a//JWmmsPqeT61+nG/gg+w4AAAAAAAAAAAAAAAAAAAAAAAAAOpWJiIORZHIb5Uwml1v/Du//xXCmVK5Uj5wrL8xNRe27skcim2l81OWhps9Dnah/Hn6jfuye+jMR8d+I+HjoX7V6rlAuTfU6eQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACoO9Dm+/9Tvwz1eusAgK7Z3+sNAAD2nP4fAPqP/h8A+o/+HwD6j/4fAPqP/h8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAuO33qVDqt/bmyXEjrUxcXF2bKF49OFSszudmFQq5Qnr+Qmy6Xp0vFXKE8e7+/VyqXL0zG3MKl8WqxUh2vLC6dmS0vzFXPnJ/NTxfPFLN7khUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAbE9lcWkmXyoV5xUegcJAvdUelu3ZUSHTSGKvgg52K4uHYGd2r9DDixIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAI+SfAAAA///WoyFe") perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe77, 0x2, @perf_config_ext={0x1, 0x6}, 0x2, 0x0, 0x2, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) kexec_load(0xff0f, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x7ffe0000, 0x3e0000}], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r1, 0x0, 0x0, 0x9000) syz_open_dev$sg(&(0x7f0000000080), 0xf9ba, 0x143882) socket$kcm(0x10, 0x2, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="070000000400000008020000d900000000000000", @ANYRES32, @ANYBLOB="000086a3ed1df3e5f06821089ee31893d5590738a30a0000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x60, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x94) faccessat(r0, &(0x7f0000000100)='./control\x00', 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r3}, 0x18) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4005eec, &(0x7f0000000080)={0x0, 0x8b48, 0x800, 0x1, 0x30d}, &(0x7f0000ff0000), 0x0) mlock(&(0x7f00007d8000/0x800000)=nil, 0x800000) syz_open_dev$sg(&(0x7f0000000240), 0x4, 0x800900) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x18, 0x5, 0x0, 0x0, 0x4}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x4c02}) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000001400)=""/227, 0x10}], 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd11, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socket$kcm(0x2, 0xa, 0x2) 3.311078504s ago: executing program 3 (id=91): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000100)="0100", 0x2, 0xffffffffffffffff) mkdir(&(0x7f0000000580)='./file0\x00', 0x92) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001140)='/proc/zoneinfo\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x2) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001100)=ANY=[], 0x28}}, 0x4) stat(&(0x7f0000000380)='./file3\x00', &(0x7f00000004c0)) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$setregs(0xf, r4, 0x9, &(0x7f0000000100)="10b73ce10e87f5e02dbc182713135d640a9c4b75a99a5bae09da102a9fb48926529c1a11d8feebdd3f0bbb2a7ba7355a465761c0dedbb7718b0ab6c806e1dd7512931d786a2b647249e6c75674b0faf29bf5b13865c71b3a636de9f8de759afb7c8212841041e9a0eac93399fde130fb0139c1f69aeb46f01dd8d1cea13626eccc3bed49463122b3a7247a90eba7c1af2156a5a7db4836a7bed8d437ce601b296bcc7be322bb4d4ed242cde4855b99937f368d47fd28311480") r5 = syz_open_dev$vcsa(&(0x7f00000003c0), 0x8, 0x440000) mount$9p_tcp(&(0x7f0000001380), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x801, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e20,afid=0x0000000000000004,uname=(},fowner<', @ANYRESDEC=0x0, @ANYBLOB="0175a0143e", @ANYRESDEC=0x0, @ANYBLOB=',hash,dont_hash,uid>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$pppl2tp(0x18, 0x1, 0x1) inotify_add_watch(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x100080c) ptrace$setregs(0xf, r4, 0x7fbb, &(0x7f00000013c0)="5657ea9ca3ce8f22efd1e4563b809cf6dd285dd954807dc34a4dd02f6087b3dc2ab9113eb773299eadbd63333484733950de597ff15406") readv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000005c0)=""/121, 0x79}], 0x1) r6 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000001080), 0x1, 0x0) inotify_init1(0x0) lseek(r6, 0xfffffffffffffff7, 0x4) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, &(0x7f00000010c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xeb}}, './file1\x00'}) lsetxattr$security_ima(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300), &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0x12, 0x1) poll(&(0x7f0000000180)=[{r7, 0x2}], 0x1, 0x7) 3.248982709s ago: executing program 3 (id=93): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='kfree\x00', r0, 0x0, 0x100000000}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$tty1(0xc, 0x4, 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x509a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$key(0xf, 0x3, 0x2) close(r2) getpeername$l2tp(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @empty}, &(0x7f00000003c0)=0x10) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX=r1, @ANYRESHEX, @ANYRESHEX, @ANYRES32, @ANYRES16], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) time(0x0) r4 = semget$private(0x0, 0x4000000009, 0x0) semop(r4, &(0x7f0000000140)=[{0x0, 0xffff}], 0x1) semtimedop(r4, &(0x7f0000000000)=[{0x4, 0x2}, {0x2, 0xfb7d, 0x1000}], 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtaction={0xa4, 0x30, 0xffffffffffffffff, 0x70bd2b, 0xfffffffd, {}, [{0x90, 0x1, [@m_bpf={0x8c, 0x1, 0x0, 0x0, {{0x8}, {0x64, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x1}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x3, 0x10, 0xffffffffffffffff, 0x7fffffff, 0x3ff}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_FD={0x8, 0x5, r3}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) fstatfs(r5, &(0x7f00000007c0)=""/205) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x810) 2.867376599s ago: executing program 1 (id=95): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write$char_usb(r2, &(0x7f0000000000)='-0', 0x2) 2.835940312s ago: executing program 1 (id=96): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0)=@chain) add_key$user(&(0x7f0000000080), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) 2.746805559s ago: executing program 1 (id=97): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='kfree\x00', r0, 0x0, 0x100000000}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f00000006c0)={0x4, 0x0, 0x0, 0x0, 0x104, 0x3}) r3 = memfd_create(0x0, 0x2) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000040)={0x5, 0x2, 0xf, 0xfe74, 0x8, "2c277bd72c6157ca4381fbdd4a7c9d6a6f0da7", 0xffffffff, 0x91}) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000980)='mm_page_free\x00', 0xffffffffffffffff, 0x0, 0x6}, 0x18) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) close(0xffffffffffffffff) getpeername$l2tp(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @empty}, &(0x7f00000003c0)=0x10) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX=r6, @ANYRESHEX=r3, @ANYRESHEX=r4, @ANYRES8=r5, @ANYRES32, @ANYRES16=r1], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) time(0x0) r8 = semget$private(0x0, 0x4000000009, 0x0) semop(r8, &(0x7f0000000140)=[{0x0, 0xffff}], 0x1) semtimedop(r8, &(0x7f0000000000)=[{0x4, 0x2}, {0x2, 0xfb7d, 0x1000}], 0x2, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtaction={0xa4, 0x30, 0xffffffffffffffff, 0x70bd2b, 0xfffffffd, {}, [{0x90, 0x1, [@m_bpf={0x8c, 0x1, 0x0, 0x0, {{0x8}, {0x64, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x1}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x3, 0x10, 0xffffffffffffffff, 0x7fffffff, 0x3ff}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_FD={0x8, 0x5, r7}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x810) 2.625435939s ago: executing program 4 (id=98): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) socket$l2tp6(0xa, 0x2, 0x73) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x0, 0x6}, 0x1c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x6, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f903", 0x11}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd4242"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r2, 0x5412, &(0x7f0000000640)=0x13) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x3, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r3, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000380)="12", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000016c0)=[{0x0}], 0x1}}], 0x2, 0x48800) syz_usb_disconnect(0xffffffffffffffff) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x6) shutdown(r3, 0x2) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0xff) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000140)=0x7f) r4 = syz_usb_connect$hid(0x4, 0x3f, &(0x7f0000000100)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x20, 0x56a, 0x39, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x5, 0x20, 0x7, [{{0x9, 0x4, 0x0, 0xc5, 0x1, 0x3, 0x1, 0x3, 0x5, {0x9, 0x21, 0x6, 0xcb, 0x1, {0x22, 0x8b2}}, {{{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x40, 0x1a, 0x52}}, [{{0x9, 0x5, 0x2, 0x3, 0x400, 0x3, 0x9, 0x3}}]}}}]}}]}}, &(0x7f00000003c0)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x310, 0x9, 0x40, 0x89, 0xff, 0x3}, 0x4e, &(0x7f0000000400)=ANY=[@ANYBLOB="050f4e000514100402cdf86d5330b35d6de6629dea3f3f108c1410040404a52ee7cf1616047dd1e307dfab8d5803100b1410040867a76c91493286ccf1278c386e5e18d80ace01051003000600020081ff"], 0x2, [{0x69, &(0x7f0000000300)=ANY=[@ANYBLOB="ae561452c01de382242b2c7bf4f8e969032ca2cc17ea6a8a123f4e7eaa347908ea1038cd7abb2bd5c42f8d21bdc5531dd6b9005eb24fe6ba19709b4c275ec23002e67ce1e9ed0d4c5957b92416e5400c898ed7a0270d29662c4f2d2542ba966b21f473adda7eb474cac81e4f1ad3aa398100000000210000"]}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x448}}]}) syz_usb_disconnect(r4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r5}, 0x10) syz_usb_ep_read(r4, 0x0, 0x4e, &(0x7f0000000740)=""/78) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) 2.461364092s ago: executing program 2 (id=99): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={{r3, r4/1000+60000}, {r5, r6/1000+60000}}) connect$unix(r2, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x18) 2.215493292s ago: executing program 2 (id=101): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000100)="0100", 0x2, 0xffffffffffffffff) mkdir(&(0x7f0000000580)='./file0\x00', 0x92) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001140)='/proc/zoneinfo\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x2) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001100)=ANY=[], 0x28}}, 0x4) stat(&(0x7f0000000380)='./file3\x00', &(0x7f00000004c0)) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$setregs(0xf, r4, 0x9, &(0x7f0000000100)="10b73ce10e87f5e02dbc182713135d640a9c4b75a99a5bae09da102a9fb48926529c1a11d8feebdd3f0bbb2a7ba7355a465761c0dedbb7718b0ab6c806e1dd7512931d786a2b647249e6c75674b0faf29bf5b13865c71b3a636de9f8de759afb7c8212841041e9a0eac93399fde130fb0139c1f69aeb46f01dd8d1cea13626eccc3bed49463122b3a7247a90eba7c1af2156a5a7db4836a7bed8d437ce601b296bcc7be322bb4d4ed242cde4855b99937f368d47fd28311480") mount$9p_tcp(&(0x7f0000001380), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x801, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e20,afid=0x0000000000000004,uname=(},fowner<', @ANYRESDEC=0x0, @ANYBLOB="0175a0143e", @ANYRESDEC=0x0, @ANYBLOB=',hash,dont_hash,uid>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$pppl2tp(0x18, 0x1, 0x1) syz_read_part_table(0x1060, &(0x7f0000000000)="$eJzsz8FpAlEUBdA7n/mZCQSyTxFTRxaBrLJOE/bhypUd2I7FiIJ8YRwtQV2cs3k8ePfBDc9VcmqttXLb345J9zVmSsm2Jqm/U9Jm6Yd7bH+dbTinbuqSTbKu+U/qe5KPJN3PMCar75Skn48+D+Pyo8vf7qFdAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBFXQIAAP//s1YVKg==") inotify_add_watch(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x100080c) ptrace$setregs(0xf, r4, 0x7fbb, &(0x7f00000013c0)="5657ea9ca3ce8f22efd1e4563b809cf6dd285dd954807dc34a4dd02f6087b3dc2ab9113eb773299eadbd63333484733950de597ff15406") readv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000005c0)=""/121, 0x79}], 0x1) r5 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000001080), 0x1, 0x0) inotify_init1(0x0) lseek(r5, 0xfffffffffffffff7, 0x4) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000010c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xeb}}, './file1\x00'}) lsetxattr$security_ima(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300), &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0x12, 0x1) poll(&(0x7f0000000180)=[{r6, 0x2}], 0x1, 0x7) 2.214287242s ago: executing program 3 (id=102): r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000400)={0x0, 'batadv0\x00', {0xb}}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848140000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5e04000000ff00000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) uname(0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000100240248ff05000500", 0x2c}, {&(0x7f00000019c0)="06bb", 0x2}], 0x2}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) io_uring_register$IORING_REGISTER_MEM_REGION(0xffffffffffffffff, 0x22, 0x0, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5, 0x0, 0x8ece}, 0x18) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x1208002, &(0x7f0000000100)={[{@grpquota}, {@delalloc}, {@resuid}, {@debug}, {@dioread_nolock}, {}, {@nomblk_io_submit}, {@noauto_da_alloc}]}, 0x1, 0x5d8, &(0x7f00000005c0)="$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") lchown(&(0x7f00000006c0)='./file0\x00', 0x0, 0xee01) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) perf_event_open(&(0x7f0000000040)={0x4, 0x5a, 0x64, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000c40)}, 0x0, 0x5, 0x800002, 0x0, 0x2, 0x2, 0x1ff, 0x0, 0xff}, 0x0, 0x3, 0xffffffffffffffff, 0x1) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x20, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x20}}, 0x24024800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000000)=@sg0, 0x0, &(0x7f0000000bc0)={0xc, 0x3e0, 0xca, 0x7fffffffffffffff, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x5}) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x1, 0x3, 0x0, 0x80000000000000, 0xfffffffffffffffa, 0x7}, 0x0) 2.182203555s ago: executing program 0 (id=103): io_setup(0xffff, &(0x7f0000001080)) 1.985249441s ago: executing program 3 (id=104): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000ff56ffff950010c4a64fe0993f33a0ed64a0f17f00"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000001700)=0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000001000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000021000f0000f901000000000002"], 0x1c}}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 1.966703062s ago: executing program 0 (id=105): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000100)="0100", 0x2, 0xffffffffffffffff) mkdir(&(0x7f0000000580)='./file0\x00', 0x92) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001140)='/proc/zoneinfo\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x2) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001100)=ANY=[], 0x28}}, 0x4) stat(&(0x7f0000000380)='./file3\x00', &(0x7f00000004c0)) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$setregs(0xf, r4, 0x9, &(0x7f0000000100)="10b73ce10e87f5e02dbc182713135d640a9c4b75a99a5bae09da102a9fb48926529c1a11d8feebdd3f0bbb2a7ba7355a465761c0dedbb7718b0ab6c806e1dd7512931d786a2b647249e6c75674b0faf29bf5b13865c71b3a636de9f8de759afb7c8212841041e9a0eac93399fde130fb0139c1f69aeb46f01dd8d1cea13626eccc3bed49463122b3a7247a90eba7c1af2156a5a7db4836a7bed8d437ce601b296bcc7be322bb4d4ed242cde4855b99937f368d47fd28311480") r5 = syz_open_dev$vcsa(&(0x7f00000003c0), 0x8, 0x440000) mount$9p_tcp(&(0x7f0000001380), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x801, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e20,afid=0x0000000000000004,uname=(},fowner<', @ANYRESDEC=0x0, @ANYBLOB="0175a0143e", @ANYRESDEC=0x0, @ANYBLOB=',hash,dont_hash,uid>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) syz_read_part_table(0x1060, &(0x7f0000000000)="$eJzsz8FpAlEUBdA7n/mZCQSyTxFTRxaBrLJOE/bhypUd2I7FiIJ8YRwtQV2cs3k8ePfBDc9VcmqttXLb345J9zVmSsm2Jqm/U9Jm6Yd7bH+dbTinbuqSTbKu+U/qe5KPJN3PMCar75Skn48+D+Pyo8vf7qFdAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBFXQIAAP//s1YVKg==") inotify_add_watch(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x100080c) ptrace$setregs(0xf, r4, 0x7fbb, &(0x7f00000013c0)="5657ea9ca3ce8f22efd1e4563b809cf6dd285dd954807dc34a4dd02f6087b3dc2ab9113eb773299eadbd63333484733950de597ff15406") readv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000005c0)=""/121, 0x79}], 0x1) r6 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000001080), 0x1, 0x0) inotify_init1(0x0) lseek(r6, 0xfffffffffffffff7, 0x4) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, &(0x7f00000010c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xeb}}, './file1\x00'}) lsetxattr$security_ima(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300), &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0x12, 0x1) poll(&(0x7f0000000180)=[{r7, 0x2}], 0x1, 0x7) 1.771845747s ago: executing program 1 (id=106): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write$char_usb(r2, &(0x7f0000000000)='-0', 0x2) 1.771557358s ago: executing program 2 (id=107): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0)=@chain) add_key$user(&(0x7f0000000080), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) 1.698949593s ago: executing program 1 (id=108): syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x880, &(0x7f0000000180)=ANY=[@ANYRES8=0x0, @ANYRES8=0xffffffffffffffff, @ANYRES64, @ANYRES16=0x0], 0x1, 0x36e, &(0x7f0000000c00)="$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") r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000f80)=ANY=[@ANYBLOB="18000000000000000000000000c537b168c3c10a5a7ace991762fb00000018110000", @ANYRES32=r2, @ANYRES16], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2003}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)=r3}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r3, 0x0, 0x5}, 0x18) r5 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f00000003c0)={0x0, 0xfff, 0x3}) r6 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SG_SET_FORCE_PACK_ID(r6, 0x227b, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x7}, 0x0, 0x10000, 0x8, 0x9, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000007c0)=ANY=[@ANYBLOB="540100001000693825a9ed69ad02044563220100000000000000fe0c140b000000000000000000000000000000000000000000004558db0d9fb4f198ef3d21b3433cea60aed5319ac50660b89dc2773fc780a01f4614460e2c9b595983ea760463109f33ecff91c16ad0de5cff7c83da12fbb8b493de682ac9d76a", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000320000000033000000ac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000805600000000000000000000000000000000000000080000000000000070000000090000200200000000000000000000000200010000000000000000004800010073686132353600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c001700000000002bbd700025bd70002dbd70002dbd700006000000"], 0x154}}, 0x0) readv(r6, &(0x7f0000000180)=[{&(0x7f0000000000)=""/24, 0xfd90}], 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff53000000800395032303030"], 0x15) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r9, &(0x7f0000000300)=ANY=[], 0x15) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES8=r0, @ANYRESOCT=r1, @ANYRES8, @ANYRES32=0x0, @ANYRES64=r4, @ANYBLOB='\x00'/28], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000008000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r11}, 0x18) r12 = dup(r9) write$P9_RLERRORu(r12, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r12, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r12, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r8, @ANYBLOB=',wfdno=', @ANYRESHEX=r12]) newfstatat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x0, 0x0) r13 = fcntl$dupfd(r6, 0x406, r6) write$sndseq(r13, &(0x7f0000000040)=[{0x80, 0x4, 0x0, 0x0, @tick=0xb, {0x0, 0xb8}, {0x4, 0x2}, @raw32={[0x3, 0x7]}}, {0x0, 0x7, 0xfd, 0x4, @tick=0xf1f, {0x6, 0x4}, {0xc}, @quote={{0xe8, 0x48}, 0x7}}], 0x38) 1.687693354s ago: executing program 2 (id=109): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000100)="0100", 0x2, 0xffffffffffffffff) mkdir(&(0x7f0000000580)='./file0\x00', 0x92) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001140)='/proc/zoneinfo\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x2) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001100)=ANY=[], 0x28}}, 0x4) stat(&(0x7f0000000380)='./file3\x00', &(0x7f00000004c0)) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$setregs(0xf, r4, 0x9, &(0x7f0000000100)="10b73ce10e87f5e02dbc182713135d640a9c4b75a99a5bae09da102a9fb48926529c1a11d8feebdd3f0bbb2a7ba7355a465761c0dedbb7718b0ab6c806e1dd7512931d786a2b647249e6c75674b0faf29bf5b13865c71b3a636de9f8de759afb7c8212841041e9a0eac93399fde130fb0139c1f69aeb46f01dd8d1cea13626eccc3bed49463122b3a7247a90eba7c1af2156a5a7db4836a7bed8d437ce601b296bcc7be322bb4d4ed242cde4855b99937f368d47fd28311480") r5 = syz_open_dev$vcsa(&(0x7f00000003c0), 0x8, 0x440000) mount$9p_tcp(&(0x7f0000001380), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x801, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e20,afid=0x0000000000000004,uname=(},fowner<', @ANYRESDEC=0x0, @ANYBLOB="0175a0143e", @ANYRESDEC=0x0, @ANYBLOB=',hash,dont_hash,uid>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r6 = inotify_init1(0x800) socket$pppl2tp(0x18, 0x1, 0x1) syz_read_part_table(0x1060, &(0x7f0000000000)="$eJzsz8FpAlEUBdA7n/mZCQSyTxFTRxaBrLJOE/bhypUd2I7FiIJ8YRwtQV2cs3k8ePfBDc9VcmqttXLb345J9zVmSsm2Jqm/U9Jm6Yd7bH+dbTinbuqSTbKu+U/qe5KPJN3PMCar75Skn48+D+Pyo8vf7qFdAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBFXQIAAP//s1YVKg==") inotify_add_watch(r6, &(0x7f00000002c0)='./file0\x00', 0x100080c) ptrace$setregs(0xf, r4, 0x7fbb, &(0x7f00000013c0)="5657ea9ca3ce8f22efd1e4563b809cf6dd285dd954807dc34a4dd02f6087b3dc2ab9113eb773299eadbd63333484733950de597ff15406") readv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000005c0)=""/121, 0x79}], 0x1) r7 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000001080), 0x1, 0x0) inotify_init1(0x0) lseek(r7, 0xfffffffffffffff7, 0x4) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, &(0x7f00000010c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xeb}}, './file1\x00'}) lsetxattr$security_ima(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300), &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0x12, 0x1) poll(&(0x7f0000000180)=[{r8, 0x2}], 0x1, 0x7) 1.552395605s ago: executing program 4 (id=110): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) unshare(0x62040200) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) r4 = socket$nl_generic(0x11, 0x3, 0x10) sendmsg(r4, &(0x7f0000000640)={&(0x7f00000000c0)=@caif=@rfm={0x25, 0x0, "290500df00210000f70006000500"}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000040)="4ba72c4cfd81685544f46c", 0xb}, {&(0x7f0000000240)="fbb923ea045373e1a6f8dd6dbb9fd30034c3f5b95bd089c795e3ba5f5f0cddc77de524c4364a22bf1ee1f3629f815edc0cafd9f8a2f1af96b907febdec49199370c3382ed081c8bf75ffcd0725f226ef4100334f4216240fca2b7bd6f326a83a10348961ebb9897d924bca0b7258a0190455b39fa7f140f7b00b84cb05ab6d6f2013c71d1fd7c038b3ef616b97cd1fe5fe89a3d30951b71ce4c14045fb03f16ffb8a6ea6d4e2c0b5f9d74914c1ccf465b005ca001e2a01e90aea0f8d58cb985decb0952f5c336be392202a007a0cf7f7a6cf5e5e80b025a2ab27262ec234fb374279", 0xe2}, {&(0x7f0000000340)="e10597aba9d2aebe3eecf30b2c93c7cda9d373a8184a0f6b70ef3493829ff4d0b7668e8df352fed8bd88630093ee5b024403392f52e81739f1313bcb000000000000", 0x42}], 0x3, 0x0, 0x0, 0x11000000}, 0x2400c044) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000000)=ANY=[], 0x57) r5 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r5, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000240)=[{0x0}, {&(0x7f00000004c0)="1ed8b7f9d457", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a"], 0x40}, 0x20000000) r6 = socket$netlink(0x10, 0x3, 0x0) writev(r6, &(0x7f00000001c0)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1) socket$netlink(0x10, 0x3, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x1, &(0x7f0000006680)) madvise(&(0x7f000094b000/0x1000)=nil, 0x1000, 0xf) 1.292815996s ago: executing program 0 (id=111): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) unshare(0x62040200) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) r4 = socket$nl_generic(0x11, 0x3, 0x10) sendmsg(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)="4ba72c4cfd81685544f46c3f0800", 0xe}, {&(0x7f0000000240)="fbb923ea045373e1a6f8dd6dbb9fd30034c3f5b95bd089c795e3ba5f5f0cddc77de524c4364a22bf1ee1f3629f815edc0cafd9f8a2f1af96b907febdec49199370c3382ed081c8bf75ffcd0725f226ef4100334f4216240fca2b7bd6f326a83a10348961ebb9897d924bca0b7258a0190455b39fa7f140f7b00b84cb05ab6d6f2013c71d1fd7c038b3ef616b97cd1fe5fe89a3d30951b71ce4c14045fb03f16ffb8a6ea6d4e2c0b5f9d74914c1ccf465b005ca001e2a01e90aea0f8d58cb985decb0952f5c336be392202a007a0cf7f7a6cf5e5e80b025a2ab27262ec234fb374279", 0xe2}, {&(0x7f0000000340)="e10597aba9d2aebe3eecf30b2c93c7cda9d373a8184a0f6b70ef3493829ff4d0b7668e8df352fed8bd88630093ee5b024403392f52e81739f1313bcb000000000000", 0x42}], 0x3, 0x0, 0x0, 0x11000000}, 0x2400c044) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000000)=ANY=[], 0x57) r5 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r5, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000240)=[{0x0}, {&(0x7f00000004c0)="1ed8b7f9d457", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a"], 0x40}, 0x20000000) r6 = socket$netlink(0x10, 0x3, 0x0) writev(r6, &(0x7f00000001c0)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1) socket$netlink(0x10, 0x3, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x1, &(0x7f0000006680)) madvise(&(0x7f000094b000/0x1000)=nil, 0x1000, 0xf) 1.215915952s ago: executing program 4 (id=112): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) read$eventfd(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0x9, &(0x7f0000000d80)={0x23, 0x1c88000000}, 0x0) io_setup(0xffff, &(0x7f0000001080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043"], 0x0, 0x200, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0xb, &(0x7f0000000100)=ANY=[@ANYBLOB="180300000000008000000000001000008510000006000000180000000000000000000000000000006500000000000000180000000000000000000000000000009500000000000000840300000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f00000002c0)=0x1, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) clock_gettime(0x0, &(0x7f0000000080)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) fcntl$lock(r7, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r8}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000006c0)={&(0x7f00000004c0)="e91456f653135be079bc071ff7eeddeba3d7a8a2cd901d84393e2fa6405a53d1e62774cab71d86eb5c8c1d91103dfd0fba37067be4d504c9ec0dabcd4df0d6cd9762ae1377a15abcdaf90457a01b17221610f09925e19239c9500b18f4ed4c3712c222b37e12a177f9729d3251d292405c37bb72b7460683c19a936871b9189391386f772e79939ab978a9a19de1cc3c18d8fea93bb7da9a0951e7e0b1ff4a1529f58feaf84a1f7a83ddd259dff09b4ca5a28e8c704fcaa356d096b516743cadf655ab0ee6ab9e780060924c8c0f293bc8dc9b13c95ae81fcf0b91fb1d1792f0", &(0x7f0000000380)=""/65, &(0x7f00000005c0)="a574ec83ab2643ff45b4dd09df10a2b8e74ca1f6134656bb7ad6f3421b904ec22d29accfcb8add256a83afc48872d6274029c6103d65251c2863b10a7b65adba272ef923d49e32d89f83a114fed3ed2fa3c3e2052fab", &(0x7f0000000640)="d5f2d1c0bee4c4de9e7f7cad0a5172f2a2a4cc24d2854abba5589327337287f6e16ce832cb4b7f2f67aae8411d69cc0db4879d82cbc431c2e0b43b8ca486b8321a51ba66e02d6a9a67a8a4448ccd0dd48972", 0x9, r7}, 0x38) fcntl$lock(r7, 0x7, &(0x7f0000000280)={0x1, 0x0, 0x2f, 0x9}) fcntl$lock(r7, 0x7, &(0x7f00000000c0)={0x2, 0x2, 0x7, 0x401}) dup(r1) clock_gettime(0x0, &(0x7f0000000280)) connect$unix(r6, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x18) 694.965184ms ago: executing program 1 (id=113): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='kfree\x00', r0, 0x0, 0x100000000}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$tty1(0xc, 0x4, 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x509a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$key(0xf, 0x3, 0x2) close(r2) getpeername$l2tp(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @empty}, &(0x7f00000003c0)=0x10) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX=r1, @ANYRESHEX, @ANYRESHEX, @ANYRES32, @ANYRES16], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) time(0x0) r4 = semget$private(0x0, 0x4000000009, 0x0) semop(r4, &(0x7f0000000140)=[{0x0, 0xffff}], 0x1) semtimedop(r4, &(0x7f0000000000)=[{0x4, 0x2}, {0x2, 0xfb7d, 0x1000}], 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtaction={0xa4, 0x30, 0xffffffffffffffff, 0x70bd2b, 0xfffffffd, {}, [{0x90, 0x1, [@m_bpf={0x8c, 0x1, 0x0, 0x0, {{0x8}, {0x64, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x1}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x3, 0x10, 0xffffffffffffffff, 0x7fffffff, 0x3ff}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_FD={0x8, 0x5, r3}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) fstatfs(r5, &(0x7f00000007c0)=""/205) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x810) 555.509505ms ago: executing program 4 (id=114): r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000400)={0x0, 'batadv0\x00', {0xb}}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848140000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="5e04000000ff00000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) uname(0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000100240248ff05000500", 0x2c}, {&(0x7f00000019c0)="06bb", 0x2}], 0x2}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) io_uring_register$IORING_REGISTER_MEM_REGION(0xffffffffffffffff, 0x22, 0x0, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5, 0x0, 0x8ece}, 0x18) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x1208002, &(0x7f0000000100)={[{@grpquota}, {@delalloc}, {@resuid}, {@debug}, {@dioread_nolock}, {}, {@nomblk_io_submit}, {@noauto_da_alloc}]}, 0x1, 0x5d8, &(0x7f00000005c0)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") lchown(&(0x7f00000006c0)='./file0\x00', 0x0, 0xee01) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) perf_event_open(&(0x7f0000000040)={0x4, 0x5a, 0x64, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000c40)}, 0x0, 0x5, 0x800002, 0x0, 0x2, 0x2, 0x1ff, 0x0, 0xff}, 0x0, 0x3, 0xffffffffffffffff, 0x1) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x20, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x20}}, 0x24024800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000000)=@sg0, 0x0, &(0x7f0000000bc0)={0xc, 0x3e0, 0xca, 0x7fffffffffffffff, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x5}) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x1, 0x3, 0x0, 0x80000000000000, 0xfffffffffffffffa, 0x7}, 0x0) 201.851034ms ago: executing program 0 (id=115): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000580)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000100000000000000070000001801", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008520000001000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x2b, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={0x0, r3, 0x0, 0x1}, 0x18) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'vlan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000000041000001c00128009000100766c61", @ANYRES32=r5, @ANYBLOB="080004"], 0x4c}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c000000020681010000000000000000000000000500050002000000050001000700000005000400030000000900020073797a310000000011000300686173683a6e65742c6e6574"], 0x4c}, 0x1, 0x0, 0x0, 0x4040000}, 0x800) sendmsg$IPSET_CMD_ADD(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="50000000090601020000000000000000030000000900020073797a31000000000500010007000000280007800c00018008000140e00000010c00148008000140ac1414bb0c00028008000140"], 0x50}, 0x1, 0x0, 0x0, 0xd24f4d5778621d46}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00', r7}, 0x18) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a300000000014000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0xc, &(0x7f0000000000)=0x201, 0x4) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c0000004a00030000040000000000000a"], 0x1c}}, 0x0) 702.07µs ago: executing program 0 (id=116): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@ipv4_delroute={0x1c, 0x19, 0x901, 0x0, 0x20, {0x2, 0x18, 0x0, 0x0, 0x0, 0x2, 0xfd, 0x1}}, 0x1c}}, 0x0) 0s ago: executing program 0 (id=117): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000010000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000100)="0100", 0x2, 0xffffffffffffffff) mkdir(&(0x7f0000000580)='./file0\x00', 0x92) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001140)='/proc/zoneinfo\x00', 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendfile(r3, r2, 0x0, 0x2) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001100)=ANY=[], 0x28}}, 0x4) stat(&(0x7f0000000380)='./file3\x00', &(0x7f00000004c0)) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$setregs(0xf, r4, 0x9, &(0x7f0000000100)="10b73ce10e87f5e02dbc182713135d640a9c4b75a99a5bae09da102a9fb48926529c1a11d8feebdd3f0bbb2a7ba7355a465761c0dedbb7718b0ab6c806e1dd7512931d786a2b647249e6c75674b0faf29bf5b13865c71b3a636de9f8de759afb7c8212841041e9a0eac93399fde130fb0139c1f69aeb46f01dd8d1cea13626eccc3bed49463122b3a7247a90eba7c1af2156a5a7db4836a7bed8d437ce601b296bcc7be322bb4d4ed242cde4855b99937f368d47fd28311480") mount$9p_tcp(&(0x7f0000001380), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x801, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e20,afid=0x0000000000000004,uname=(},fowner<', @ANYRESDEC=0x0, @ANYBLOB="0175a0143e", @ANYRESDEC=0x0, @ANYBLOB=',hash,dont_hash,uid>', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$pppl2tp(0x18, 0x1, 0x1) syz_read_part_table(0x1060, &(0x7f0000000000)="$eJzsz8FpAlEUBdA7n/mZCQSyTxFTRxaBrLJOE/bhypUd2I7FiIJ8YRwtQV2cs3k8ePfBDc9VcmqttXLb345J9zVmSsm2Jqm/U9Jm6Yd7bH+dbTinbuqSTbKu+U/qe5KPJN3PMCar75Skn48+D+Pyo8vf7qFdAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOBFXQIAAP//s1YVKg==") inotify_add_watch(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x100080c) ptrace$setregs(0xf, r4, 0x7fbb, &(0x7f00000013c0)="5657ea9ca3ce8f22efd1e4563b809cf6dd285dd954807dc34a4dd02f6087b3dc2ab9113eb773299eadbd63333484733950de597ff15406") readv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000005c0)=""/121, 0x79}], 0x1) r5 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000001080), 0x1, 0x0) inotify_init1(0x0) lseek(r5, 0xfffffffffffffff7, 0x4) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000010c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xeb}}, './file1\x00'}) lsetxattr$security_ima(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300), &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0x12, 0x1) poll(&(0x7f0000000180)=[{r6, 0x2}], 0x1, 0x7) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.46' (ED25519) to the list of known hosts. [ 32.623828][ T29] audit: type=1400 audit(1755644909.789:62): avc: denied { mounton } for pid=3292 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 32.624640][ T3292] cgroup: Unknown subsys name 'net' [ 32.647884][ T29] audit: type=1400 audit(1755644909.789:63): avc: denied { mount } for pid=3292 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 32.676127][ T29] audit: type=1400 audit(1755644909.819:64): avc: denied { unmount } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 32.807188][ T3292] cgroup: Unknown subsys name 'cpuset' [ 32.813607][ T3292] cgroup: Unknown subsys name 'rlimit' [ 33.003404][ T29] audit: type=1400 audit(1755644910.169:65): avc: denied { setattr } for pid=3292 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.028820][ T29] audit: type=1400 audit(1755644910.169:66): avc: denied { create } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.042535][ T3294] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 33.050413][ T29] audit: type=1400 audit(1755644910.169:67): avc: denied { write } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.081059][ T29] audit: type=1400 audit(1755644910.169:68): avc: denied { read } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 33.097387][ T3292] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 33.102469][ T29] audit: type=1400 audit(1755644910.179:69): avc: denied { mounton } for pid=3292 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 33.138653][ T29] audit: type=1400 audit(1755644910.179:70): avc: denied { mount } for pid=3292 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 33.163453][ T29] audit: type=1400 audit(1755644910.229:71): avc: denied { relabelto } for pid=3294 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 34.256675][ T3303] chnl_net:caif_netlink_parms(): no params data found [ 34.333884][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.341231][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.348747][ T3303] bridge_slave_0: entered allmulticast mode [ 34.355415][ T3303] bridge_slave_0: entered promiscuous mode [ 34.376129][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.383377][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.391265][ T3303] bridge_slave_1: entered allmulticast mode [ 34.398127][ T3303] bridge_slave_1: entered promiscuous mode [ 34.412359][ T3307] chnl_net:caif_netlink_parms(): no params data found [ 34.421377][ T3301] chnl_net:caif_netlink_parms(): no params data found [ 34.459067][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.469642][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.513441][ T3303] team0: Port device team_slave_0 added [ 34.520403][ T3303] team0: Port device team_slave_1 added [ 34.543931][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 34.562109][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.569686][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.577259][ T3307] bridge_slave_0: entered allmulticast mode [ 34.583743][ T3307] bridge_slave_0: entered promiscuous mode [ 34.601832][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.609367][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.636612][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.649219][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.656783][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.684266][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.695369][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.702829][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.710262][ T3307] bridge_slave_1: entered allmulticast mode [ 34.717085][ T3307] bridge_slave_1: entered promiscuous mode [ 34.762713][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.774668][ T3301] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.782091][ T3301] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.789602][ T3301] bridge_slave_0: entered allmulticast mode [ 34.796149][ T3301] bridge_slave_0: entered promiscuous mode [ 34.803460][ T3301] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.810597][ T3301] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.818626][ T3301] bridge_slave_1: entered allmulticast mode [ 34.825341][ T3301] bridge_slave_1: entered promiscuous mode [ 34.838730][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.862449][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 34.881528][ T3301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.892235][ T3301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.910915][ T3303] hsr_slave_0: entered promiscuous mode [ 34.917283][ T3303] hsr_slave_1: entered promiscuous mode [ 34.940510][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.947730][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.955213][ T3310] bridge_slave_0: entered allmulticast mode [ 34.961854][ T3310] bridge_slave_0: entered promiscuous mode [ 34.968651][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.975969][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.983688][ T3310] bridge_slave_1: entered allmulticast mode [ 34.990184][ T3310] bridge_slave_1: entered promiscuous mode [ 34.996989][ T3307] team0: Port device team_slave_0 added [ 35.018893][ T3307] team0: Port device team_slave_1 added [ 35.030035][ T3301] team0: Port device team_slave_0 added [ 35.037140][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.060586][ T3301] team0: Port device team_slave_1 added [ 35.072531][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.110838][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.118045][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.145201][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.159376][ T3301] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.166633][ T3301] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.193102][ T3301] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.204911][ T3310] team0: Port device team_slave_0 added [ 35.211830][ T3310] team0: Port device team_slave_1 added [ 35.222880][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.230391][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.257467][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.273493][ T3301] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.280730][ T3301] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.307907][ T3301] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.344270][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.351539][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.378454][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.391619][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.399135][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.406411][ T3314] bridge_slave_0: entered allmulticast mode [ 35.413290][ T3314] bridge_slave_0: entered promiscuous mode [ 35.420878][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.428147][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.435857][ T3314] bridge_slave_1: entered allmulticast mode [ 35.442646][ T3314] bridge_slave_1: entered promiscuous mode [ 35.454957][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.462209][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.489438][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.537853][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.553302][ T3307] hsr_slave_0: entered promiscuous mode [ 35.559511][ T3307] hsr_slave_1: entered promiscuous mode [ 35.565719][ T3307] debugfs: 'hsr0' already exists in 'hsr' [ 35.571704][ T3307] Cannot create hsr debugfs directory [ 35.579085][ T3301] hsr_slave_0: entered promiscuous mode [ 35.585119][ T3301] hsr_slave_1: entered promiscuous mode [ 35.591313][ T3301] debugfs: 'hsr0' already exists in 'hsr' [ 35.597302][ T3301] Cannot create hsr debugfs directory [ 35.603716][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.662610][ T3310] hsr_slave_0: entered promiscuous mode [ 35.668820][ T3310] hsr_slave_1: entered promiscuous mode [ 35.675004][ T3310] debugfs: 'hsr0' already exists in 'hsr' [ 35.681059][ T3310] Cannot create hsr debugfs directory [ 35.695659][ T3314] team0: Port device team_slave_0 added [ 35.702717][ T3314] team0: Port device team_slave_1 added [ 35.742768][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.750077][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.776922][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.802840][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.810124][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.837030][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.881036][ T3303] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 35.903553][ T3314] hsr_slave_0: entered promiscuous mode [ 35.909907][ T3314] hsr_slave_1: entered promiscuous mode [ 35.915964][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 35.921912][ T3314] Cannot create hsr debugfs directory [ 35.927652][ T3303] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 35.948246][ T3303] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 35.971710][ T3303] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 36.033561][ T3301] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 36.048896][ T3301] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 36.060710][ T3301] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 36.074969][ T3301] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 36.090464][ T3307] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 36.100173][ T3307] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 36.110937][ T3307] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 36.121002][ T3307] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 36.151946][ T3310] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 36.162239][ T3310] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 36.171601][ T3310] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 36.180451][ T3310] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 36.221989][ T3314] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 36.234033][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.250445][ T3314] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 36.260023][ T3314] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 36.269736][ T3314] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 36.288960][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.318113][ T57] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.325360][ T57] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.337341][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.344806][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.355692][ T3301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.374728][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.395888][ T3307] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.407258][ T3301] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.423611][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.431158][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.440673][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.448085][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.462403][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.469681][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.478341][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.485689][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.495841][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.512597][ T3303] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 36.523380][ T3303] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 36.559104][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.592538][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.599914][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.627378][ T1613] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.634935][ T1613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.651198][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.665661][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.684443][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.710948][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.718324][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.741372][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.759059][ T1613] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.766675][ T1613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.808777][ T3301] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.866047][ T3303] veth0_vlan: entered promiscuous mode [ 36.899868][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.915391][ T3303] veth1_vlan: entered promiscuous mode [ 36.936254][ T3303] veth0_macvtap: entered promiscuous mode [ 36.956151][ T3303] veth1_macvtap: entered promiscuous mode [ 36.977327][ T3301] veth0_vlan: entered promiscuous mode [ 36.989453][ T3301] veth1_vlan: entered promiscuous mode [ 37.002630][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.013662][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.036913][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.049855][ T3307] veth0_vlan: entered promiscuous mode [ 37.064127][ T57] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.083297][ T3307] veth1_vlan: entered promiscuous mode [ 37.102245][ T31] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.111780][ T31] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.121678][ T3301] veth0_macvtap: entered promiscuous mode [ 37.139084][ T57] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.149871][ T3301] veth1_macvtap: entered promiscuous mode [ 37.172631][ T3301] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.190566][ T3303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 37.205534][ T3307] veth0_macvtap: entered promiscuous mode [ 37.220051][ T3301] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.229852][ T3307] veth1_macvtap: entered promiscuous mode [ 37.272905][ T51] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.283078][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.298848][ T3314] veth0_vlan: entered promiscuous mode [ 37.305492][ T3310] veth0_vlan: entered promiscuous mode [ 37.319512][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.331978][ T51] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.359567][ T51] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.369534][ T3310] veth1_vlan: entered promiscuous mode [ 37.388339][ T51] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.397563][ T51] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.406850][ T51] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.415941][ T51] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.425522][ T51] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.445041][ T3314] veth1_vlan: entered promiscuous mode [ 37.460444][ T3310] veth0_macvtap: entered promiscuous mode [ 37.467357][ T3475] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1640 sclass=netlink_route_socket pid=3475 comm=syz.0.1 [ 37.485942][ T3310] veth1_macvtap: entered promiscuous mode [ 37.513359][ T3314] veth0_macvtap: entered promiscuous mode [ 37.638599][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.651692][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.666549][ T60] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.675384][ T29] kauditd_printk_skb: 97 callbacks suppressed [ 37.675403][ T29] audit: type=1400 audit(1755644914.829:169): avc: denied { map_create } for pid=3477 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 37.675627][ T60] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.681707][ T29] audit: type=1400 audit(1755644914.829:170): avc: denied { map_read map_write } for pid=3477 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 37.704080][ T29] audit: type=1400 audit(1755644914.869:171): avc: denied { read write } for pid=3301 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 37.731710][ T3314] veth1_macvtap: entered promiscuous mode [ 37.755705][ T29] audit: type=1400 audit(1755644914.869:172): avc: denied { open } for pid=3301 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 37.765491][ T60] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.807955][ T29] audit: type=1400 audit(1755644914.959:173): avc: denied { ioctl } for pid=3301 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=100 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 37.807990][ T29] audit: type=1400 audit(1755644914.959:174): avc: denied { read write } for pid=3477 comm="syz.1.2" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 37.808016][ T29] audit: type=1400 audit(1755644914.969:175): avc: denied { open } for pid=3477 comm="syz.1.2" path="/dev/virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 37.808104][ T29] audit: type=1400 audit(1755644914.969:176): avc: denied { prog_run } for pid=3482 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 37.808127][ T29] audit: type=1400 audit(1755644914.969:177): avc: denied { mounton } for pid=3482 comm="syz.0.6" path="/1/file0" dev="tmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 37.808169][ T29] audit: type=1400 audit(1755644914.969:178): avc: denied { mount } for pid=3482 comm="syz.0.6" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 37.814774][ T3483] 9pnet_fd: p9_fd_create_tcp (3483): problem connecting socket to 127.0.0.1 [ 37.889230][ T3483] loop0: detected capacity change from 0 to 8192 [ 37.905757][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.003202][ T60] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.027121][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.053863][ T3472] loop0: p1 p2 < > p3 p4 < p5 > [ 38.059028][ T3472] loop0: partition table partially beyond EOD, truncated [ 38.068033][ T3472] loop0: p1 size 100663296 extends beyond EOD, truncated [ 38.079928][ T51] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.094965][ T3472] loop0: p2 start 591104 is beyond EOD, truncated [ 38.094996][ T3472] loop0: p3 start 33572980 is beyond EOD, truncated [ 38.110389][ T51] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.122173][ T51] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.131577][ T51] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.158439][ T3472] loop0: p5 size 100663296 extends beyond EOD, truncated [ 38.183222][ T3483] loop0: p1 p2 < > p3 p4 < p5 > [ 38.188367][ T3483] loop0: partition table partially beyond EOD, truncated [ 38.221360][ T3497] vcan0: tx drop: invalid sa for name 0x0000000000010000 [ 38.229030][ T3483] loop0: p1 size 100663296 extends beyond EOD, truncated [ 38.239361][ T3483] loop0: p2 start 591104 is beyond EOD, truncated [ 38.246034][ T3483] loop0: p3 start 33572980 is beyond EOD, truncated [ 38.266921][ T3497] netlink: 'syz.2.3': attribute type 1 has an invalid length. [ 38.274637][ T3497] netlink: 224 bytes leftover after parsing attributes in process `syz.2.3'. [ 38.338363][ T3483] loop0: p5 size 100663296 extends beyond EOD, truncated [ 38.548354][ T3503] netlink: 'syz.4.5': attribute type 4 has an invalid length. [ 38.975003][ T3295] udevd[3295]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory [ 38.975021][ T3288] udevd[3288]: inotify_add_watch(7, /dev/loop0p5, 10) failed: No such file or directory [ 38.992476][ T3472] udevd[3472]: inotify_add_watch(7, /dev/loop0p1, 10) failed: No such file or directory [ 39.045536][ T3472] udevd[3472]: inotify_add_watch(7, /dev/loop0p1, 10) failed: No such file or directory [ 39.057349][ T3288] udevd[3288]: inotify_add_watch(7, /dev/loop0p5, 10) failed: No such file or directory [ 39.078154][ T3503] syz.4.5 (3503) used greatest stack depth: 10904 bytes left [ 39.088826][ T3295] udevd[3295]: inotify_add_watch(7, /dev/loop0p4, 10) failed: No such file or directory [ 39.173408][ T3516] 9pnet_fd: p9_fd_create_tcp (3516): problem connecting socket to 127.0.0.1 [ 39.333880][ T3516] loop4: detected capacity change from 0 to 8192 [ 39.458785][ T3516] loop4: p1 p2 < > p3 p4 < p5 > [ 39.463977][ T3516] loop4: partition table partially beyond EOD, truncated [ 39.487666][ T3516] loop4: p1 size 100663296 extends beyond EOD, truncated [ 39.517228][ T3516] loop4: p2 start 591104 is beyond EOD, truncated [ 39.523810][ T3516] loop4: p3 start 33572980 is beyond EOD, truncated [ 39.555566][ T3516] loop4: p5 size 100663296 extends beyond EOD, truncated [ 39.689939][ T3529] netlink: 16 bytes leftover after parsing attributes in process `syz.0.14'. [ 39.704692][ T3472] udevd[3472]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 39.709255][ T3295] udevd[3295]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 39.728119][ T3288] udevd[3288]: inotify_add_watch(7, /dev/loop4p5, 10) failed: No such file or directory [ 39.812227][ T3533] 9pnet_fd: p9_fd_create_tcp (3533): problem connecting socket to 127.0.0.1 [ 39.890003][ T3533] loop0: detected capacity change from 0 to 8192 [ 39.927206][ T3472] loop0: p1 p2 < > p3 p4 < p5 > [ 39.944500][ T3472] loop0: partition table partially beyond EOD, truncated [ 39.966547][ T3472] loop0: p1 size 100663296 extends beyond EOD, truncated [ 39.975638][ T3472] loop0: p2 start 591104 is beyond EOD, truncated [ 39.982491][ T3472] loop0: p3 start 33572980 is beyond EOD, truncated [ 39.998224][ T3514] syz.3.10 (3514) used greatest stack depth: 7536 bytes left [ 40.006582][ T3472] loop0: p5 size 100663296 extends beyond EOD, truncated [ 40.021253][ T3533] loop0: p1 p2 < > p3 p4 < p5 > [ 40.026597][ T3533] loop0: partition table partially beyond EOD, truncated [ 40.039349][ T3533] loop0: p1 size 100663296 extends beyond EOD, truncated [ 40.047721][ T3533] loop0: p2 start 591104 is beyond EOD, truncated [ 40.054717][ T3533] loop0: p3 start 33572980 is beyond EOD, truncated [ 40.082428][ T3533] loop0: p5 size 100663296 extends beyond EOD, truncated [ 40.116862][ T2992] loop0: p1 p2 < > p3 p4 < p5 > [ 40.122040][ T2992] loop0: partition table partially beyond EOD, truncated [ 40.152520][ T2992] loop0: p1 size 100663296 extends beyond EOD, truncated [ 40.308509][ T2992] loop0: p2 start 591104 is beyond EOD, truncated [ 40.315128][ T2992] loop0: p3 start 33572980 is beyond EOD, truncated [ 40.361342][ T2992] loop0: p5 size 100663296 extends beyond EOD, truncated [ 40.380559][ T3549] usb usb1: check_ctrlrecip: process 3549 (syz.1.20) requesting ep 01 but needs 81 [ 40.390654][ T3549] usb usb1: usbfs: process 3549 (syz.1.20) did not claim interface 0 before use [ 40.447834][ T3288] udevd[3288]: inotify_add_watch(7, /dev/loop0p5, 10) failed: No such file or directory [ 41.001920][ T3552] loop0: detected capacity change from 0 to 512 [ 41.043082][ T3552] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.086607][ T3552] ext4 filesystem being mounted at /5/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 41.160586][ T3566] 9pnet_fd: p9_fd_create_tcp (3566): problem connecting socket to 127.0.0.1 [ 41.221946][ T3301] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.281819][ T3566] loop2: detected capacity change from 0 to 8192 [ 41.359781][ T3472] loop2: p1 p2 < > p3 p4 < p5 > [ 41.364781][ T3472] loop2: partition table partially beyond EOD, truncated [ 41.392216][ T3472] loop2: p1 size 100663296 extends beyond EOD, truncated [ 41.451000][ T3472] loop2: p2 start 591104 is beyond EOD, truncated [ 41.457745][ T3472] loop2: p3 start 33572980 is beyond EOD, truncated [ 41.485600][ T3472] loop2: p5 size 100663296 extends beyond EOD, truncated [ 42.225356][ T3536] syz.4.13 (3536) used greatest stack depth: 6416 bytes left [ 42.249031][ T3566] loop2: p1 p2 < > p3 p4 < p5 > [ 42.254312][ T3566] loop2: partition table partially beyond EOD, truncated [ 42.286436][ T3566] loop2: p1 size 100663296 extends beyond EOD, truncated [ 42.294658][ T3579] loop0: detected capacity change from 0 to 2048 [ 42.302467][ T3566] loop2: p2 start 591104 is beyond EOD, truncated [ 42.309282][ T3566] loop2: p3 start 33572980 is beyond EOD, truncated [ 42.340437][ T3579] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 42.363481][ T3566] loop2: p5 size 100663296 extends beyond EOD, truncated [ 42.503041][ T3590] netlink: 16 bytes leftover after parsing attributes in process `syz.2.31'. [ 42.504635][ T3585] 9pnet_fd: p9_fd_create_tcp (3585): problem connecting socket to 127.0.0.1 [ 42.588028][ T3594] syz.0.27 uses obsolete (PF_INET,SOCK_PACKET) [ 42.678171][ T3585] loop4: detected capacity change from 0 to 8192 [ 42.749056][ T3472] loop4: p1 p2 < > p3 p4 < p5 > [ 42.754351][ T3472] loop4: partition table partially beyond EOD, truncated [ 42.766469][ T3472] loop4: p1 size 100663296 extends beyond EOD, truncated [ 42.785572][ T3472] loop4: p2 start 591104 is beyond EOD, truncated [ 42.792519][ T3472] loop4: p3 start 33572980 is beyond EOD, truncated [ 42.828380][ T3472] loop4: p5 size 100663296 extends beyond EOD, truncated [ 42.885768][ T29] kauditd_printk_skb: 90 callbacks suppressed [ 42.885785][ T29] audit: type=1326 audit(1755644920.049:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3600 comm="syz.1.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f783137ebe9 code=0x7ffc0000 [ 42.919512][ T29] audit: type=1326 audit(1755644920.089:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3600 comm="syz.1.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=201 compat=0 ip=0x7f783137ebe9 code=0x7ffc0000 [ 42.943364][ T29] audit: type=1326 audit(1755644920.089:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3600 comm="syz.1.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f783137ebe9 code=0x7ffc0000 [ 42.968612][ T29] audit: type=1326 audit(1755644920.089:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3600 comm="syz.1.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f783137ebe9 code=0x7ffc0000 [ 42.992885][ T29] audit: type=1326 audit(1755644920.089:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3600 comm="syz.1.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=64 compat=0 ip=0x7f783137ebe9 code=0x7ffc0000 [ 43.016529][ T29] audit: type=1326 audit(1755644920.089:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3600 comm="syz.1.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f783137ebe9 code=0x7ffc0000 [ 43.037871][ T3585] loop4: p1 p2 < > p3 p4 < p5 > [ 43.041295][ T29] audit: type=1326 audit(1755644920.089:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3600 comm="syz.1.35" exe="/root/syz-executor" sig=0 arch=c000003e syscall=65 compat=0 ip=0x7f783137ebe9 code=0x7ffc0000 [ 43.046769][ T3585] loop4: partition table partially beyond EOD, truncated [ 43.073265][ T3585] loop4: p1 size 100663296 extends beyond EOD, truncated [ 43.115381][ T3585] loop4: p2 start 591104 is beyond EOD, truncated [ 43.122324][ T3585] loop4: p3 start 33572980 is beyond EOD, truncated [ 43.158038][ T3585] loop4: p5 size 100663296 extends beyond EOD, truncated [ 43.217892][ T3301] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.241727][ T3605] loop3: detected capacity change from 0 to 2048 [ 43.281493][ T29] audit: type=1326 audit(1755644920.449:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3606 comm="syz.0.37" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fe082ebe9 code=0x7ffc0000 [ 43.305464][ T29] audit: type=1326 audit(1755644920.449:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3606 comm="syz.0.37" exe="/root/syz-executor" sig=0 arch=c000003e syscall=201 compat=0 ip=0x7f9fe082ebe9 code=0x7ffc0000 [ 43.329149][ T29] audit: type=1326 audit(1755644920.449:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3606 comm="syz.0.37" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9fe082ebe9 code=0x7ffc0000 [ 43.383493][ T3605] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 43.693768][ T3622] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1640 sclass=netlink_route_socket pid=3622 comm=syz.2.40 [ 44.192351][ T3303] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.278726][ T3635] 9pnet_fd: Insufficient options for proto=fd [ 44.321280][ T3635] 9pnet_fd: Insufficient options for proto=fd [ 44.573414][ T3637] 9pnet_fd: p9_fd_create_tcp (3637): problem connecting socket to 127.0.0.1 [ 44.711296][ T3637] loop3: detected capacity change from 0 to 8192 [ 44.854644][ T3649] 9pnet_fd: p9_fd_create_tcp (3649): problem connecting socket to 127.0.0.1 [ 44.864766][ T3472] loop3: p1 p2 < > p3 p4 < p5 > [ 44.870051][ T3472] loop3: partition table partially beyond EOD, truncated [ 44.886870][ T3472] loop3: p1 size 100663296 extends beyond EOD, truncated [ 44.917610][ T3649] loop1: detected capacity change from 0 to 8192 [ 44.922115][ T3472] loop3: p2 start 591104 is beyond EOD, truncated [ 44.930888][ T3472] loop3: p3 start 33572980 is beyond EOD, truncated [ 44.977289][ T3646] loop2: detected capacity change from 0 to 512 [ 45.083259][ T3654] netlink: 'syz.0.45': attribute type 4 has an invalid length. [ 45.105496][ T3649] loop1: p1 p2 < > p3 p4 < p5 > [ 45.110849][ T3649] loop1: partition table partially beyond EOD, truncated [ 45.167013][ T3472] loop3: p5 size 100663296 extends beyond EOD, truncated [ 45.215499][ T3649] loop1: p1 size 100663296 extends beyond EOD, truncated [ 45.238775][ T3637] loop3: p1 p2 < > p3 p4 < p5 > [ 45.243845][ T3637] loop3: partition table partially beyond EOD, truncated [ 45.257363][ T3646] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 45.279993][ T3637] loop3: p1 size 100663296 extends beyond EOD, truncated [ 45.289559][ T3649] loop1: p2 start 591104 is beyond EOD, truncated [ 45.296644][ T3649] loop1: p3 start 33572980 is beyond EOD, truncated [ 45.297760][ T3646] ext4 filesystem being mounted at /9/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 45.347260][ T3637] loop3: p2 start 591104 is beyond EOD, truncated [ 45.353867][ T3637] loop3: p3 start 33572980 is beyond EOD, truncated [ 45.365524][ T3649] loop1: p5 size 100663296 extends beyond EOD, truncated [ 45.391477][ T3637] loop3: p5 size 100663296 extends beyond EOD, truncated [ 45.875760][ T3314] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.033062][ T3288] udevd[3288]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 46.050543][ T3670] udevd[3670]: inotify_add_watch(7, /dev/loop1p5, 10) failed: No such file or directory [ 46.050656][ T3295] udevd[3295]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 46.146434][ T3672] program syz.2.51 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 46.160482][ T3555] udevd[3555]: inotify_add_watch(7, /dev/loop3p5, 10) failed: No such file or directory [ 46.160441][ T3670] udevd[3670]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 46.178406][ T3472] udevd[3472]: inotify_add_watch(7, /dev/loop3p1, 10) failed: No such file or directory [ 46.187294][ T3672] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 46.431813][ T3664] loop3: detected capacity change from 0 to 512 [ 46.452003][ T3664] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 46.465411][ T3664] ext4 filesystem being mounted at /9/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 46.508050][ T3303] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.672675][ T3685] 9pnet_fd: p9_fd_create_tcp (3685): problem connecting socket to 127.0.0.1 [ 46.778672][ T3685] loop4: detected capacity change from 0 to 8192 [ 46.836665][ T3670] loop4: p1 p2 < > p3 p4 < p5 > [ 46.841763][ T3670] loop4: partition table partially beyond EOD, truncated [ 46.856536][ T3670] loop4: p1 size 100663296 extends beyond EOD, truncated [ 46.872732][ T3670] loop4: p2 start 591104 is beyond EOD, truncated [ 46.879844][ T3670] loop4: p3 start 33572980 is beyond EOD, truncated [ 46.907872][ T3670] loop4: p5 size 100663296 extends beyond EOD, truncated [ 46.918358][ T3685] loop4: p1 p2 < > p3 p4 < p5 > [ 46.923890][ T3685] loop4: partition table partially beyond EOD, truncated [ 46.934167][ T3685] loop4: p1 size 100663296 extends beyond EOD, truncated [ 46.957745][ T3685] loop4: p2 start 591104 is beyond EOD, truncated [ 46.964563][ T3685] loop4: p3 start 33572980 is beyond EOD, truncated [ 46.974498][ T3685] loop4: p5 size 100663296 extends beyond EOD, truncated [ 47.137871][ T3295] udevd[3295]: inotify_add_watch(7, /dev/loop4p5, 10) failed: No such file or directory [ 47.148178][ T3472] udevd[3472]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 47.150710][ T3670] udevd[3670]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 47.290260][ T3698] netlink: 'syz.4.57': attribute type 4 has an invalid length. [ 47.459539][ C0] hrtimer: interrupt took 54887 ns [ 48.352770][ T3714] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1640 sclass=netlink_route_socket pid=3714 comm=syz.4.60 [ 48.534807][ T29] kauditd_printk_skb: 100 callbacks suppressed [ 48.534824][ T29] audit: type=1326 audit(1755644925.699:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3713 comm="syz.4.60" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eaac0ebe9 code=0x7ffc0000 [ 48.811548][ T29] audit: type=1326 audit(1755644925.739:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3713 comm="syz.4.60" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f0eaac0ebe9 code=0x7ffc0000 [ 48.835238][ T29] audit: type=1400 audit(1755644925.739:381): avc: denied { create } for pid=3713 comm="syz.4.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 48.855101][ T29] audit: type=1326 audit(1755644925.739:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3713 comm="syz.4.60" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eaac0ebe9 code=0x7ffc0000 [ 48.855131][ T29] audit: type=1326 audit(1755644925.749:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3713 comm="syz.4.60" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f0eaac0ebe9 code=0x7ffc0000 [ 48.855207][ T29] audit: type=1400 audit(1755644925.749:384): avc: denied { setopt } for pid=3713 comm="syz.4.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 48.888015][ T3472] udevd[3472]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 48.902775][ T29] audit: type=1326 audit(1755644925.749:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3713 comm="syz.4.60" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eaac0ebe9 code=0x7ffc0000 [ 48.958158][ T29] audit: type=1326 audit(1755644925.749:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3713 comm="syz.4.60" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0eaac0ebe9 code=0x7ffc0000 [ 48.981835][ T29] audit: type=1326 audit(1755644925.769:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3713 comm="syz.4.60" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eaac0ebe9 code=0x7ffc0000 [ 49.005551][ T29] audit: type=1326 audit(1755644925.769:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3713 comm="syz.4.60" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0eaac0ebe9 code=0x7ffc0000 [ 49.248489][ T3725] 9pnet_fd: p9_fd_create_tcp (3725): problem connecting socket to 127.0.0.1 [ 49.345227][ T3725] loop4: detected capacity change from 0 to 8192 [ 49.527830][ T3725] loop4: p1 p2 < > p3 p4 < p5 > [ 49.533005][ T3725] loop4: partition table partially beyond EOD, truncated [ 49.573585][ T3725] loop4: p1 size 100663296 extends beyond EOD, truncated [ 49.598191][ T3725] loop4: p2 start 591104 is beyond EOD, truncated [ 49.604880][ T3725] loop4: p3 start 33572980 is beyond EOD, truncated [ 49.616070][ T3725] loop4: p5 size 100663296 extends beyond EOD, truncated [ 49.990581][ T3719] syz.1.62 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 50.001861][ T3719] CPU: 1 UID: 0 PID: 3719 Comm: syz.1.62 Not tainted syzkaller #0 PREEMPT(voluntary) [ 50.001886][ T3719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 50.001897][ T3719] Call Trace: [ 50.001905][ T3719] [ 50.002052][ T3719] __dump_stack+0x1d/0x30 [ 50.002073][ T3719] dump_stack_lvl+0xe8/0x140 [ 50.002118][ T3719] dump_stack+0x15/0x1b [ 50.002136][ T3719] dump_header+0x81/0x220 [ 50.002167][ T3719] oom_kill_process+0x342/0x400 [ 50.002230][ T3719] out_of_memory+0x979/0xb80 [ 50.002333][ T3719] try_charge_memcg+0x5e6/0x9e0 [ 50.002364][ T3719] charge_memcg+0x51/0xc0 [ 50.002389][ T3719] mem_cgroup_swapin_charge_folio+0xcc/0x150 [ 50.002415][ T3719] __read_swap_cache_async+0x1df/0x350 [ 50.002447][ T3719] swap_cluster_readahead+0x277/0x3e0 [ 50.002491][ T3719] swapin_readahead+0xde/0x6f0 [ 50.002542][ T3719] ? __filemap_get_folio+0x4f7/0x6b0 [ 50.002625][ T3719] ? __rcu_read_unlock+0x34/0x70 [ 50.002645][ T3719] ? swap_cache_get_folio+0x77/0x200 [ 50.002673][ T3719] do_swap_page+0x301/0x2430 [ 50.002756][ T3719] ? css_rstat_updated+0xb7/0x240 [ 50.002858][ T3719] ? __pfx_default_wake_function+0x10/0x10 [ 50.002880][ T3719] handle_mm_fault+0x9a5/0x2c20 [ 50.002914][ T3719] do_user_addr_fault+0x636/0x1090 [ 50.003027][ T3719] exc_page_fault+0x62/0xa0 [ 50.003092][ T3719] asm_exc_page_fault+0x26/0x30 [ 50.003165][ T3719] RIP: 0033:0x7f783125566e [ 50.003180][ T3719] Code: 0c 85 c0 74 e7 48 89 df 48 81 c3 f0 00 00 00 e8 18 c4 ff ff 48 39 eb 75 df 0f 1f 00 8b 05 46 27 35 00 85 c0 0f 8e a3 fd ff ff dd 9d fe ff 49 39 c4 73 a0 48 8d 1d 21 09 35 00 83 3d 26 27 35 [ 50.003198][ T3719] RSP: 002b:00007ffc19f219f0 EFLAGS: 00010206 [ 50.003217][ T3719] RAX: 0000000000000003 RBX: 00007f78315a7da0 RCX: 0000000000000000 [ 50.003229][ T3719] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00005555931bc808 [ 50.003240][ T3719] RBP: 00007f78315a7da0 R08: 0000000000000000 R09: 7fffffffffffffff [ 50.003258][ T3719] R10: 0000000000000000 R11: 0000000000000293 R12: 000000000000c30b [ 50.003272][ T3719] R13: 00007ffc19f21ae0 R14: ffffffffffffffff R15: 00007ffc19f21b00 [ 50.003330][ T3719] [ 50.003338][ T3719] memory: usage 307200kB, limit 307200kB, failcnt 252 [ 50.227793][ T3719] memory+swap: usage 307552kB, limit 9007199254740988kB, failcnt 0 [ 50.236250][ T3719] kmem: usage 307196kB, limit 9007199254740988kB, failcnt 0 [ 50.243992][ T3719] Memory cgroup stats for /syz1: [ 50.431595][ T3719] cache 0 [ 50.440166][ T3719] rss 0 [ 50.443025][ T3719] shmem 0 [ 50.445976][ T3719] mapped_file 0 [ 50.450116][ T3719] dirty 0 [ 50.453234][ T3719] writeback 0 [ 50.456566][ T3719] workingset_refault_anon 48 [ 50.461638][ T3719] workingset_refault_file 381 [ 50.466608][ T3719] swap 360448 [ 50.469991][ T3719] swapcached 4096 [ 50.473703][ T3719] pgpgin 10913 [ 50.477316][ T3719] pgpgout 10912 [ 50.481052][ T3719] pgfault 11291 [ 50.484880][ T3719] pgmajfault 19 [ 50.488715][ T3719] inactive_anon 0 [ 50.492554][ T3719] active_anon 4096 [ 50.496842][ T3719] inactive_file 0 [ 50.500669][ T3719] active_file 0 [ 50.504220][ T3719] unevictable 0 [ 50.507775][ T3719] hierarchical_memory_limit 314572800 [ 50.513418][ T3719] hierarchical_memsw_limit 9223372036854771712 [ 50.520203][ T3719] total_cache 0 [ 50.523928][ T3719] total_rss 0 [ 50.527401][ T3719] total_shmem 0 [ 50.531196][ T3719] total_mapped_file 0 [ 50.535203][ T3719] total_dirty 0 [ 50.539015][ T3719] total_writeback 0 [ 50.542839][ T3719] total_workingset_refault_anon 48 [ 50.548650][ T3719] total_workingset_refault_file 381 [ 50.554038][ T3719] total_swap 360448 [ 50.558019][ T3719] total_swapcached 4096 [ 50.562362][ T3719] total_pgpgin 10913 [ 50.566625][ T3719] total_pgpgout 10912 [ 50.570609][ T3719] total_pgfault 11291 [ 50.574868][ T3719] total_pgmajfault 19 [ 50.578899][ T3719] total_inactive_anon 0 [ 50.583083][ T3719] total_active_anon 4096 [ 50.587897][ T3719] total_inactive_file 0 [ 50.592145][ T3719] total_active_file 0 [ 50.596336][ T3719] total_unevictable 0 [ 50.600323][ T3719] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz.1.62,pid=3719,uid=0 [ 50.615367][ T3719] Memory cgroup out of memory: Killed process 3719 (syz.1.62) total-vm:95944kB, anon-rss:944kB, file-rss:22464kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 50.862520][ T3753] 9pnet_fd: p9_fd_create_tcp (3753): problem connecting socket to 127.0.0.1 [ 50.936836][ T3758] vcan0: tx drop: invalid sa for name 0x0000000000010000 [ 50.958649][ T3758] netlink: 'syz.1.70': attribute type 1 has an invalid length. [ 50.966965][ T3758] netlink: 224 bytes leftover after parsing attributes in process `syz.1.70'. [ 51.171037][ T3766] loop1: detected capacity change from 0 to 8192 [ 51.226755][ T3472] loop1: p1 p2 < > p3 p4 < p5 > [ 51.232098][ T3472] loop1: partition table partially beyond EOD, truncated [ 51.247613][ T3472] loop1: p1 size 100663296 extends beyond EOD, truncated [ 51.265850][ T3472] loop1: p2 start 591104 is beyond EOD, truncated [ 51.272718][ T3472] loop1: p3 start 33572980 is beyond EOD, truncated [ 51.297771][ T3472] loop1: p5 size 100663296 extends beyond EOD, truncated [ 51.319918][ T3766] loop1: p1 p2 < > p3 p4 < p5 > [ 51.324997][ T3766] loop1: partition table partially beyond EOD, truncated [ 51.343319][ T3766] loop1: p1 size 100663296 extends beyond EOD, truncated [ 51.369593][ T3766] loop1: p2 start 591104 is beyond EOD, truncated [ 51.376267][ T3766] loop1: p3 start 33572980 is beyond EOD, truncated [ 51.393523][ T3766] loop1: p5 size 100663296 extends beyond EOD, truncated [ 51.478229][ T3775] Zero length message leads to an empty skb [ 51.489056][ T3295] udevd[3295]: inotify_add_watch(7, /dev/loop1p5, 10) failed: No such file or directory [ 51.496766][ T3670] udevd[3670]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 51.500234][ T3472] udevd[3472]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 51.558224][ T3295] udevd[3295]: inotify_add_watch(7, /dev/loop1p5, 10) failed: No such file or directory [ 51.558691][ T3472] udevd[3472]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 51.569427][ T3670] udevd[3670]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 51.647040][ T3782] netlink: 40 bytes leftover after parsing attributes in process `syz.1.78'. [ 51.745448][ T3787] 9pnet_fd: p9_fd_create_tcp (3787): problem connecting socket to 127.0.0.1 [ 51.781615][ T3790] netlink: 'syz.3.81': attribute type 10 has an invalid length. [ 51.793656][ T3790] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.804365][ T3790] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 51.862408][ T3755] syz.0.67 (3755) used greatest stack depth: 6392 bytes left [ 51.871060][ T3796] loop2: detected capacity change from 0 to 2048 [ 51.900699][ T3790] loop3: detected capacity change from 0 to 1024 [ 51.911085][ T3790] EXT4-fs: Ignoring removed nomblk_io_submit option [ 51.920844][ T3796] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 51.945612][ T3790] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e855c01c, mo2=0003] [ 51.960559][ T3790] System zones: 0-1, 3-36 [ 51.983180][ T3790] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 52.019545][ T3790] capability: warning: `syz.3.81' uses deprecated v2 capabilities in a way that may be insecure [ 52.043709][ T3303] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 52.073628][ T3816] 9pnet_fd: p9_fd_create_tcp (3816): problem connecting socket to 127.0.0.1 [ 52.111350][ T3819] loop0: detected capacity change from 0 to 512 [ 52.138790][ T3819] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 52.151638][ T3819] ext4 filesystem being mounted at /19/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 52.197875][ T3301] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 52.444461][ T3829] netlink: 'syz.0.94': attribute type 4 has an invalid length. [ 52.893084][ T3314] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 53.198209][ T3846] 9pnet_fd: p9_fd_create_tcp (3846): problem connecting socket to 127.0.0.1 [ 53.211875][ T3851] netlink: 'syz.3.102': attribute type 10 has an invalid length. [ 53.262751][ T3851] loop3: detected capacity change from 0 to 1024 [ 53.293319][ T3851] EXT4-fs: Ignoring removed nomblk_io_submit option [ 53.301992][ T3851] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e855c01c, mo2=0003] [ 53.311926][ T3851] System zones: 0-1, 3-36 [ 53.317588][ T3851] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 53.373494][ T3846] loop2: detected capacity change from 0 to 8192 [ 53.380772][ T3303] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 53.412801][ T3854] 9pnet_fd: p9_fd_create_tcp (3854): problem connecting socket to 127.0.0.1 [ 53.425176][ T3846] loop2: p1 p2 < > p3 p4 < p5 > [ 53.430293][ T3846] loop2: partition table partially beyond EOD, truncated [ 53.442675][ T3846] loop2: p1 size 100663296 extends beyond EOD, truncated [ 53.466382][ T3846] loop2: p2 start 591104 is beyond EOD, truncated [ 53.473029][ T3846] loop2: p3 start 33572980 is beyond EOD, truncated [ 53.491172][ T3846] loop2: p5 size 100663296 extends beyond EOD, truncated [ 53.515663][ T3854] loop0: detected capacity change from 0 to 8192 [ 53.557999][ T3670] loop0: p1 p2 < > p3 p4 < p5 > [ 53.563334][ T3670] loop0: partition table partially beyond EOD, truncated [ 53.597608][ T3670] loop0: p1 size 100663296 extends beyond EOD, truncated [ 53.616885][ T3670] loop0: p2 start 591104 is beyond EOD, truncated [ 53.624031][ T3670] loop0: p3 start 33572980 is beyond EOD, truncated [ 53.635668][ T3295] udevd[3295]: inotify_add_watch(7, /dev/loop2p4, 10) failed: No such file or directory [ 53.635762][ T3472] udevd[3472]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 53.637566][ T3555] udevd[3555]: inotify_add_watch(7, /dev/loop2p5, 10) failed: No such file or directory [ 53.669309][ T3670] loop0: p5 size 100663296 extends beyond EOD, truncated [ 53.682933][ T3867] loop1: detected capacity change from 0 to 128 [ 53.692517][ T3866] 9pnet_fd: p9_fd_create_tcp (3866): problem connecting socket to 127.0.0.1 [ 53.701832][ T3854] loop0: p1 p2 < > p3 p4 < p5 > [ 53.706939][ T3854] loop0: partition table partially beyond EOD, truncated [ 53.714952][ T3854] loop0: p1 size 100663296 extends beyond EOD, truncated [ 53.724411][ T3854] loop0: p2 start 591104 is beyond EOD, truncated [ 53.731002][ T3854] loop0: p3 start 33572980 is beyond EOD, truncated [ 53.739702][ T3854] loop0: p5 size 100663296 extends beyond EOD, truncated [ 53.747335][ T29] kauditd_printk_skb: 348 callbacks suppressed [ 53.747351][ T29] audit: type=1400 audit(1755644930.909:737): avc: denied { mount } for pid=3864 comm="syz.1.108" name="/" dev="loop1" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 53.789175][ T3867] program syz.1.108 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 53.821953][ T3867] netlink: 100 bytes leftover after parsing attributes in process `syz.1.108'. [ 53.923259][ T29] audit: type=1400 audit(1755644930.989:738): avc: denied { ioctl } for pid=3864 comm="syz.1.108" path="/dev/sg0" dev="devtmpfs" ino=135 ioctlcmd=0x227b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 53.949676][ T29] audit: type=1400 audit(1755644930.989:739): avc: denied { tracepoint } for pid=3864 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 53.969658][ T29] audit: type=1400 audit(1755644930.989:740): avc: denied { create } for pid=3864 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 53.990136][ T29] audit: type=1400 audit(1755644930.989:741): avc: denied { write } for pid=3864 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 54.010703][ T29] audit: type=1400 audit(1755644930.989:742): avc: denied { nlmsg_write } for pid=3864 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 54.082799][ T3876] netlink: 'syz.4.110': attribute type 4 has an invalid length. [ 54.145282][ T3295] udevd[3295]: inotify_add_watch(7, /dev/loop0p5, 10) failed: No such file or directory [ 54.176266][ T3874] loop2: detected capacity change from 0 to 8192 [ 54.327858][ T3670] loop2: p1 p2 < > p3 p4 < p5 > [ 54.333049][ T3670] loop2: partition table partially beyond EOD, truncated [ 54.341339][ T3670] loop2: p1 size 100663296 extends beyond EOD, truncated [ 54.371504][ T3670] loop2: p2 start 591104 is beyond EOD, truncated [ 54.378442][ T3670] loop2: p3 start 33572980 is beyond EOD, truncated [ 54.431467][ T3884] netlink: 'syz.0.111': attribute type 4 has an invalid length. [ 54.544544][ T3670] loop2: p5 size 100663296 extends beyond EOD, truncated [ 54.616785][ T29] audit: type=1400 audit(1755644931.759:743): avc: denied { unmount } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 54.637239][ T29] audit: type=1400 audit(1755644931.769:744): avc: denied { setopt } for pid=3879 comm="syz.4.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 54.836454][ T3887] netlink: 'syz.4.114': attribute type 10 has an invalid length. [ 54.871783][ T3887] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.896083][ T29] audit: type=1326 audit(1755644932.059:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3886 comm="syz.4.114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eaac0ebe9 code=0x7ffc0000 [ 54.936793][ T3887] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 55.007791][ T3888] loop4: detected capacity change from 0 to 1024 [ 55.035618][ T29] audit: type=1326 audit(1755644932.089:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3886 comm="syz.4.114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0eaac0ebe9 code=0x7ffc0000 [ 55.076373][ T3888] EXT4-fs: Ignoring removed nomblk_io_submit option [ 55.156890][ T3874] loop2: p1 p2 < > p3 p4 < p5 > [ 55.162378][ T3874] loop2: partition table partially beyond EOD, truncated [ 55.180183][ T3888] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e855c01c, mo2=0003] [ 55.274852][ T3888] System zones: 0-1, 3-36 [ 55.282003][ T3874] loop2: p1 size 100663296 extends beyond EOD, truncated [ 55.291351][ T3874] loop2: p2 start 591104 is beyond EOD, truncated [ 55.298093][ T3874] loop2: p3 start 33572980 is beyond EOD, truncated [ 55.311339][ T3888] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 55.312502][ T3874] loop2: p5 size 100663296 extends beyond EOD, truncated [ 55.368462][ T2992] ================================================================== [ 55.377300][ T2992] BUG: KCSAN: data-race in dentry_unlink_inode / step_into [ 55.384801][ T2992] [ 55.387325][ T2992] write to 0xffff88810a868270 of 8 bytes by task 3472 on cpu 1: [ 55.395341][ T2992] dentry_unlink_inode+0x65/0x260 [ 55.400491][ T2992] d_delete+0x164/0x180 [ 55.404835][ T2992] d_delete_notify+0x32/0x100 [ 55.409877][ T2992] vfs_unlink+0x30b/0x420 [ 55.414493][ T2992] do_unlinkat+0x24e/0x480 [ 55.418930][ T2992] __x64_sys_unlink+0x2e/0x40 [ 55.423872][ T2992] x64_sys_call+0x2dc0/0x2ff0 [ 55.428727][ T2992] do_syscall_64+0xd2/0x200 [ 55.433325][ T2992] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 55.439655][ T2992] [ 55.441985][ T2992] read to 0xffff88810a868270 of 8 bytes by task 2992 on cpu 0: [ 55.449873][ T2992] step_into+0x122/0x820 [ 55.454211][ T2992] walk_component+0x162/0x220 [ 55.458998][ T2992] path_lookupat+0xfe/0x2a0 [ 55.463599][ T2992] filename_lookup+0x147/0x340 [ 55.469066][ T2992] do_readlinkat+0x7d/0x320 [ 55.473852][ T2992] __x64_sys_readlink+0x47/0x60 [ 55.478739][ T2992] x64_sys_call+0x28da/0x2ff0 [ 55.483570][ T2992] do_syscall_64+0xd2/0x200 [ 55.488202][ T2992] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 55.494454][ T2992] [ 55.496803][ T2992] value changed: 0xffff888152a5ec18 -> 0x0000000000000000 [ 55.504088][ T2992] [ 55.506419][ T2992] Reported by Kernel Concurrency Sanitizer on: [ 55.513191][ T2992] CPU: 0 UID: 0 PID: 2992 Comm: udevd Not tainted syzkaller #0 PREEMPT(voluntary) [ 55.522971][ T2992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 55.533569][ T2992] ================================================================== [ 55.598426][ T3310] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 55.618592][ T3901] 9pnet_fd: p9_fd_create_tcp (3901): problem connecting socket to 127.0.0.1 [ 55.764284][ T3901] loop0: detected capacity change from 0 to 8192 [ 55.817274][ T3901] loop0: p1 p2 < > p3 p4 < p5 > [ 55.822458][ T3901] loop0: partition table partially beyond EOD, truncated [ 55.837509][ T3901] loop0: p1 size 100663296 extends beyond EOD, truncated [ 55.845914][ T3901] loop0: p2 start 591104 is beyond EOD, truncated [ 55.852631][ T3901] loop0: p3 start 33572980 is beyond EOD, truncated [ 55.878884][ T3901] loop0: p5 size 100663296 extends beyond EOD, truncated [ 56.143185][ T3893] syz.1.113 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 56.154497][ T3893] CPU: 1 UID: 0 PID: 3893 Comm: syz.1.113 Not tainted syzkaller #0 PREEMPT(voluntary) [ 56.154552][ T3893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 56.154566][ T3893] Call Trace: [ 56.154573][ T3893] [ 56.154582][ T3893] __dump_stack+0x1d/0x30 [ 56.154637][ T3893] dump_stack_lvl+0xe8/0x140 [ 56.154660][ T3893] dump_stack+0x15/0x1b [ 56.154680][ T3893] dump_header+0x81/0x220 [ 56.154760][ T3893] oom_kill_process+0x342/0x400 [ 56.154798][ T3893] out_of_memory+0x979/0xb80 [ 56.154879][ T3893] try_charge_memcg+0x5e6/0x9e0 [ 56.154913][ T3893] charge_memcg+0x51/0xc0 [ 56.154935][ T3893] mem_cgroup_swapin_charge_folio+0xcc/0x150 [ 56.154961][ T3893] __read_swap_cache_async+0x1df/0x350 [ 56.155077][ T3893] swap_cluster_readahead+0x376/0x3e0 [ 56.155119][ T3893] swapin_readahead+0xde/0x6f0 [ 56.155155][ T3893] ? __filemap_get_folio+0x4f7/0x6b0 [ 56.155249][ T3893] ? __rcu_read_unlock+0x34/0x70 [ 56.155271][ T3893] ? swap_cache_get_folio+0x77/0x200 [ 56.155379][ T3893] do_swap_page+0x301/0x2430 [ 56.155407][ T3893] ? css_rstat_updated+0xb7/0x240 [ 56.155459][ T3893] ? __pfx_default_wake_function+0x10/0x10 [ 56.155554][ T3893] handle_mm_fault+0x9a5/0x2c20 [ 56.155582][ T3893] do_user_addr_fault+0x636/0x1090 [ 56.155695][ T3893] exc_page_fault+0x62/0xa0 [ 56.155754][ T3893] asm_exc_page_fault+0x26/0x30 [ 56.155817][ T3893] RIP: 0033:0x7f783123d9ef [ 56.155832][ T3893] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 41 89 fb 44 8d 56 04 4c 8d 0d 22 46 35 00 89 f0 4c 8d 05 19 26 35 00 89 c2 81 e2 ff 1f 00 00 <49> 8b 0c d1 48 39 f1 74 28 48 85 c9 74 29 45 38 1c 10 75 23 83 c0 [ 56.155849][ T3893] RSP: 002b:00007ffc19f21908 EFLAGS: 00010206 [ 56.155865][ T3893] RAX: 00000000815605bd RBX: 00007f78320d5720 RCX: 0000000000000007 [ 56.155911][ T3893] RDX: 00000000000005bd RSI: ffffffff815605bd RDI: 0000000000000010 [ 56.155926][ T3893] RBP: ffffffff815605bd R08: 00007f7831590000 R09: 00007f7831592000 [ 56.155946][ T3893] R10: 00000000815605c1 R11: 0000000000000010 R12: 0000000000000010 [ 56.155960][ T3893] R13: 0000000000000000 R14: ffffffff81560c0c R15: 0000000000000007 [ 56.155975][ T3893] ? audit_log_start+0x2c/0x6c0 [ 56.156032][ T3893] ? audit_panic+0x8d/0xa0 [ 56.156066][ T3893] ? audit_panic+0x8d/0xa0 [ 56.156170][ T3893] [ 56.156178][ T3893] memory: usage 307200kB, limit 307200kB, failcnt 638 [ 56.400163][ T3893] memory+swap: usage 307868kB, limit 9007199254740988kB, failcnt 0 [ 56.408658][ T3893] kmem: usage 307200kB, limit 9007199254740988kB, failcnt 0 [ 56.416196][ T3893] Memory cgroup stats for /syz1: [ 56.416525][ T3893] cache 0 [ 56.424685][ T3893] rss 0 [ 56.427605][ T3893] shmem 0 [ 56.430723][ T3893] mapped_file 0 [ 56.434661][ T3893] dirty 0 [ 56.437648][ T3893] writeback 0 [ 56.441045][ T3893] workingset_refault_anon 154 [ 56.445785][ T3893] workingset_refault_file 1109 [ 56.451035][ T3893] swap 684032 [ 56.454609][ T3893] swapcached 0 [ 56.458200][ T3893] pgpgin 13570 [ 56.461663][ T3893] pgpgout 13570 [ 56.465316][ T3893] pgfault 13870 [ 56.468944][ T3893] pgmajfault 92 [ 56.472421][ T3893] inactive_anon 0 [ 56.476161][ T3893] active_anon 0 [ 56.479809][ T3893] inactive_file 0 [ 56.483557][ T3893] active_file 0 [ 56.487124][ T3893] unevictable 0 [ 56.490934][ T3893] hierarchical_memory_limit 314572800 [ 56.496694][ T3893] hierarchical_memsw_limit 9223372036854771712 [ 56.503134][ T3893] total_cache 0 [ 56.506863][ T3893] total_rss 0 [ 56.510254][ T3893] total_shmem 0 [ 56.514156][ T3893] total_mapped_file 0 [ 56.518375][ T3893] total_dirty 0 [ 56.521982][ T3893] total_writeback 0 [ 56.526147][ T3893] total_workingset_refault_anon 154 [ 56.532167][ T3893] total_workingset_refault_file 1109 [ 56.537911][ T3893] total_swap 684032 [ 56.541940][ T3893] total_swapcached 0 [ 56.545824][ T3893] total_pgpgin 13570 [ 56.549746][ T3893] total_pgpgout 13570 [ 56.553848][ T3893] total_pgfault 13870 [ 56.557885][ T3893] total_pgmajfault 92 [ 56.561900][ T3893] total_inactive_anon 0 [ 56.566248][ T3893] total_active_anon 0 [ 56.570471][ T3893] total_inactive_file 0 [ 56.574720][ T3893] total_active_file 0 [ 56.579093][ T3893] total_unevictable 0 [ 56.583081][ T3893] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz1,task_memcg=/syz1,task=syz.1.113,pid=3893,uid=0 [ 56.598891][ T3893] Memory cgroup out of memory: Killed process 3893 (syz.1.113) total-vm:93896kB, anon-rss:1072kB, file-rss:22312kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000