last executing test programs: 7.680463313s ago: executing program 3 (id=48): r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) write$bt_hci(r2, &(0x7f0000000bc0)={0x1, @remote_name_req_cancel={{0x41a, 0x6}}}, 0xa) sendfile(r2, r0, 0x0, 0x40001) sendfile(r2, r1, 0x0, 0x7ffff000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0x80047210, 0x0) linkat(r3, &(0x7f00000000c0)='./bus\x00', r0, 0x0, 0x400) 6.137200805s ago: executing program 1 (id=55): syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xb, 0x0, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, @perf_config_ext={0x0, 0x41}, 0x0, 0x0, 0x0, 0x0, 0x558, 0xbb1, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r3, &(0x7f00000000c0), 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.43802192s ago: executing program 1 (id=57): timer_create(0x2, 0x0, &(0x7f0000bbdffc)=0x0) timer_settime(r0, 0x1, &(0x7f00000002c0)={{}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x10000, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_bp={0x0, 0x6}, 0x19196, 0x20000, 0x43a1bd76, 0x4, 0x2c9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(r1, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={@dev={0xfe, 0x80, '\x00', 0x3e}, @remote, @empty, 0x3, 0x8, 0x3, 0x400, 0x44, 0x80100000}) add_key$keyring(&(0x7f0000000040), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r4, &(0x7f0000004200), 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r3, r5, 0x34, 0x0, @val=@netkit}, 0x1c) 5.357832274s ago: executing program 3 (id=58): syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xb, 0x0, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, @perf_config_ext={0x0, 0x41}, 0x0, 0x0, 0x0, 0x0, 0x558, 0xbb1, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r3, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.23149301s ago: executing program 3 (id=60): r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) write$bt_hci(r2, &(0x7f0000000bc0)={0x1, @remote_name_req_cancel={{0x41a, 0x6}}}, 0xa) sendfile(r2, r0, 0x0, 0x40001) sendfile(r2, r1, 0x0, 0x7ffff000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0x80047210, 0x0) linkat(r3, &(0x7f00000000c0)='./bus\x00', r0, 0x0, 0x400) 4.857609978s ago: executing program 1 (id=63): r0 = socket$inet6(0x10, 0x3, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x40) prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) 3.674638469s ago: executing program 0 (id=64): socket$kcm(0x10, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x102260, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x400000000010, 0x3, 0x0) r0 = fsopen(&(0x7f0000000180)='proc\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x108) socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1, 0xfffffffc}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{r1}, &(0x7f0000000280), &(0x7f0000000340)=r2}, 0x20) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000002c0)={r2, r4, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x6e, &(0x7f0000000040)=ANY=[], 0x0) 3.671638408s ago: executing program 2 (id=65): timer_create(0x2, 0x0, &(0x7f0000bbdffc)=0x0) timer_settime(r0, 0x1, &(0x7f00000002c0)={{}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x10000, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_bp={0x0, 0x6}, 0x19196, 0x20000, 0x43a1bd76, 0x4, 0x2c9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(r1, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={@dev={0xfe, 0x80, '\x00', 0x3e}, @remote, @empty, 0x3, 0x8, 0x3, 0x400, 0x44, 0x80100000}) add_key$keyring(&(0x7f0000000040), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r3, r5, 0x34, 0x0, @val=@netkit}, 0x1c) 3.431483412s ago: executing program 1 (id=66): recvmsg$kcm(0xffffffffffffffff, 0x0, 0x40) prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x9) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) 3.352226497s ago: executing program 0 (id=67): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') fchdir(r0) socket$inet6(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="b702000002000000"], 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') recvmsg$kcm(r0, 0x0, 0x40002161) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x2000) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f0000000080)={[{@abort}, {@nolazytime}]}, 0xfe, 0x280, &(0x7f00000008c0)="$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") creat(0x0, 0x9) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000000000000000fc0000000000000001"], 0xb8}}, 0x20004000) sendmsg$nl_xfrm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000020000000000fc0000000000000000"], 0xb8}, 0x1, 0x0, 0x0, 0x80c0}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="b80000001300e9990500000000000000fc000000000000000000000000000000fc00000000000000000000000000000000000000000000000a0030"], 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 3.244821236s ago: executing program 2 (id=68): timer_create(0x2, 0x0, &(0x7f0000bbdffc)=0x0) timer_settime(r0, 0x1, &(0x7f00000002c0)={{}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x10000, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_bp={0x0, 0x6}, 0x19196, 0x20000, 0x43a1bd76, 0x4, 0x2c9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(r1, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={@dev={0xfe, 0x80, '\x00', 0x3e}, @remote, @empty, 0x3, 0x8, 0x3, 0x400, 0x44, 0x80100000}) add_key$keyring(&(0x7f0000000040), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r4, &(0x7f0000004200), 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r3, r5, 0x34, 0x0, @val=@netkit}, 0x1c) 3.091107056s ago: executing program 3 (id=69): r0 = socket$inet6(0x10, 0x3, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x40) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x9) sendto$inet6(r0, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) 2.469081237s ago: executing program 4 (id=70): timer_create(0x2, 0x0, &(0x7f0000bbdffc)=0x0) timer_settime(r0, 0x1, &(0x7f00000002c0)={{}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(r1, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={@dev={0xfe, 0x80, '\x00', 0x3e}, @remote, @empty, 0x3, 0x8, 0x3, 0x400, 0x44, 0x80100000}) add_key$keyring(&(0x7f0000000040), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r4, &(0x7f0000004200), 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r3, r5, 0x34, 0x0, @val=@netkit}, 0x1c) 2.466774066s ago: executing program 1 (id=71): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x3000046, &(0x7f00000004c0)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@usrquota}, {@data_err_ignore}, {@nobarrier}, {@oldalloc}, {@grpquota}, {@noload}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000001080)="$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") socket$key(0xf, 0x3, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000000)='./file0\x00', 0x4400, &(0x7f00000005c0)=ANY=[], 0xfc, 0x2e2, &(0x7f0000000940)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) write$bt_hci(r2, &(0x7f0000000bc0)={0x1, @remote_name_req_cancel={{0x41a, 0x6}}}, 0xa) sendfile(r2, r0, 0x0, 0x40001) sendfile(r2, r1, 0x0, 0x7ffff000) ppoll(&(0x7f00000001c0)=[{0xffffffffffffffff, 0x140}, {0xffffffffffffffff, 0x50f0}, {0xffffffffffffffff, 0x400}], 0x3, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240)={[0x2]}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0x80047210, 0x0) linkat(r3, &(0x7f00000000c0)='./bus\x00', r0, 0x0, 0x400) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x49, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xac, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) 2.447522352s ago: executing program 2 (id=72): munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x40) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/31) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x1004, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB='$'], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1000, 0x1) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000180), 0x0) gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x200000002000000) 2.262517717s ago: executing program 4 (id=73): timer_create(0x2, 0x0, &(0x7f0000bbdffc)=0x0) timer_settime(r0, 0x1, &(0x7f00000002c0)={{}, {0x0, 0x989680}}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x10000, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_bp={0x0, 0x6}, 0x19196, 0x20000, 0x43a1bd76, 0x4, 0x2c9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(r1, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={@dev={0xfe, 0x80, '\x00', 0x3e}, @remote, @empty, 0x3, 0x8, 0x3, 0x400, 0x44, 0x80100000}) add_key$keyring(&(0x7f0000000040), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r4, &(0x7f0000004200), 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r3, r5, 0x34, 0x0, @val=@netkit}, 0x1c) 2.028206781s ago: executing program 0 (id=74): syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xb, 0x0, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, @perf_config_ext={0x0, 0x41}, 0x0, 0x0, 0x0, 0x0, 0x558, 0xbb1, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r3, &(0x7f00000000c0), 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.768328461s ago: executing program 4 (id=75): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) 1.671597082s ago: executing program 4 (id=76): timer_create(0x2, 0x0, &(0x7f0000bbdffc)=0x0) timer_settime(r0, 0x1, &(0x7f00000002c0)={{}, {0x0, 0x989680}}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x10000, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_bp={0x0, 0x6}, 0x19196, 0x20000, 0x43a1bd76, 0x4, 0x2c9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(r1, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={@dev={0xfe, 0x80, '\x00', 0x3e}, @remote, @empty, 0x3, 0x8, 0x3, 0x400, 0x44, 0x80100000}) add_key$keyring(&(0x7f0000000040), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r4, &(0x7f0000004200), 0x0) sendfile(r4, r3, 0x0, 0x7ffff000) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r3, r5, 0x34, 0x0, @val=@netkit}, 0x1c) 1.519007033s ago: executing program 2 (id=77): syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xb, 0x0, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, @perf_config_ext={0x0, 0x41}, 0x0, 0x0, 0x0, 0x0, 0x558, 0xbb1, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r3, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.359687392s ago: executing program 2 (id=78): munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x40) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/31) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) io_uring_setup(0x6c0, &(0x7f0000000880)={0x0, 0xd3d5, 0x10000, 0x5, 0x351}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x1004, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB='$'], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1000, 0x1) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000180), 0x0) gettid() timer_create(0x0, 0x0, &(0x7f0000bbdffc)=0x0) timer_settime(r3, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x200000002000000) 1.299853751s ago: executing program 4 (id=79): socket$nl_rdma(0x10, 0x3, 0x14) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8002, &(0x7f0000000700)={[{@nodiscard}, {@jqfmt_vfsv0}, {@errors_remount}, {@noquota}]}, 0xfc, 0x4b4, &(0x7f0000000c80)="$eJzs3E9sFNUfAPDvbHdpgR8/KiIKoi6isdHYQkHh4AWjiQdMjHjQY9MWghRqaE2EECmJwaMh8W48evXgVb0ZTyZe8WhiSIjhAnhaM7sz7e52t//Y7oL7+SRL35t9s+99982bfTNvlwD6Vjn9J4n4X0TcjIidtWxjgXLtz707Vybv37kyGQuVyqm/k2q5u2k+k++3PcuMFCIKXyRNL1gzd+nyuYmZmemLWX5s/vwnY3OXLr969vzEmekz0xfGjx8/euTwsdfHX1t/UC3qS+O6u+/z2f173/noxruTxXz7UPa3Po5OKUe5VVOqXux0ZT22oy6dFHvYENZlICLS7ipVx//OGAidB/2iUqlUBts/vVBpdm3ZFuCRlUSvWwD0Rv5Bn17/5o8uTT0eCrdP1C6A0rjvZY/aM8UoZGVKTde3nTQUER8u/PNN+ohNug8BAFDvpxP5TLB5/leIPXXl/p+toQxHxGMRsSsiHo+I3RHxRES17JMR8VTT65cjorJC/eWm/PL5T+HWAwW4inT+90a2ttU4/8tnfzE8kOV2ROQT5ulD2XsyEqXB02dnpg+vUMfPb/3+VbvnynXzv/SR1p/PBbN23Co23aCbmpif2HDATW5fi9hXbI4/KUYkiysBSUTsjYh963jd4br02Ze/27+YKTWWWz3+qkrLdbQOLFVUvo14qdb/C9HQ/0s1JiuvT44Nxcz0obH0KDjUso5ff7v+Xrv6V43/hz+bd3n72I+nHjTsRWn/b6s7/iNfv12KfziJSBbXa+fWX8f1P75se02ztuP/asM+6fG/Jfmgmt6SbftsYn7+4uGILcnJ5dvHl/bN83n5NP6Rg63H/65sn/SdeDoi0oP4mYh4NiKey9p+ICKej4iDK8T/y5svfLzx+DdXGv9Uy/NfQ/8vrdfPncwTl9aaGDh34Ob9NiePtfX/0WpqJNvS+vyXNJwi1trADryFAAAA8NArRPW7/4XRxXShMDpauwe0O7YVZmbn5l85PfvphanabwSGo1TI73TV7geXkvz+53BdfrwpfyS7b/z1wNZqfnRydmaq18FDn9teHfPJsvGf+mug160DNp2f/ED/Wm3877nRpYYAXefzH/pX3fhfaFNkwTdl4L+p9ed/qevtALqv1fi/uoF9gEdLxViGvmb8Q/8qxvuL6UJPWwJ0m89/6Etr/xX/RhKVwdZPDcXywjG0Oc3Y2qKuniTSmVVPat+6kb3y/02hbZkorPY6xYZjbDCWlxmInvTFmT0dP/gr2XflO93U71cep/l0fRPeqO6ehwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADbLvwEAAP//cdfX0w==") openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[], 0x18}}, 0x20004000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000010000d0428bd7000fcdbff2500008000", @ANYBLOB="1000000000000000280012800b0001006272696467650000180002"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_clone(0x81248080, 0x0, 0x4c, 0x0, 0x0, 0x0) process_vm_readv(r1, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/107, 0x6b}], 0x1, &(0x7f0000000d00), 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800000, 0x100003fff8001}, 0x1820, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x108, 0x0, 0x0, 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x0, 0xc, 0x0, 0x0, 0xfffffffd, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x0, @loopback}}]}, 0x60}, 0x1, 0x7}, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x7, 0x34328, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={0x0, 0x2}, 0x10026, 0x10003, 0xfffffff8, 0x3, 0x100008, 0x20005, 0x9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x34, 0x4, 0x6, 0x107, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000000) 1.234899688s ago: executing program 3 (id=80): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') fchdir(r0) socket$inet6(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="b702000002000000"], 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') recvmsg$kcm(r0, 0x0, 0x40002161) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x2000) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f0000000080)={[{@abort}, {@nolazytime}]}, 0xfe, 0x280, &(0x7f00000008c0)="$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") creat(0x0, 0x9) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000000000000000fc0000000000000001"], 0xb8}}, 0x20004000) sendmsg$nl_xfrm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000020000000000fc0000000000000000"], 0xb8}, 0x1, 0x0, 0x0, 0x80c0}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="b80000001300e9990500000000000000fc000000000000000000000000000000fc00000000000000000000000000000000000000000000000a0030"], 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 1.062539535s ago: executing program 1 (id=81): r0 = socket$inet6(0x10, 0x3, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x40) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x9) sendto$inet6(r0, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) 1.020365307s ago: executing program 0 (id=82): prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70000010000000085000000060000008500000005000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 605.305057ms ago: executing program 3 (id=83): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) fadvise64(r0, 0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$caif_stream(0x25, 0x1, 0x3) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@newsa={0x188, 0x10, 0x831, 0x870bd2b, 0x0, {{@in=@local, @in=@private, 0x0, 0xecdf, 0x0, 0x0, 0xa}, {@in=@broadcast, 0x0, 0x32}, @in=@local, {0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x7f}, {0x0, 0x400800}, {}, 0x0, 0x0, 0x2, 0x4, 0x3, 0x2c}, [@algo_auth_trunc={0x4c, 0x14, {{'hmac(sha256)\x00'}, 0x0, 0x80}}, @algo_aead={0x4c, 0x12, {{'gcm_base(ecb-aes-neonbs,cmac(aes))\x00'}}}]}, 0x188}}, 0x4050) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x8a}, 0x9c) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000004500), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_9p2000}]}}) write$P9_RVERSION(r5, 0x0, 0x15) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket(0x40000000015, 0x5, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) getsockopt(r9, 0x200000000114, 0x8, &(0x7f0000019580)=""/102394, &(0x7f0000000040)=0x18ffa) write(r7, &(0x7f0000000280)="96fa2c0bff2099297e1c1ea6d53ff4c2f69b32d385f14857ae25047e39555bbacdb216aa20b99d21a3aa5e5775e86006778ec677400377670a3422aa5184ed400cf452f14ef81d20a792091e037ed82c9ee401f0f428bd4951eab88952d04fd3c2201db3378816", 0xfffffdce) vmsplice(r8, &(0x7f00000001c0)=[{&(0x7f0000000400)='\r', 0x1}, {&(0x7f0000000100)='k', 0x1}], 0x2, 0x0) tee(r6, r8, 0xfffffffffffffffd, 0x0) close(r6) close(r7) r10 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x63) write$9p(r10, &(0x7f0000000100)="d5c0", 0x2) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff108500000007000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r11, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=[0x4], 0x0, 0x0, 0x1, 0x1}}, 0x40) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x10012, r10, 0x0) 496.343785ms ago: executing program 2 (id=84): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x3000046, &(0x7f00000004c0)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@usrquota}, {@data_err_ignore}, {@nobarrier}, {@oldalloc}, {@grpquota}, {@noload}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000001080)="$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") socket$key(0xf, 0x3, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000000)='./file0\x00', 0x4400, &(0x7f00000005c0)=ANY=[], 0xfc, 0x2e2, &(0x7f0000000940)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) write$bt_hci(r2, &(0x7f0000000bc0)={0x1, @remote_name_req_cancel={{0x41a, 0x6}}}, 0xa) sendfile(r2, r0, 0x0, 0x40001) sendfile(r2, r1, 0x0, 0x7ffff000) ppoll(&(0x7f00000001c0)=[{0xffffffffffffffff, 0x140}, {0xffffffffffffffff, 0x50f0}, {0xffffffffffffffff, 0x400}], 0x3, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240)={[0x2]}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0x80047210, 0x0) linkat(r3, &(0x7f00000000c0)='./bus\x00', r0, 0x0, 0x400) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x49, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xac, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) 173.226813ms ago: executing program 4 (id=85): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x3000046, &(0x7f00000004c0)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@usrquota}, {@data_err_ignore}, {@nobarrier}, {@oldalloc}, {@grpquota}, {@noload}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000001080)="$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") socket$key(0xf, 0x3, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) write$bt_hci(r3, &(0x7f0000000bc0)={0x1, @remote_name_req_cancel={{0x41a, 0x6}}}, 0xa) sendfile(r3, r0, 0x0, 0x40001) sendfile(r3, r2, 0x0, 0x7ffff000) ppoll(&(0x7f00000001c0)=[{0xffffffffffffffff, 0x140}, {0xffffffffffffffff, 0x50f0}, {0xffffffffffffffff, 0x400}], 0x3, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240)={[0x2]}, 0x58) r4 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0x80047210, 0x0) linkat(r4, &(0x7f00000000c0)='./bus\x00', r0, 0x0, 0x400) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x49, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xac, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) 74.209104ms ago: executing program 0 (id=86): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) 0s ago: executing program 0 (id=87): syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xb, 0x0, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, @perf_config_ext={0x0, 0x41}, 0x0, 0x0, 0x0, 0x0, 0x558, 0xbb1, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), 0x0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) kernel console output (not intermixed with test programs): [ 20.408777][ T28] audit: type=1400 audit(1771977732.967:62): avc: denied { search } for pid=3191 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.432456][ T28] audit: type=1400 audit(1771977732.967:63): avc: denied { search } for pid=3191 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.459253][ T28] audit: type=1400 audit(1771977732.967:64): avc: denied { search } for pid=3191 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.484383][ T28] audit: type=1400 audit(1771977732.967:65): avc: denied { search } for pid=3191 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.511118][ T28] audit: type=1400 audit(1771977732.967:66): avc: denied { read open } for pid=3192 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.144' (ED25519) to the list of known hosts. [ 25.002079][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 25.002098][ T28] audit: type=1400 audit(1771977737.557:70): avc: denied { mounton } for pid=3294 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.038508][ T28] audit: type=1400 audit(1771977737.597:71): avc: denied { mount } for pid=3294 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.039253][ T3294] cgroup: Unknown subsys name 'net' [ 25.068882][ T28] audit: type=1400 audit(1771977737.627:72): avc: denied { unmount } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.223169][ T3294] cgroup: Unknown subsys name 'cpuset' [ 25.229822][ T3294] cgroup: Unknown subsys name 'rlimit' [ 25.340700][ T28] audit: type=1400 audit(1771977737.897:73): avc: denied { setattr } for pid=3294 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.366075][ T28] audit: type=1400 audit(1771977737.897:74): avc: denied { create } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.393600][ T28] audit: type=1400 audit(1771977737.897:75): avc: denied { write } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.398936][ T3299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 25.414828][ T28] audit: type=1400 audit(1771977737.897:76): avc: denied { read } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.445045][ T28] audit: type=1400 audit(1771977737.907:77): avc: denied { mounton } for pid=3294 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.471477][ T28] audit: type=1400 audit(1771977737.907:78): avc: denied { mount } for pid=3294 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 25.475525][ T3294] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 25.496156][ T28] audit: type=1400 audit(1771977737.927:79): avc: denied { read } for pid=3038 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 27.342742][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 27.378014][ T3309] chnl_net:caif_netlink_parms(): no params data found [ 27.428605][ T3308] chnl_net:caif_netlink_parms(): no params data found [ 27.448861][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.456439][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.464273][ T3311] bridge_slave_0: entered allmulticast mode [ 27.470854][ T3311] bridge_slave_0: entered promiscuous mode [ 27.480561][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.488096][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.497004][ T3311] bridge_slave_1: entered allmulticast mode [ 27.504572][ T3311] bridge_slave_1: entered promiscuous mode [ 27.555836][ T3309] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.563187][ T3309] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.571795][ T3309] bridge_slave_0: entered allmulticast mode [ 27.579194][ T3309] bridge_slave_0: entered promiscuous mode [ 27.593196][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.606020][ T3309] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.614546][ T3309] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.622264][ T3309] bridge_slave_1: entered allmulticast mode [ 27.629332][ T3309] bridge_slave_1: entered promiscuous mode [ 27.648485][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.661735][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 27.698000][ T3309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.708367][ T3308] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.717296][ T3308] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.725279][ T3308] bridge_slave_0: entered allmulticast mode [ 27.732003][ T3308] bridge_slave_0: entered promiscuous mode [ 27.747348][ T3311] team0: Port device team_slave_0 added [ 27.758462][ T3311] team0: Port device team_slave_1 added [ 27.766532][ T3309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.781631][ T3308] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.789521][ T3308] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.799178][ T3308] bridge_slave_1: entered allmulticast mode [ 27.806592][ T3308] bridge_slave_1: entered promiscuous mode [ 27.843527][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.853366][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.883002][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.896094][ T3309] team0: Port device team_slave_0 added [ 27.906989][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 27.923326][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.930987][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.962519][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.975299][ T3309] team0: Port device team_slave_1 added [ 27.982510][ T3308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.012855][ T3308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.028026][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.036512][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.045934][ T3313] bridge_slave_0: entered allmulticast mode [ 28.054235][ T3313] bridge_slave_0: entered promiscuous mode [ 28.085950][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.095649][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.103627][ T3313] bridge_slave_1: entered allmulticast mode [ 28.110899][ T3313] bridge_slave_1: entered promiscuous mode [ 28.125219][ T3311] hsr_slave_0: entered promiscuous mode [ 28.131992][ T3311] hsr_slave_1: entered promiscuous mode [ 28.139048][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.146751][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.174732][ T3309] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.188660][ T3308] team0: Port device team_slave_0 added [ 28.203378][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.210912][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.238818][ T3309] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.253792][ T3308] team0: Port device team_slave_1 added [ 28.277737][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.285726][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.293961][ T3315] bridge_slave_0: entered allmulticast mode [ 28.300653][ T3315] bridge_slave_0: entered promiscuous mode [ 28.312090][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.320315][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.328204][ T3315] bridge_slave_1: entered allmulticast mode [ 28.335163][ T3315] bridge_slave_1: entered promiscuous mode [ 28.343312][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.354837][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.395209][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.403429][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.435229][ T3308] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.468177][ T3308] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.476288][ T3308] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.505386][ T3308] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.518627][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.529726][ T3313] team0: Port device team_slave_0 added [ 28.540958][ T3309] hsr_slave_0: entered promiscuous mode [ 28.547615][ T3309] hsr_slave_1: entered promiscuous mode [ 28.553673][ T3309] debugfs: 'hsr0' already exists in 'hsr' [ 28.560201][ T3309] Cannot create hsr debugfs directory [ 28.570343][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.581640][ T3313] team0: Port device team_slave_1 added [ 28.633736][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.641520][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.669767][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.687781][ T3315] team0: Port device team_slave_0 added [ 28.700346][ T3308] hsr_slave_0: entered promiscuous mode [ 28.707002][ T3308] hsr_slave_1: entered promiscuous mode [ 28.713481][ T3308] debugfs: 'hsr0' already exists in 'hsr' [ 28.719933][ T3308] Cannot create hsr debugfs directory [ 28.726904][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.734609][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.761755][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.780471][ T3315] team0: Port device team_slave_1 added [ 28.823034][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.831254][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.859596][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.877529][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.885846][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.916424][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.964627][ T3313] hsr_slave_0: entered promiscuous mode [ 28.971664][ T3313] hsr_slave_1: entered promiscuous mode [ 28.978933][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 28.985315][ T3313] Cannot create hsr debugfs directory [ 29.014887][ T3315] hsr_slave_0: entered promiscuous mode [ 29.021824][ T3315] hsr_slave_1: entered promiscuous mode [ 29.028093][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 29.034373][ T3315] Cannot create hsr debugfs directory [ 29.114076][ T3311] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.125817][ T3311] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.137665][ T3311] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.146768][ T3311] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.211438][ T3309] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.221810][ T3309] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.232068][ T3309] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 29.243450][ T3309] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.284315][ T3308] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.301536][ T3308] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.311512][ T3308] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.332544][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.344615][ T3308] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.381237][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.392978][ T3315] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.403683][ T3315] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.418012][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.426425][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.441153][ T3315] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.453769][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.461500][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.478130][ T3315] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.508621][ T3309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.521286][ T3313] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 29.531228][ T3313] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 29.547939][ T3313] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 29.556684][ T3313] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 29.583016][ T3309] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.614550][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.621934][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.654837][ T3308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.665497][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.672915][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.692082][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.716278][ T3308] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.734297][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.742251][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.764952][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.773317][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.790219][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.803457][ T3309] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.828110][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.851476][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.874242][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.882579][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.893350][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.902655][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.922009][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.939157][ T3308] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.958744][ T3308] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.992366][ T3311] veth0_vlan: entered promiscuous mode [ 30.008491][ T3315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.027083][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.035683][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.046947][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.055081][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.070991][ T3311] veth1_vlan: entered promiscuous mode [ 30.085353][ T3309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.127025][ T3308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.140010][ T3311] veth0_macvtap: entered promiscuous mode [ 30.157807][ T3311] veth1_macvtap: entered promiscuous mode [ 30.171829][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.199590][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.220130][ T314] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.236778][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.247409][ T314] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.258375][ T314] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.277046][ T314] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.296601][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 30.296628][ T28] audit: type=1400 audit(1771977742.857:90): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/root/syzkaller.1Vb0Uj/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 30.352969][ T28] audit: type=1400 audit(1771977742.897:91): avc: denied { mount } for pid=3311 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 30.362184][ T3309] veth0_vlan: entered promiscuous mode [ 30.391274][ T28] audit: type=1400 audit(1771977742.897:92): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/root/syzkaller.1Vb0Uj/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 30.397928][ T3309] veth1_vlan: entered promiscuous mode [ 30.432922][ T28] audit: type=1400 audit(1771977742.897:93): avc: denied { mount } for pid=3311 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 30.459830][ T3311] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 30.469542][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.483745][ T28] audit: type=1400 audit(1771977742.897:94): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/root/syzkaller.1Vb0Uj/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 30.505957][ T3308] veth0_vlan: entered promiscuous mode [ 30.528676][ T28] audit: type=1400 audit(1771977742.897:95): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/root/syzkaller.1Vb0Uj/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3766 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 30.570146][ T3308] veth1_vlan: entered promiscuous mode [ 30.590626][ T3315] veth0_vlan: entered promiscuous mode [ 30.592321][ T28] audit: type=1400 audit(1771977742.897:96): avc: denied { unmount } for pid=3311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 30.600006][ T3469] loop0: detected capacity change from 0 to 1024 [ 30.627229][ T28] audit: type=1400 audit(1771977742.907:97): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 30.629660][ T3309] veth0_macvtap: entered promiscuous mode [ 30.659411][ T3469] ======================================================= [ 30.659411][ T3469] WARNING: The mand mount option has been deprecated and [ 30.659411][ T3469] and is ignored by this kernel. Remove the mand [ 30.659411][ T3469] option from the mount to silence this warning. [ 30.659411][ T3469] ======================================================= [ 30.670075][ T28] audit: type=1400 audit(1771977742.907:98): avc: denied { mount } for pid=3311 comm="syz-executor" name="/" dev="gadgetfs" ino=3767 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 30.738636][ T3308] veth0_macvtap: entered promiscuous mode [ 30.743402][ T3469] EXT4-fs: Ignoring removed oldalloc option [ 30.749158][ T3315] veth1_vlan: entered promiscuous mode [ 30.757708][ T3469] EXT4-fs: Ignoring removed bh option [ 30.759883][ T28] audit: type=1400 audit(1771977743.127:99): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 30.783185][ T3309] veth1_macvtap: entered promiscuous mode [ 30.809723][ T3308] veth1_macvtap: entered promiscuous mode [ 30.819569][ T3469] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 30.822725][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.851276][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.887155][ T50] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.897009][ T50] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.908102][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.921062][ T50] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.937453][ T3308] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.946922][ T50] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.970104][ T3315] veth0_macvtap: entered promiscuous mode [ 30.984927][ T3315] veth1_macvtap: entered promiscuous mode [ 31.022706][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.032354][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.047941][ T74] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.079832][ T74] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.098088][ T74] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.226990][ T3313] veth0_vlan: entered promiscuous mode [ 31.236182][ T3313] veth1_vlan: entered promiscuous mode [ 31.253894][ T74] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.263510][ T74] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.276433][ T74] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.884447][ T74] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.897627][ T74] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.968698][ T3313] veth0_macvtap: entered promiscuous mode [ 32.037641][ C1] hrtimer: interrupt took 44310 ns [ 32.047527][ T3313] veth1_macvtap: entered promiscuous mode [ 32.085979][ T3311] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.172083][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.191287][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.225640][ T3451] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.253932][ T3451] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.356053][ T3451] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.380430][ T3451] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.319231][ T3521] loop4: detected capacity change from 0 to 512 [ 34.393070][ T3521] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 34.475051][ T3521] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 34.533134][ T3521] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz.4.11: bad orphan inode 4 [ 34.564407][ T3521] loop4: lost filesystem error report for type 5 error -117 [ 34.568182][ T3521] EXT4-fs (loop4): 1 orphan inode deleted [ 34.577179][ C1] EXT4-fs (loop4): error count since last fsck: 1 [ 34.577212][ C1] EXT4-fs (loop4): initial error at time 1771977747: ext4_orphan_get:1417 [ 34.577256][ C1] EXT4-fs (loop4): last error at time 1771977747: ext4_orphan_get:1417 [ 34.612886][ T3521] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 34.935856][ T3533] Driver unsupported XDP return value 0 on prog (id 3) dev N/A, expect packet loss! [ 35.424976][ T3313] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.657602][ T3540] loop3: detected capacity change from 0 to 1024 [ 35.682961][ T3540] EXT4-fs: Ignoring removed oldalloc option [ 35.690518][ T3540] EXT4-fs: Ignoring removed bh option [ 35.720391][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 35.720431][ T28] audit: type=1400 audit(1771977748.277:130): avc: denied { tracepoint } for pid=3544 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.773964][ T3540] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.843462][ T3548] loop2: detected capacity change from 0 to 1024 [ 35.869012][ T3548] EXT4-fs: Ignoring removed oldalloc option [ 35.869106][ T3548] EXT4-fs: Ignoring removed bh option [ 35.891572][ T3548] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.030541][ T3308] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.189257][ T3567] loop3: detected capacity change from 0 to 1024 [ 36.213461][ T3567] EXT4-fs: Ignoring removed oldalloc option [ 36.220685][ T3567] EXT4-fs: Ignoring removed bh option [ 36.261218][ T3567] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 37.598157][ T28] audit: type=1400 audit(1771977750.137:131): avc: denied { write } for pid=3583 comm="syz.4.29" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 37.625525][ T28] audit: type=1400 audit(1771977750.137:132): avc: denied { open } for pid=3583 comm="syz.4.29" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 37.745507][ T3308] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.793338][ T3315] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.637809][ T3631] loop3: detected capacity change from 0 to 1024 [ 39.675911][ T3631] EXT4-fs: Ignoring removed oldalloc option [ 39.699597][ T3631] EXT4-fs: Ignoring removed bh option [ 39.753661][ T3631] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.141784][ T3645] loop4: detected capacity change from 0 to 1024 [ 40.232960][ T3645] EXT4-fs: Ignoring removed oldalloc option [ 40.391610][ T3645] EXT4-fs: Ignoring removed bh option [ 40.430291][ T3645] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.702475][ T3308] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.716982][ T28] audit: type=1400 audit(1771977753.277:133): avc: denied { create } for pid=3656 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 40.764082][ T28] audit: type=1400 audit(1771977753.277:134): avc: denied { create } for pid=3656 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 40.809995][ T28] audit: type=1400 audit(1771977753.367:135): avc: denied { create } for pid=3656 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 40.899881][ T28] audit: type=1400 audit(1771977753.367:136): avc: denied { read write } for pid=3656 comm="syz.1.49" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 40.992473][ T28] audit: type=1400 audit(1771977753.367:137): avc: denied { open } for pid=3656 comm="syz.1.49" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 41.472553][ T3645] EXT4-fs error (device loop4): ext4_mb_mark_diskspace_used:4222: comm syz.4.46: Allocating blocks 1-17 which overlap fs metadata [ 41.490633][ T3655] EXT4-fs error (device loop4): ext4_mb_mark_diskspace_used:4222: comm syz.4.46: Allocating blocks 1-17 which overlap fs metadata [ 41.960172][ T3655] syz.4.46 (3655) used greatest stack depth: 10128 bytes left [ 41.995131][ T3313] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 45.920327][ T3735] loop1: detected capacity change from 0 to 1024 [ 45.927183][ T3731] loop0: detected capacity change from 0 to 128 [ 45.927637][ T3735] EXT4-fs: Ignoring removed oldalloc option [ 45.940051][ T3735] EXT4-fs: Ignoring removed bh option [ 45.986992][ T3735] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 46.182736][ T28] audit: type=1400 audit(1771977758.687:138): avc: denied { create } for pid=3719 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 46.206263][ T28] audit: type=1400 audit(1771977758.687:139): avc: denied { write } for pid=3719 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 46.230985][ T28] audit: type=1400 audit(1771977758.687:140): avc: denied { nlmsg_write } for pid=3719 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 47.075106][ T28] audit: type=1400 audit(1771977759.637:141): avc: denied { create } for pid=3768 comm="syz.4.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 47.127076][ T3769] loop4: detected capacity change from 0 to 512 [ 47.174146][ T3769] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 47.253064][ T3769] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz.4.79: bg 0: block 393: padding at end of block bitmap is not set [ 47.291771][ T3769] loop4: lost filesystem error report for type 5 error -117 [ 47.292013][ T3769] EXT4-fs (loop4): Remounting filesystem read-only [ 47.300072][ C1] EXT4-fs (loop4): error count since last fsck: 1 [ 47.300109][ C1] EXT4-fs (loop4): initial error at time 1771977759: ext4_validate_block_bitmap:441 [ 47.300137][ C1] EXT4-fs (loop4): last error at time 1771977759: ext4_validate_block_bitmap:441 [ 47.335288][ T3309] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 47.336445][ T3769] EXT4-fs (loop4): 2 truncates cleaned up [ 47.353182][ T3773] loop3: detected capacity change from 0 to 128 [ 47.369660][ T3769] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 47.440000][ T3769] netlink: 4 bytes leftover after parsing attributes in process `syz.4.79'. [ 47.484486][ T3769] Zero length message leads to an empty skb [ 47.512865][ T28] audit: type=1400 audit(1771977760.067:142): avc: denied { write } for pid=3768 comm="syz.4.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 47.940327][ T28] audit: type=1400 audit(1771977760.497:143): avc: denied { create } for pid=3783 comm="syz.3.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 47.999280][ T3787] loop2: detected capacity change from 0 to 1024 [ 48.065124][ T28] audit: type=1400 audit(1771977760.547:144): avc: denied { setopt } for pid=3783 comm="syz.3.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 48.100519][ T3787] EXT4-fs: Ignoring removed oldalloc option [ 48.119026][ T28] audit: type=1400 audit(1771977760.677:145): avc: denied { create } for pid=3783 comm="syz.3.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 48.138978][ T3787] EXT4-fs: Ignoring removed bh option [ 48.151946][ T28] audit: type=1400 audit(1771977760.717:146): avc: denied { getopt } for pid=3783 comm="syz.3.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 48.179054][ T3313] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 48.205267][ T3791] loop4: detected capacity change from 0 to 1024 [ 48.213580][ T3791] EXT4-fs: Ignoring removed oldalloc option [ 48.220842][ T3791] EXT4-fs: Ignoring removed bh option [ 48.235351][ T3787] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 48.289017][ T3791] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 48.376873][ T3451] ================================================================== [ 48.385189][ T3451] BUG: KCSAN: data-race in copy_folio_from_iter_atomic / copy_folio_from_iter_atomic [ 48.394948][ T3451] [ 48.397295][ T3451] write to 0xffff88811e8213a2 of 20 bytes by task 3787 on cpu 1: [ 48.405478][ T3451] copy_folio_from_iter_atomic+0x75f/0x1170 [ 48.411486][ T3451] generic_perform_write+0x2c1/0x490 [ 48.417058][ T3451] ext4_buffered_write_iter+0x1ee/0x3c0 [ 48.422753][ T3451] ext4_file_write_iter+0x380/0xfa0 [ 48.427988][ T3451] iter_file_splice_write+0x6c4/0xa80 [ 48.434005][ T3451] direct_splice_actor+0x156/0x2a0 [ 48.439195][ T3451] splice_direct_to_actor+0x311/0x670 [ 48.445117][ T3451] do_splice_direct+0x119/0x1a0 [ 48.450101][ T3451] do_sendfile+0x382/0x650 [ 48.454551][ T3451] __x64_sys_sendfile64+0x105/0x150 [ 48.460143][ T3451] x64_sys_call+0x2dc4/0x3020 [ 48.464897][ T3451] do_syscall_64+0x12c/0x370 [ 48.469625][ T3451] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 48.475814][ T3451] [ 48.478162][ T3451] read to 0xffff88811e821000 of 1024 bytes by task 3451 on cpu 0: [ 48.485985][ T3451] copy_folio_from_iter_atomic+0x75f/0x1170 [ 48.492003][ T3451] generic_perform_write+0x2c1/0x490 [ 48.498110][ T3451] shmem_file_write_iter+0xc5/0xf0 [ 48.503263][ T3451] lo_rw_aio+0x67d/0x730 [ 48.507641][ T3451] loop_process_work+0x56c/0xac0 [ 48.512626][ T3451] loop_workfn+0x31/0x40 [ 48.517090][ T3451] process_scheduled_works+0x4de/0x9e0 [ 48.522682][ T3451] worker_thread+0x581/0x770 [ 48.527402][ T3451] kthread+0x22a/0x280 [ 48.531499][ T3451] ret_from_fork+0x150/0x360 [ 48.536209][ T3451] ret_from_fork_asm+0x1a/0x30 [ 48.541014][ T3451] [ 48.543356][ T3451] Reported by Kernel Concurrency Sanitizer on: [ 48.549523][ T3451] CPU: 0 UID: 0 PID: 3451 Comm: kworker/u8:7 Not tainted syzkaller #0 PREEMPT(full) [ 48.559273][ T3451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 48.569453][ T3451] Workqueue: loop2 loop_workfn [ 48.574264][ T3451] ================================================================== [ 49.199733][ T3313] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 49.210140][ T3315] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.