last executing test programs: 4m40.456150413s ago: executing program 3 (id=498): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) set_mempolicy(0x4003, &(0x7f0000000200)=0x7, 0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='tlb_flush\x00'}, 0xffffffffffffff2a) openat$tun(0xffffffffffffff9c, 0x0, 0xa2f01, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000700000e0000000000000000000a20000000000a03000000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a30000000000800054000000002600000000c0a01080000000000000000010000000900020073797a32000000003400038030000080080003400000000224000b80200001800e000100636f6e6e6c696d69740000000c00028008000140000000000900010073797a30"], 0xe4}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) 4m40.455734333s ago: executing program 3 (id=499): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x18, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b00000000001b000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000006ffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf35d5affae69a39a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) sendmsg$SMC_PNETID_ADD(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x40, r1, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}}, 0x0) sendmsg$SMC_PNETID_DEL(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, r1, 0xe27, 0x70bd28, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x4000) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) 4m40.444174144s ago: executing program 3 (id=500): unshare(0x22020400) write$tun(0xffffffffffffffff, 0x0, 0x46) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() sendmsg$unix(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000640)='Q', 0x1}], 0x1, &(0x7f0000001040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="1c000000000000000100000402000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r2, @ANYBLOB="e5ffff6e18"], 0xa0}, 0x4004881) recvmsg(r2, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x160) 4m40.421323784s ago: executing program 3 (id=501): prctl$PR_SET_SECUREBITS(0x1c, 0x2c) setuid(0xee00) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000180)='./file1\x00', 0x1218088, &(0x7f00000005c0)=ANY=[@ANYBLOB="7379735f696d6d757461626c652c757466383d312c696f636861727365743d61736369692c73686f72746e616d653d77696e39352c73686f77657865632c6e66732c636865636b3d7374726963742c756e695f786c6174653d302c757466383d312c73686f72746e616d653d6c6f7765722c73686f72746e616d653d6c6f7765722c726f6469722c726f6469722c64656275672c757466383d302c726f6469722c71756965742c6572726f72733d72656d6f756e742d726f2c009c8a8fc4f74784ad79ec08fb556262ebc972ef94821f3565ef5f75f11e30ef1f72a065c510b17cae356940538b7b2c5d72f4627c25306b2479725add28f511a68f5f6f47f9facdd0cc574286d00ab52d6b9374b6a58eac694336ebe971f41860d01084c1a0fa6b51d80fa9f9d2c1a2e7a5284f93296217ef8f28e0a36e573296a0bfb38b94191f4b82873563f3759b5e193ecfab6ed7892542364757e47d656ad6a0fbb6e8bf138bddae620a3602991821d4844f628e6bdd8b62cca73744332f0185a54b52a0352a82c794995bbb97c82fcde79d14fb20e5127150de"], 0xa, 0x2c2, &(0x7f00000008c0)="$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") sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2000007ff) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r1) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r2 = syz_open_procfs(r0, &(0x7f0000000400)='ns\x00') readlinkat(r2, &(0x7f0000000100)='./mnt\x00', &(0x7f0000000440)=""/163, 0xa3) 4m40.378500094s ago: executing program 3 (id=502): socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000600)=@newqdisc={0x114, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x6}}, [@qdisc_kind_options=@q_pie={{0x8}, {0x44, 0x2, [@TCA_PIE_TUPDATE={0x8, 0x3, 0x4}, @TCA_PIE_TARGET={0x8, 0x1, 0x1}, @TCA_PIE_BYTEMODE={0x8}, @TCA_PIE_LIMIT={0x8}, @TCA_PIE_BETA={0x8, 0x5, 0x4}, @TCA_PIE_BYTEMODE={0x8}, @TCA_PIE_BYTEMODE={0x8}, @TCA_PIE_TARGET={0x8, 0x1, 0x80000001}]}}, @TCA_STAB={0xa4, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x7, 0x2, 0x3ff, 0x1, 0x0, 0x4, 0x3, 0x3}}, {0xa, 0x2, [0x4, 0x800, 0xa]}}, {{0x1c, 0x1, {0x2, 0xb2, 0xe8, 0x7, 0x1, 0x3, 0x713}}, {0x4}}, {{0x1c, 0x1, {0xf, 0xa8, 0x3f18, 0xb, 0x2, 0x7f, 0x9f, 0x5}}, {0xe, 0x2, [0x7, 0x7ae8, 0x0, 0x4, 0x5]}}, {{0x1c, 0x1, {0x5, 0x8, 0x4, 0x58c7366f, 0x0, 0xa00e, 0xae, 0x5}}, {0xe, 0x2, [0x7, 0x3, 0x6, 0x8, 0x10]}}]}]}, 0x114}}, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$packet(0x11, 0x2, 0x300) io_uring_setup(0x71bb, &(0x7f0000000200)={0x0, 0x635a, 0x0, 0x2, 0x2d0}) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg(r0, &(0x7f0000000440)=[{{&(0x7f0000000700)=@xdp={0x2c, 0x0, r2}, 0x80, 0x0}}], 0x1, 0x0) 4m40.069652558s ago: executing program 3 (id=511): openat(0xffffffffffffff9c, 0x0, 0x5a7843, 0x165) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x20000}}, {{0xa, 0x0, 0x40000, @dev={0xfe, 0x80, '\x00', 0x26}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x8, {{0xa, 0x4e23, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) creat(0x0, 0x1e1) io_setup(0x200, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/mcfilter6\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000580)=""/128, 0x80}], 0x1, 0xb6, 0x0) 4m40.026743698s ago: executing program 32 (id=511): openat(0xffffffffffffff9c, 0x0, 0x5a7843, 0x165) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x20000}}, {{0xa, 0x0, 0x40000, @dev={0xfe, 0x80, '\x00', 0x26}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x8, {{0xa, 0x4e23, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) creat(0x0, 0x1e1) io_setup(0x200, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/mcfilter6\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000580)=""/128, 0x80}], 0x1, 0xb6, 0x0) 4m39.692243703s ago: executing program 1 (id=514): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffff12850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xb, &(0x7f0000000180)=ANY=[@ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff8500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='virtio_transport_alloc_pkt\x00', r2}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000080)={0x28, 0x0, 0x2711}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 4m39.691684903s ago: executing program 1 (id=515): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000006c0)={'#! ', '', [{0x20, 'memory.events\x008\x8b?\xa9R^\xda?O\x97\xfa\x1eT\x88\x00\af\x9e\x1dg\xac\xc2\x18\xc7-\xc9\xf7\xce\xc5\xe1\xac\xa5\xf2\x05\x10\xb1(\xdc\xec\xc7\xd5\xdb\xdc\xb9\x11\xb8\xa0\xed\x1c\xd8ql\xf9~\x89\x10\xd1\xad\xec'}]}, 0x4e) perf_event_open(&(0x7f00000004c0)={0x8, 0x80, 0x0, 0xc, 0x0, 0x0, 0x82, 0x200000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x9}, 0x18204, 0x0, 0x3, 0x0, 0x0, 0x5338c7af, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39ddd8) close(r2) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 4m39.549870135s ago: executing program 1 (id=517): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r1, &(0x7f0000000040), 0x10) listen(r1, 0x0) r2 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r2, &(0x7f0000000080), 0x10) sendmmsg(r2, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="1b", 0x40000}], 0x1}}], 0x1, 0x24008094) r3 = accept4$unix(r1, 0x0, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000140)=""/263, 0x40000, 0x0, 0x0, 0x0) 4m39.492882075s ago: executing program 1 (id=518): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$nl_generic(0x11, 0x3, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x2b, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @address_request}}}}, 0x0) sendmsg(r1, &(0x7f0000000640)={&(0x7f00000000c0)=@caif=@dgm={0x25, 0xd}, 0x80, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x11000000}, 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='\x00', 0x89901) move_mount(r2, &(0x7f0000000400)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) 4m39.467789256s ago: executing program 1 (id=520): perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x8, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x3, 0x9, 0x0, 0xd, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) r3 = openat$cgroup_int(r0, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000001c0)={[{0x2d, 'cpu'}]}, 0x5) write$cgroup_int(r3, 0x0, 0x0) 4m39.038224612s ago: executing program 1 (id=525): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="a1ab0000000000000e003200000008001701"], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x0) 4m39.037932392s ago: executing program 33 (id=525): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="a1ab0000000000000e003200000008001701"], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x0) 6.255070939s ago: executing program 2 (id=5565): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f00000000c0)=0x28) r1 = socket(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) r2 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080)=0x2, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000f6000000006debff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r3}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="14"], &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="0962915700"/17, @ANYRES16=0x0, @ANYBLOB="08002abd7000fddbdf25040000000800040000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x20000004) sendto$inet6(r2, 0x0, 0x0, 0x200c8004, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c) sendto$inet6(r2, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300", 0xffffffff}, 0x48, 0xffffffffffffffff) r5 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) pipe2(&(0x7f0000000280), 0x0) r6 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "6035ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x4, r6, r5, r5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'gretap0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0xd0f, 0x470bd2d, 0xfffffffd, {0x60, 0x0, 0x0, r7, {0x0, 0xfff2}, {0xfff1, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}, 0x1, 0x0, 0x0, 0x24000040}, 0x44080) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x40005) 6.23562769s ago: executing program 2 (id=5566): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f00000000c0)=0x28) r1 = socket(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) r2 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080)=0x2, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000f6000000006debff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r3}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="14"], &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="0962915700"/17, @ANYRES16=0x0, @ANYBLOB="08002abd7000fddbdf25040000000800040000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x20000004) sendto$inet6(r2, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300", 0xffffffff}, 0x48, 0xffffffffffffffff) r6 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) pipe2(&(0x7f0000000280), 0x0) r7 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "6035ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x4, r7, r6, r6, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'gretap0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0xd0f, 0x470bd2d, 0xfffffffd, {0x60, 0x0, 0x0, r8, {0x0, 0xfff2}, {0xfff1, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}, 0x1, 0x0, 0x0, 0x24000040}, 0x44080) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x40005) 6.17680423s ago: executing program 2 (id=5567): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='mm_page_alloc\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x9f, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffe, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000b70500000800000085000000a50000001801000020206405000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000003c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setgroups(0x0, 0x0) rmdir(&(0x7f0000000340)='./file0\x00') bpf$MAP_CREATE(0x0, 0x0, 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x24}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000400)='\b', 0x1}, {0x0}], 0x2, &(0x7f00000004c0)}, 0x20004000) r2 = open(&(0x7f0000000300)='./file0\x00', 0x101000, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000200)={{0x2, 0x4e24, @multicast1}, {0x306, @random="a737146951fe"}, 0x0, {0x2, 0x4e23, @broadcast}, 'hsr0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x18, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) 5.557435078s ago: executing program 2 (id=5573): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x50) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8042, 0x0) fcntl$setlease(r2, 0x400, 0x1) fsetxattr$security_selinux(r2, &(0x7f0000000400), &(0x7f0000000440)='system_u:object_r:semanage_exec_t:s0\x00', 0x25, 0x3) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)='P', &(0x7f0000000740), 0x4af, r1}, 0x38) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2074, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) setregid(0xffffffffffffffff, 0x0) r4 = syz_io_uring_setup(0x112, &(0x7f0000000140)={0x0, 0x24089, 0x80, 0x3}, &(0x7f0000000240)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000000c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x2, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}) r7 = epoll_create1(0x0) r8 = fcntl$dupfd(r7, 0x2, 0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000140)={@cgroup=r8, 0xffffffffffffffff, 0x11, 0x0, r8, @void, @value}, 0x11) io_uring_enter(r4, 0x47f6, 0xb273, 0x0, 0x0, 0x0) io_pgetevents(0x0, 0x3, 0x3, &(0x7f0000000440)=[{}, {}, {}], &(0x7f00000004c0)={0x0, 0x3938700}, 0x0) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r9}, 0x10) 5.522392489s ago: executing program 2 (id=5575): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket(0x10, 0x803, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x903, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0xa, 0x84}}}, 0x48}}, 0x90) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x50}}, 0x20008844) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@newqdisc={0x40, 0x24, 0x300, 0x0, 0x25dfdc00, {0x60, 0x0, 0x0, 0x0, {}, {0x2, 0xffff}, {0xfff3, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x10, 0x2, [@TCA_CAKE_BASE_RATE64={0xc, 0x2, 0x1ff}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0xc4014}, 0x10) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x50}}, 0x4000000) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$netlink(0x10, 0x3, 0x8) r5 = getpid() r6 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) r7 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f0000000100)={0x0, 0x4100, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r7, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r5}}]}, 0x3c}}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r6) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x11}, 0x240c4044) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) r9 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x1, 0x0) writev(r9, &(0x7f0000000040), 0x0) 2.226640491s ago: executing program 4 (id=5616): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') write$binfmt_script(r1, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xfffd, 0x100002, {"00000000000000000000000000000001"}, 0x2000000000001005, 0x5, 0x7}}}, 0x90) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000200)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r2, 0x0, 0x9}, 0x18) unlink(&(0x7f0000000180)='./file1\x00') syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, 0x0, 0x4000) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000002c0)=0x1) r4 = socket(0x28, 0x5, 0x0) r5 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r5, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r5, 0x0) connect$vsock_stream(r4, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) r6 = accept4$unix(r5, 0x0, 0x0, 0x0) recvfrom$unix(r6, &(0x7f0000000140)=""/129, 0x81, 0x10120, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.077489373s ago: executing program 0 (id=5618): r0 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x100000, 0x0, 0x2000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r3}, 0x18) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x80000000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000938500000071000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=ANY=[@ANYBLOB="12000000080000000800"], 0x48) r7 = syz_open_dev$sg(0x0, 0x0, 0x401) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000240)='sched_switch\x00', r8, 0x0, 0x6}, 0x18) ioctl$SG_BLKTRACETEARDOWN(r7, 0x1276, 0x0) r9 = socket(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r9}, 0x20) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9905}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GTP_CREATE_SOCKETS={0x5, 0x5, 0x1}, @IFLA_GTP_PDP_HASHSIZE={0x8, 0x3, 0x1}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x8000) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@deltclass={0x4c, 0x29, 0x300, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xe}, {0x3, 0xa}, {0xf, 0xc}}, [@tclass_kind_options=@c_fq_codel={0xd}, @tclass_kind_options=@c_prio={0x9}, @tclass_kind_options=@c_multiq={0xb}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000804}, 0x0) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) setxattr$incfs_id(&(0x7f0000000080)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000440), 0x0, 0x0, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x307, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7, 0x4, 0x400008, 0x8000, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, r0, 0x3) 2.052036993s ago: executing program 0 (id=5620): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000f20b00000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000007f1600850000008200000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x1c, r2, 0x62c21a4ade68aba1, 0x0, 0x0, {{0x5}, {@val={0x8, 0x3, 0xa}, @void, @void}}}, 0x1c}}, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x10, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8a38f0ff00000000bfa100000000000007010000f8fffff9bfa400000000000007040000f0ffc9ffbf1f0000084000001823000003ceab878af86f57fc7dcddb58a8c0c49327bb56d75775f21ea74ea79d45376054e9c4fa9f872efe72ef66", @ANYRES32=r5, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000080)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x10000}, 0x1c) close(r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000c800000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCMIWAIT(r8, 0x545c, 0x0) ioctl$TIOCVHANGUP(r8, 0x5437, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f00000001c0), r10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 1.365227572s ago: executing program 4 (id=5629): r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080)=0x2, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x200c8004, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbdd", 0xce, 0xc001, 0x0, 0x0) 1.321054153s ago: executing program 4 (id=5631): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x50) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8042, 0x0) fcntl$setlease(r2, 0x400, 0x1) fsetxattr$security_selinux(r2, &(0x7f0000000400), &(0x7f0000000440)='system_u:object_r:semanage_exec_t:s0\x00', 0x25, 0x3) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)='P', &(0x7f0000000740), 0x4af, r1}, 0x38) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2074, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) setregid(0xffffffffffffffff, 0x0) r4 = syz_io_uring_setup(0x112, &(0x7f0000000140)={0x0, 0x24089, 0x80, 0x3}, &(0x7f0000000240)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000000c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x2, 0x0, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}) epoll_create1(0x0) io_uring_enter(r4, 0x47f6, 0xb273, 0x0, 0x0, 0x0) io_pgetevents(0x0, 0x3, 0x3, &(0x7f0000000440)=[{}, {}, {}], &(0x7f00000004c0)={0x0, 0x3938700}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) 1.320436523s ago: executing program 4 (id=5632): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='mm_page_alloc\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x9f, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffe, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000b70500000800000085000000a50000001801000020206405000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000003c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setgroups(0x0, 0x0) rmdir(&(0x7f0000000340)='./file0\x00') bpf$MAP_CREATE(0x0, 0x0, 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x24}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000400)='\b', 0x1}, {0x0}], 0x2, &(0x7f00000004c0)}, 0x20004000) r2 = open(&(0x7f0000000300)='./file0\x00', 0x101000, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000200)={{0x2, 0x4e24, @multicast1}, {0x306, @random="a737146951fe"}, 0x0, {0x2, 0x4e23, @broadcast}, 'hsr0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x18, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) 1.300697123s ago: executing program 5 (id=5633): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = semget$private(0x0, 0x6, 0x0) semop(r2, &(0x7f00000000c0)=[{0x1, 0xfffe, 0x3000}], 0x1) semop(r2, &(0x7f0000000180)=[{0x1, 0x4000, 0x1000}, {0x0, 0x0, 0x2000}], 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x18, &(0x7f00000009c0)=[{&(0x7f0000000140)="d800000018007b29e00212ba0d8105040a601800fe0f040b067c55a1bc000900b80006990600000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04fb95cae8c9010000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad8ffd5e1cace81ccd40dd601edef3d93452a92307ff0ff0e97031e9f05e9f16e9cb500"/216, 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x1, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) fchdir(r6) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000300)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@jqfmt_vfsold}, {@minixdf}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) r7 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_INIT(r7, 0x29, 0xc8, &(0x7f0000000000), 0x4) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r9 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r8, &(0x7f00000005c0)=ANY=[@ANYBLOB="020086dd0300000000003012000060ec970012301100fe8000000000000000000000000000aaff020000000000000000000000000001"], 0xfdef) r10 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x300, 0x198, 0xffffffff, 0xffffffff, 0x198, 0xffffffff, 0x268, 0xffffff7a, 0xffffffff, 0x268, 0xffffffff, 0x7fffffe, 0x0, {[{{@ip={@broadcast, @loopback, 0x0, 0x0, 'veth1\x00', 'veth0_to_team\x00', {}, {}, 0x0, 0x0, 0x41}, 0x6, 0x130, 0x198, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "00000100cbd047da9ca965f96ad5801f0514d363ee84bb895919d9490f6785fba3c4a44f1e25ecefef2a2d6054f5260ece5ce1a56a5ef73be11d65bfe8c37674024c183ebacdf741cea92ded3a9ca54de15dd9ec8ef62f9e000000000000000000ffffff7f00", 0x7d}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x2, 0x0, 'snmp_trap\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) 1.187982674s ago: executing program 0 (id=5634): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f00000000c0)=0x28) r1 = socket(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) r2 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080)=0x2, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000f6000000006debff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r3}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="14"], &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="0962915700"/17, @ANYRES16=0x0, @ANYBLOB="08002abd7000fddbdf25040000000800040000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x20000004) sendto$inet6(r2, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300", 0xffffffff}, 0x48, 0xffffffffffffffff) r6 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) pipe2(&(0x7f0000000280), 0x0) r7 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "6035ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x4, r7, r6, r6, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'gretap0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0xd0f, 0x470bd2d, 0xfffffffd, {0x60, 0x0, 0x0, r8, {0x0, 0xfff2}, {0xfff1, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}, 0x1, 0x0, 0x0, 0x24000040}, 0x44080) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x40005) 1.186747454s ago: executing program 4 (id=5635): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020756c2500"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) writev(r0, &(0x7f0000000d00)=[{&(0x7f00000007c0)="cf33323d92b48a5a7fcec2ec5ab800fa7397a7db9cc4c07eb0fcff42381dee4c89165d1484eb78334eb08f0423bd8580be2ff0ddc917272d265580205f615f55ef7a0c7e76f28f5051cc1d4729a4a29d3c28cd37eb4cf1c5c0a1483f37684d0a4cf7cf486582fdb2ddef7083a68ae75ccd4e0fb4832600acb2ad8fa4b094d15a4b646177cbf75f1d9d3aecaa4b0f12e74e35acb7ac499283a71314d2845d5952dbd179fb9da1bcaa7d797d34b660d8896ad863c9c3507ea988cc0fb57093", 0xbe}, {&(0x7f0000000880)="1cd9d0d6565de6e0886688c5d175adcc1d21672ba4a3e4d84d4e792c86ae9624fd90fc24053f3ef481e949bd7e604b80b29c7966d26b3b51c63b5b65faf51d3ec3bf56b68eea4068c5e2873ce7309846d612119067be1dd54040439bbf49ae9777f082f39cae4303e689f782bbdabd146337ec111529ec27fe2bffc7af4a72b91f9aa8ce98933ec470396ec0bf586dc3488016a5ca7fa629040ae318790231ca3c67e2751a93fb849ade3ed1302cdd17016b6326adfa248564cc15b34a76f461126f908aba238fa919a40c252ae9cc6f584fc08bcc8c357468aea3bdd4a14b", 0xdf}, {&(0x7f0000000a00)="c5676f95c4c7034122616f801ca8687af2c1ac08c7c52eba954051aa34ffd8c3503aefdfe7bc4b5c5c804a025f0d4b11e786d73bdf740b2a39d3a8f5a9c9f977e87f36b32df8ac9d3d6152cceeb2e05bb709726ba90c2365c0c3c226fb83ac0bd1327b83c541ed3f44a9aa638d6e1d13310a00114840a179380b382a0d090b694f5899616af3cd840fa7c6505bd36c99e0a182ef28d75e7934eb60d470593881a6", 0xa1}, {&(0x7f0000000ac0)="99d2fe8956b1921d760e64874bb036c51cf36f34bbe06e7d28a1f68512ca2f24fe74ebf0649b197376c9711804a7369844f884dc165cbf7db6f37415ef4e9ee049d51568f0d239cb342351ef39a8b1e84ae42a39046e857fd9467cd7c6b31b1cde0291b0d8485f71de74aa128d11593555661043798aae7acd1478b0e075bf5fe5b736b2611f27ae77820e8d47773a9c92954cef0cf151a54ec46fc2dcdee5f4d91960b67649e58f", 0xa8}, {&(0x7f0000000b80)="b1243111b95a400d7e229abaa4a8bf2cdbf859c61de82289571b219b4b91d4e775cf22b1240b9251a3b0d7047742a947edea8768e7f1d1a62a3f0981e5f72a2a7395f4fb7d39b74247b196555c74596469bee5e1c1e3aac1a737b34cac5522f5b2e878bbbaf95f0e59ef50a7af5b39cebb3dd99b76", 0x75}, {&(0x7f0000000c00)="f770a21007c3ffb308167a884df93fb42e8c24e5c80beeb9f40ca1557a9b2a817b5ed2367d921a2b612705778b0847001430a01dac8554bdfabdd23befacba1e98f9c3c7f34322c7927c9032c246e20c75c9514a913b1bdc8d88a7a554baf0454e14a9b78c91ce7fdbd68d6fe3e449834b66ab961c0f8af29f17029bc946ab3a591537da1e14a713304ea96b1b6841c803734aea316c1e803a1894c7d6815d8230e0911ad74d103a1e9da4618de316dd1f976dccd04b699738afbf0198e157eeae24fbda64858dbb2e73c1c2475bfcfbe0fde7fe2b", 0xd5}], 0x6) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000180)=0x8, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1d, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) clock_gettime(0x0, &(0x7f00000006c0)) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1018000, &(0x7f00000000c0)=ANY=[@ANYRES8=0x0, @ANYRES64, @ANYRESDEC, @ANYRESOCT, @ANYRESHEX, @ANYRESDEC], 0x1, 0x2ee, &(0x7f00000003c0)="$eJzs3M9PE1sUwPHTH5S2BMri5b28l7xwoxvdTKC6VhoDibGJBKnxR2IywFSbji2ZaTA1RnTl1vhHuCAs2ZEo/wAbd7px446NiQtZGMd0OkNpGUBKaRG+n4TMYe49nXtnBnLuhGHzzuvHxbyt5fWKhONKQiIiWyLDEhZfyNuG3TgmO72QiwPfPv5/6+69G5lsdmJaqcnMzKW0Umpo5N2TZwmv21q/bAw/2Pya/rLx98a/mz9nHhVsVbBVqVxRupotf67os6ah5gt2UVNqyjR021CFkm1Y9fZyvT1vlhcWqkovzQ8mFyzDtpVeqqqiUVWVsqpYVRV5qBdKStM0NZgUHCS3PD2tZ9pMnuvwYHBMLCujR0Qksaslt9yTAQEAgJ5qrf/DojpZ/6+cW68M3F4d8ur/tVhQ/X/5U/2zmur/uIgE1v/+8QPrf/1w9f/uiuhsOVL9j5NhJLZrV6gR1hqtjJ70fn5dL++vjLoB9T8AAAAAAAAAAAAAAAAAAAAAAH+CLcdJOY6T8rf+V7+IxEXE/z4gNSIiV3swZHTQEa4/ToHGi3vRIRHz1WJuMVffeh3WRcQUQ0YlJT/c+8FTi/03j1TNsLw3l7z8pcVcxG3J5KXg5o9Jqk9a8x1n8np2YkzVNef3SXJnflpS8ldwfjowPyYXzu/I1yQlH+akLKbMu+No5D8fU+razWxLfsLtBwAAAADAaaCpbYHrd03bq72ev72+bn0+EGmsr0cD1+dR+S/a27kDAAAAAHBW2NWnRd00DWufICEH92k/iB7TJ/sz/N0s/28Zjm+m+wT+wZua4t7Ojp+W0CFOyx5BWNrJGqnNRh11Fv5jo736yNR4965g0zD+efP2e+cOcWU1fsBM2w8i+98AfV37BQQAAACgaxpFv79nvLcDAgAAAAAAAAAAAAAAAAAAAAAAAAAAAADgDOrGv0nr9RwBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAk+JXAAAA//+qDgR1") r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040), 0xfd12) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) fdatasync(r4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) inotify_init1(0x80800) ioprio_set$uid(0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.181820135s ago: executing program 0 (id=5636): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') write$binfmt_script(r1, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xfffd, 0x100002, {"00000000000000000000000000000001"}, 0x2000000000001005, 0x5, 0x7}}}, 0x90) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000200)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r2, 0x0, 0x9}, 0x18) unlink(&(0x7f0000000180)='./file1\x00') syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, 0x0, 0x4000) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x28, 0x5, 0x0) r4 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r4, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) connect$vsock_stream(r3, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) 1.135548355s ago: executing program 5 (id=5637): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f00000000c0)=0x28) r1 = socket(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) r2 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080)=0x2, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000f6000000006debff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r3}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="14"], &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="0962915700"/17, @ANYRES16=0x0, @ANYBLOB="08002abd7000fddbdf25040000000800040000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x20000004) sendto$inet6(r2, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300", 0xffffffff}, 0x48, 0xffffffffffffffff) r6 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) pipe2(&(0x7f0000000280), 0x0) r7 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "6035ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x4, r7, r6, r6, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'gretap0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0xd0f, 0x470bd2d, 0xfffffffd, {0x60, 0x0, 0x0, r8, {0x0, 0xfff2}, {0xfff1, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}, 0x1, 0x0, 0x0, 0x24000040}, 0x44080) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x40005) 1.107570546s ago: executing program 4 (id=5639): syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x66, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xe, 0x5, 0x1}, 0x10, 0x27deb, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x1, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/asound/timers\x00', 0x0, 0x0) lseek(r0, 0x164, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000380)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$inet6(0xa, 0x2, 0x3a) sendto$inet6(r5, &(0x7f0000000080)="800009e92208a1ce", 0xfdef, 0xf702, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) readv(r5, &(0x7f0000001500)=[{&(0x7f0000000340)=""/191, 0xbf}], 0x1) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x40, 0x20}, {0x20, 0x0, 0x0, 0xfffff010}, {0x6, 0x0, 0x8, 0x4}]}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) r6 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r6, 0x6628) ioperm(0x0, 0x7, 0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) 1.047529316s ago: executing program 5 (id=5640): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') write$binfmt_script(r1, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xfffd, 0x100002, {"00000000000000000000000000000001"}, 0x2000000000001005, 0x5, 0x7}}}, 0x90) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000200)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r2, 0x0, 0x9}, 0x18) unlink(&(0x7f0000000180)='./file1\x00') syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, 0x0, 0x4000) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000002c0)=0x1) r4 = socket(0x28, 0x5, 0x0) r5 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r5, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r5, 0x0) sendmmsg(r4, &(0x7f0000000100)=[{{0x0, 0x2d, &(0x7f00000000c0)=[{&(0x7f0000000000)="1b", 0x40000}], 0x1}}], 0x1, 0x0) r6 = accept4$unix(r5, 0x0, 0x0, 0x0) recvfrom$unix(r6, &(0x7f0000000140)=""/129, 0x81, 0x10120, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.047107086s ago: executing program 0 (id=5641): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x9}, 0x18) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) pread64(r1, &(0x7f0000000080)=""/87, 0x57, 0x1e24429c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000000040)=0x0) timer_settime(r4, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000680)={&(0x7f0000000240)={0x2, 0x4e21, @local}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000340)="5f5c31c00ff248c8e577122b014ad26b16aedbbece7373fafae9b61d44f985595f39ea152912455c843033df7765495505bee5b0bfc32e26f8b0ced56b7f71923741fa24980a084fd7cce0840f12928f69c8d8315dec028e392bc78151341bc981819620179ad1d465b776c5a85511749d8df18324eb6a87f2d8d6455883143c0087116ab12c36938a0327", 0x8b}, {&(0x7f0000000400)="566951ec39a466c3272d9e6d33d4ca301f97b8f6b30df05fe595b5ca207f13d5cb01c07d809c04e504ee584cf8e6c86f9c6e1baa71b3601b66d7638bd3fc19d9a7305cf01da20afc15d24e7cc61fbde3", 0x50}, {&(0x7f00000004c0)="270856d30e8f640150da403c974d91893a7fb29e72f3b97ed2e9de1ea8b58520ecec257fbea9b37e18b97a30fafb03eaedefc9995fee4f42649903e06bc0cbc7ad6e35d68887b2d7eec4c07a203d3705a50d", 0x52}, {&(0x7f0000000540)="aa3d5e6641e97aa0c6e0d0fbd383b066f6528c4ea01b0b152e78166c98c3dcf1a55e9983e42a3ee4eaeda5629888f2321f380edff261e4a29bd24b0ff69c52896bbae12a522e1bb35bb49258f299f6950b84e87b0284ae", 0x57}, {&(0x7f0000000700)="c28db8fc877fa1bfdfa627e94cf257d2e9143e9d031cda3916f48a95f781bd77338235e621d3ae7933caafcebcf65cd999116e3e62caa410004145b8077e217d3eb74e66540c40a91dad484a7030e731587a1ed6030ef783106c9bcd7bc5a40e2324f05ad4ea6777f640ee3d9a10e14571455d028e3b6ec12745adc66b87b690769aee3a5eb2d78fbf79a2db71b42193c818091efb5c79a70d2ef372df93228f69583162abf47754d9d395c9a25cb3d443b1789e9377f4", 0xb7}, {&(0x7f00000007c0)="84346ccc1e2defc9e0e45b44266b3c645b129b96748aa9d67c8a0ba5d71c71c5842ffca9fa99c964300cfced2c08ee2c23ebe73d02d4bd613908e2ae0e9beec0a2b87771b81a994218b6c81d8ebc52bee782f6404647b2e626c304d7566d9f63b5397bdb5c1fab1b722ba0925506009745bfb1c1033f0d539acfb8f63965f0f97305df3093e9ca1d3559a8eabd7ce64699c8cd437ea98ea9697b9ce89643d105c99aa0d982d36afde1e1fd31ad65b6e536cbed127e9bc230154f3f6a9f32977553c3089cd15fc60d4a43067c94baba0e0d1d63daa361022afa0aa035156363bb937b82a21011b06b", 0xe8}, {&(0x7f00000002c0)="cdaaf56d2debd6aa970c75b771af04703b5978a5b414d261f0ee3c0fc363171087307251d5c6a2dc21513e19dcee5fa205f7a4", 0x33}], 0x7}, 0x4000001) write(r5, &(0x7f0000000340), 0x11000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000200)={0xa000000a}) vmsplice(r5, &(0x7f0000000280)=[{&(0x7f0000000200)="a5", 0x1}], 0x1, 0x0) 928.031708ms ago: executing program 6 (id=5643): r0 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x100000, 0x0, 0x2000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r3}, 0x18) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x80000000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000938500000071000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=ANY=[@ANYBLOB="12000000080000000800"], 0x48) r7 = syz_open_dev$sg(0x0, 0x0, 0x401) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000240)='sched_switch\x00', r8, 0x0, 0x6}, 0x18) ioctl$SG_BLKTRACETEARDOWN(r7, 0x1276, 0x0) r9 = socket(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r9}, 0x20) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9905}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GTP_CREATE_SOCKETS={0x5, 0x5, 0x1}, @IFLA_GTP_PDP_HASHSIZE={0x8, 0x3, 0x1}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x8000) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@deltclass={0x4c, 0x29, 0x300, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0xe}, {0x3, 0xa}, {0xf, 0xc}}, [@tclass_kind_options=@c_fq_codel={0xd}, @tclass_kind_options=@c_prio={0x9}, @tclass_kind_options=@c_multiq={0xb}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000804}, 0x0) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) setxattr$incfs_id(&(0x7f0000000080)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000440), 0x0, 0x0, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x307, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7, 0x4, 0x400008, 0x8000, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, r0, 0x3) 655.778982ms ago: executing program 6 (id=5644): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_read_part_table(0x635, &(0x7f0000000000)="$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") r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006c59850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r2 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000080)={0x0}) syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000001200)={0x60000010}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, 0x0) sendmsg$NFT_BATCH(r3, 0x0, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x64}, 0x1, 0x0, 0x0, 0x24004040}, 0x0) socketpair(0x1d, 0x4a8afd496012cb33, 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) r6 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r6, 0x0, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000008000/0x4000)=nil) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x40, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) r8 = syz_open_dev$sg(0x0, 0x0, 0x0) dup(r7) ioctl$SG_SET_RESERVED_SIZE(r8, 0x2275, 0x0) 491.852673ms ago: executing program 6 (id=5645): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x8205, &(0x7f0000000e00)={[{@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@data_err_abort}, {@bsdgroups}, {@errors_remount}, {@discard}, {@noblock_validity}, {@barrier}, {@journal_dev={'journal_dev', 0x3d, 0xf35}}]}, 0x1, 0x618, &(0x7f0000000640)="$eJzs3c9rHG0dAPDvzCYxed9oWpFii2LAQwvS/KjFqqe2F3soWLAHEQ8NTVJDN21oUrC1YAoeFBREvIr04j/gXYpXbyKoN89CFYl4UOnKzM60a3Y32ebN7mwznw/M9plnZvd5vjv7dJ5nNs9OALU1nz2kEWcj4k4SMdexbTbaG+eL/fb+8exutiTRan3j70kkRV65/+vi3w+zhyRiOiJ+fz3ik43ucrefPL2/0my1fT9icWdza3H7ydOLG5sr99burT1YvvTly1eWvrJ8eflY4izjunHz65/5yQ++86X1PzQvJnE1bk9+bzX2xXFc5mM+XhchduZPRMSVLNHjfXnflCEkFdeDo2kUn8fJiDgTc9HI19rmYuPHlVYOGKpWI6IF1FSi/UNNlf2Acmw/jHHwOHt1rT0A6o5/on1tJKbzsdEHe0nHyKg93j11DOVnZfz32blfZEv0uQ4xcQzl9LP7PCI+3Sv+JK/bqfwqThZ/GmnH87L0UkRMFe/FYOP/ya6c+X3ro/78vUv8ncchi/9q8W+Wf/2I5VcdPwD19PJacSLfzdbenv+ynmHZ/4ke/Z/ZHueuo6j6/Ne//1ee76fza+Tpvn5Y1t+51fsluzo5f/nRjZ/1K7+z/5ctWfllX3AUXj2POLcv/h/mHb3kzfFPehz/bJc7A5bxtT/+7Ua/bVXH33oRcb7n+OdtjzZLLe5sbpV5+76fXFzfaK4ttR97lvGb3337V/3Krzr+7PhHn/HfQcc/y9sasIxf33qx2W/b7KHxp3+dSm7nqaki57srOzuPliOmkpvFLh35lw6uS7lP+RpZ/Bc+37v994q/KCo/0Lv/9270t/XN+3v99hv4+HcPnTKvWweHe6gs/tU+n//Djv9PByzjX996/Nl9WTNl4qD4Z7pfKtl95wgBAAAAAACgPtL8O9gkXXiTTtOFhfYc3k/FB2nz4fbOF9YfPn6wGnEh/3vIybT8pnuuvZ5k68vF38OW65f2rX8xIk5HxM8bM/n6wt2HzdWqgwcAAAAAAAAAAAAAAAAAAIAx8WEx/7+8T/U/G+35/wPZOTPk2gFDN8wbzAHjTfuH+srbf1p1LYAqOP9DfWn/UF/aP9SX9g/1pf1DfWn/UF/aP9SX9g8AAAAAJ9Lpz738cxIRu1+dyZfMVLFtstKaAcP27m18fij1AEavMdKnAePkzVf/pv9D7QzU//938eOAw68OUIGkV2beOWgd3Phf9nwmAAAAAAAAAAAAADAE58+a/w91lcZvq64CUJHuifxn9wac6Oc3AOA956f/ob4+0hjfBQI4EQ6bxT/db4P5/wAAAAAAAAAAAAAwMrP5kqQLxS1AZyNNFxYiPh4Rp2IyWd9ori1FxCci4k+NyY9l68tVVxoAAAAAAAAAAAAAAAAAAABOmO0nT++vNJtrjzoT/+nKOdmJ8i6o41KfzkQkoy90JiLGIfbhJCY6cpKI3ezIj0XFHm3HWFQjzatR8X9MAAAAAAAAAAAAAAAAAABQQx1zj3s798sR1wgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAARu/t/f+PnkgOeZ2qYwQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3k//CwAA//9vNjw9") r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r3, 0x4b52, &(0x7f0000000040)={0xfa, &(0x7f0000000000)=[{}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r4 = socket(0x2a, 0x2, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}, {0xffe0, 0xfff1}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x14, 0x2, [@TCA_FQ_CODEL_CE_THRESHOLD={0x8, 0x7, 0x4}, @TCA_FQ_CODEL_CE_THRESHOLD_SELECTOR={0x5, 0xa, 0x3}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r8, 0x0, 0x5}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r10, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) 461.438474ms ago: executing program 6 (id=5646): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f00000000c0)=0x28) r1 = socket(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) r2 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080)=0x2, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000f6000000006debff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r3}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="14"], &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="0962915700"/17, @ANYRES16=0x0, @ANYBLOB="08002abd7000fddbdf25040000000800040000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x20000004) sendto$inet6(r2, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300", 0xffffffff}, 0x48, 0xffffffffffffffff) r6 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) pipe2(&(0x7f0000000280), 0x0) r7 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "6035ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x4, r7, r6, r6, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'gretap0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0xd0f, 0x470bd2d, 0xfffffffd, {0x60, 0x0, 0x0, r8, {0x0, 0xfff2}, {0xfff1, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}, 0x1, 0x0, 0x0, 0x24000040}, 0x44080) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x40005) 443.642514ms ago: executing program 6 (id=5647): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='mm_page_alloc\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x9f, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffe, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000b70500000800000085000000a50000001801000020206405000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000003c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setgroups(0x0, 0x0) rmdir(&(0x7f0000000340)='./file0\x00') bpf$MAP_CREATE(0x0, 0x0, 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x24}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000400)='\b', 0x1}, {0x0}], 0x2, &(0x7f00000004c0)}, 0x20004000) r2 = open(&(0x7f0000000300)='./file0\x00', 0x101000, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000200)={{0x2, 0x4e24, @multicast1}, {0x306, @random="a737146951fe"}, 0x0, {0x2, 0x4e23, @broadcast}, 'hsr0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000180)={0x0, 0x18, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) 339.007795ms ago: executing program 6 (id=5648): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd885000000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x9}, 0x18) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) pread64(r1, &(0x7f0000000080)=""/87, 0x57, 0x1e24429c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000000040)=0x0) timer_settime(r4, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000680)={&(0x7f0000000240)={0x2, 0x4e21, @local}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000340)="5f5c31c00ff248c8e577122b014ad26b16aedbbece7373fafae9b61d44f985595f39ea152912455c843033df7765495505bee5b0bfc32e26f8b0ced56b7f71923741fa24980a084fd7cce0840f12928f69c8d8315dec028e392bc78151341bc981819620179ad1d465b776c5a85511749d8df18324eb6a87f2d8d6455883143c0087116ab12c36938a0327", 0x8b}, {&(0x7f0000000400)="566951ec39a466c3272d9e6d33d4ca301f97b8f6b30df05fe595b5ca207f13d5cb01c07d809c04e504ee584cf8e6c86f9c6e1baa71b3601b66d7638bd3fc19d9a7305cf01da20afc15d24e7cc61fbde3", 0x50}, {&(0x7f00000004c0)="270856d30e8f640150da403c974d91893a7fb29e72f3b97ed2e9de1ea8b58520ecec257fbea9b37e18b97a30fafb03eaedefc9995fee4f42649903e06bc0cbc7ad6e35d68887b2d7eec4c07a203d3705a50d", 0x52}, {&(0x7f0000000540)="aa3d5e6641e97aa0c6e0d0fbd383b066f6528c4ea01b0b152e78166c98c3dcf1a55e9983e42a3ee4eaeda5629888f2321f380edff261e4a29bd24b0ff69c52896bbae12a522e1bb35bb49258f299f6950b84e87b0284ae", 0x57}, {&(0x7f0000000700)="c28db8fc877fa1bfdfa627e94cf257d2e9143e9d031cda3916f48a95f781bd77338235e621d3ae7933caafcebcf65cd999116e3e62caa410004145b8077e217d3eb74e66540c40a91dad484a7030e731587a1ed6030ef783106c9bcd7bc5a40e2324f05ad4ea6777f640ee3d9a10e14571455d028e3b6ec12745adc66b87b690769aee3a5eb2d78fbf79a2db71b42193c818091efb5c79a70d2ef372df93228f69583162abf47754d9d395c9a25cb3d443b1789e9377f4", 0xb7}, {&(0x7f00000007c0)="84346ccc1e2defc9e0e45b44266b3c645b129b96748aa9d67c8a0ba5d71c71c5842ffca9fa99c964300cfced2c08ee2c23ebe73d02d4bd613908e2ae0e9beec0a2b87771b81a994218b6c81d8ebc52bee782f6404647b2e626c304d7566d9f63b5397bdb5c1fab1b722ba0925506009745bfb1c1033f0d539acfb8f63965f0f97305df3093e9ca1d3559a8eabd7ce64699c8cd437ea98ea9697b9ce89643d105c99aa0d982d36afde1e1fd31ad65b6e536cbed127e9bc230154f3f6a9f32977553c3089cd15fc60d4a43067c94baba0e0d1d63daa361022afa0aa035156363bb937b82a21011b06b", 0xe8}, {&(0x7f00000002c0)="cdaaf56d2debd6aa970c75b771af04703b5978a5b414d261f0ee3c0fc363171087307251d5c6a2dc21513e19dcee5fa205f7a4", 0x33}], 0x7}, 0x4000001) write(r5, &(0x7f0000000340), 0x11000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000200)={0xa000000a}) vmsplice(r5, &(0x7f0000000280)=[{&(0x7f0000000200)="a5", 0x1}], 0x1, 0x0) 285.219656ms ago: executing program 2 (id=5649): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xa00008, &(0x7f0000000140)={[{@min_batch_time={'min_batch_time', 0x3d, 0xd}}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@noblock_validity}]}, 0x1, 0x7ad, &(0x7f00000007c0)="$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") creat(&(0x7f0000000000)='./bus\x00', 0x0) mount(&(0x7f00000001c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./bus\x00', 0x0, 0x4004, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000013c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x1c0, 0x178, 0x394, 0x1c0, 0x178, 0x2a0, 0x258, 0x258, 0x2a0, 0x258, 0x3, 0x0, {[{{@ipv6={@loopback={0x1f0}, @mcast2, [], [], 'team_slave_0\x00', 'netpci0\x00'}, 0x0, 0x190, 0x1c0, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'kmp\x00', "fc6b061134c5d5c8465af5f5caa5bd6c0dde77ff83daa984c0d76167e0608dcaa2caff7bd9c5923cccd5b483df8124249f91b8c3c2cea9bed64dc935a975401a68e34a04c1f15e50050729ba985e8c1576994e350d93a782668d4d51a1bc76bba1fde09794922ae65a804c56f092e430ebb8fa892d671c8c8035cae06810f8c6", 0x20}}, @common=@unspec=@addrtype1={{0x28}, {0xa}}]}, @common=@inet=@SET2={0x30}}, {{@ipv6={@private1, @mcast1, [], [], 'wg2\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000000)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000001700)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x1}, 0x8806, 0x3, 0x634e, 0x0, 0x0, 0x1, 0xfff6, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) prctl$PR_SET_NAME(0xf, &(0x7f0000000200)='team_slave_0\x00') bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r2, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="000c2527e55eb315c700000000000000b708e5ff000000007b8af8ff00000000bfa200000000040007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x1}, 0x10) fcntl$addseals(0xffffffffffffffff, 0x409, 0xf) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) bind$tipc(r3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x200000000006, 0x0, 0x2, 0x7ffc0002}]}) gettid() timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r4, 0x25, &(0x7f0000000000)={0x1}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r5, 0x26, &(0x7f0000000380)={0x0, 0x1, 0x103ff, 0x1}) 207.534527ms ago: executing program 5 (id=5650): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f00000000c0)=0x28) r1 = socket(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) r2 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080)=0x2, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000f6000000006debff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r3}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="14"], &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendto$inet6(r2, 0x0, 0x0, 0x200c8004, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c) sendto$inet6(r2, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300", 0xffffffff}, 0x48, 0xffffffffffffffff) r5 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) pipe2(&(0x7f0000000280), 0x0) r6 = add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "6035ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x4, r6, r5, r5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'gretap0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0xd0f, 0x470bd2d, 0xfffffffd, {0x60, 0x0, 0x0, r7, {0x0, 0xfff2}, {0xfff1, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}, 0x1, 0x0, 0x0, 0x24000040}, 0x44080) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x40005) 190.337377ms ago: executing program 0 (id=5651): r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') write$binfmt_script(r1, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xfffd, 0x100002, {"00000000000000000000000000000001"}, 0x2000000000001005, 0x5, 0x7}}}, 0x90) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000200)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r2, 0x0, 0x9}, 0x18) unlink(&(0x7f0000000180)='./file1\x00') syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_GET_TUNSRC(r0, 0x0, 0x4000) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000002c0)=0x1) r4 = socket(0x28, 0x5, 0x0) r5 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r5, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r5, 0x0) connect$vsock_stream(r4, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) r6 = accept4$unix(r5, 0x0, 0x0, 0x0) recvfrom$unix(r6, &(0x7f0000000140)=""/129, 0x81, 0x10120, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 148.283408ms ago: executing program 5 (id=5652): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000003c0)={'hsr0\x00', &(0x7f0000000380)=@ethtool_sset_info={0x37, 0xffff, 0x1}}) sched_setscheduler(0x0, 0x1, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001580), 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/29, 0x1d, 0x5f) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000002000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000006f6400000000000045040400010000001704000001000a00b7040000ff0100006a0a00fe0000000085000000bd000000b70000000000000095000000000000009e17f1"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) r6 = gettid() close(0xffffffffffffffff) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r7}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x24, r5, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_PID={0x8, 0x1c, r6}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000000) sendmsg$netlink(r3, 0x0, 0x80) 0s ago: executing program 5 (id=5653): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f00000001c0)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, &(0x7f0000000300)='GPL\x00', 0x9, 0x1, &(0x7f0000000340)=""/1, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) io_submit(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f0000000400)='./file0\x00', 0x410c84, &(0x7f00000003c0)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}]}, 0x1, 0x775, &(0x7f0000001180)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x88882, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = inotify_init() r4 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) r5 = inotify_add_watch(r3, &(0x7f0000000240)='./file0\x00', 0x8c7) write$binfmt_elf32(r4, &(0x7f0000000040)=ANY=[@ANYRES64=r5], 0x69) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) close(r4) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0xc, &(0x7f0000000680)=ANY=[@ANYRESOCT=r6, @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = openat$binfmt_register(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$binfmt_register(r9, &(0x7f0000000000)={0x3a, 'syz3', 0x3a, 'E', 0x3a, 0x6, 0x3a, 'E', 0x3a, '@{@$\x9a$^', 0x3a, './file2', 0x3a, [0x46, 0x43, 0x43]}, 0x32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) write(r2, &(0x7f0000004200)='t', 0x1) sendfile(r2, r1, 0x0, 0x3ffff) sendfile(r2, r1, 0x0, 0x7ffff000) kernel console output (not intermixed with test programs): sysadm_r:sysadm_t tclass=bpf permissive=0 [ 216.392740][T13262] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 216.439883][T13267] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=13267 comm=syz.2.3963 [ 217.536377][T13336] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3984'. [ 217.545681][T13334] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3984'. [ 217.683899][ T2969] IPVS: starting estimator thread 0... [ 217.773553][T13345] IPVS: using max 2352 ests per chain, 117600 per kthread [ 220.672216][ T29] kauditd_printk_skb: 627 callbacks suppressed [ 220.672235][ T29] audit: type=1400 audit(1746258785.001:18831): avc: denied { prog_load } for pid=13419 comm="syz.4.4022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 220.716206][ T29] audit: type=1326 audit(1746258785.001:18832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13419 comm="syz.4.4022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f650207e969 code=0x7ffc0000 [ 220.729571][T13432] audit: audit_backlog=65 > audit_backlog_limit=64 [ 220.739843][ T29] audit: type=1326 audit(1746258785.001:18833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13419 comm="syz.4.4022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f650207e969 code=0x7ffc0000 [ 220.746485][T13432] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 220.770087][ T29] audit: type=1326 audit(1746258785.001:18834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13419 comm="syz.4.4022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f650207e969 code=0x7ffc0000 [ 220.777762][T13432] audit: backlog limit exceeded [ 220.801587][ T29] audit: type=1400 audit(1746258785.001:18835): avc: denied { map_create } for pid=13419 comm="syz.4.4022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 220.826271][ T29] audit: type=1326 audit(1746258785.001:18836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13419 comm="syz.4.4022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f650207e969 code=0x7ffc0000 [ 220.827924][T13434] audit: audit_backlog=65 > audit_backlog_limit=64 [ 220.895705][T13436] validate_nla: 21 callbacks suppressed [ 220.895800][T13436] netlink: 'syz.4.4025': attribute type 29 has an invalid length. [ 220.937091][T13436] netlink: 'syz.4.4025': attribute type 29 has an invalid length. [ 220.951201][T13436] netlink: 'syz.4.4025': attribute type 29 has an invalid length. [ 220.953414][T13431] TCP: out of memory -- consider tuning tcp_mem [ 220.959584][T13436] netlink: 'syz.4.4025': attribute type 29 has an invalid length. [ 220.973671][T13436] netlink: 'syz.4.4025': attribute type 29 has an invalid length. [ 220.981886][T13436] netlink: 'syz.4.4025': attribute type 29 has an invalid length. [ 220.990203][T13436] netlink: 'syz.4.4025': attribute type 29 has an invalid length. [ 221.004362][T13436] netlink: 'syz.4.4025': attribute type 29 has an invalid length. [ 221.012804][T13436] netlink: 'syz.4.4025': attribute type 29 has an invalid length. [ 221.055518][T13436] netlink: 'syz.4.4025': attribute type 29 has an invalid length. [ 221.624539][T13478] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.626104][T13479] TCP: out of memory -- consider tuning tcp_mem [ 221.631926][T13478] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.653532][T13478] bridge0: entered allmulticast mode [ 221.678101][T13478] bridge_slave_1: left allmulticast mode [ 221.683887][T13478] bridge_slave_1: left promiscuous mode [ 221.689722][T13478] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.708150][T13478] bridge_slave_0: left allmulticast mode [ 221.713868][T13478] bridge_slave_0: left promiscuous mode [ 221.719678][T13478] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.571542][T13535] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 223.077287][T13564] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 223.083895][T13564] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 223.091377][T13564] vhci_hcd vhci_hcd.0: Device attached [ 223.136093][T13564] vhci_hcd vhci_hcd.0: pdev(0) rhport(1) sockfd(6) [ 223.142656][T13564] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 223.150356][T13564] vhci_hcd vhci_hcd.0: Device attached [ 223.182072][T13563] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 223.202759][T13563] vhci_hcd vhci_hcd.0: pdev(0) rhport(3) sockfd(11) [ 223.209461][T13563] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 223.216999][T13563] vhci_hcd vhci_hcd.0: Device attached [ 223.245100][T13563] vhci_hcd vhci_hcd.0: pdev(0) rhport(4) sockfd(8) [ 223.251664][T13563] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 223.259380][T13563] vhci_hcd vhci_hcd.0: Device attached [ 223.303788][T13564] vhci_hcd vhci_hcd.0: pdev(0) rhport(5) sockfd(15) [ 223.310447][T13564] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 223.318074][T13564] vhci_hcd vhci_hcd.0: Device attached [ 223.344561][T13563] vhci_hcd vhci_hcd.0: pdev(0) rhport(6) sockfd(14) [ 223.351235][T13563] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 223.359008][T13563] vhci_hcd vhci_hcd.0: Device attached [ 223.369829][T13563] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 223.378510][T13563] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 223.388239][T13579] vhci_hcd: connection closed [ 223.388525][T13571] vhci_hcd: connection closed [ 223.393340][ T56] vhci_hcd: stop threads [ 223.393960][T13575] vhci_hcd: connection closed [ 223.398068][ T56] vhci_hcd: release socket [ 223.402728][T13569] vhci_hcd: connection closed [ 223.407022][ T56] vhci_hcd: disconnect device [ 223.411791][T13567] vhci_hcd: connection closed [ 223.416708][T13565] vhci_hcd: connection closed [ 223.426547][ T56] vhci_hcd: stop threads [ 223.435646][ T56] vhci_hcd: release socket [ 223.440151][ T56] vhci_hcd: disconnect device [ 223.445814][ T56] vhci_hcd: stop threads [ 223.450067][ T56] vhci_hcd: release socket [ 223.454575][ T56] vhci_hcd: disconnect device [ 223.459496][ T56] vhci_hcd: stop threads [ 223.463793][ T56] vhci_hcd: release socket [ 223.468234][ T56] vhci_hcd: disconnect device [ 223.473342][ T56] vhci_hcd: stop threads [ 223.477636][ T56] vhci_hcd: release socket [ 223.482078][ T56] vhci_hcd: disconnect device [ 223.489230][ T56] vhci_hcd: stop threads [ 223.493549][ T56] vhci_hcd: release socket [ 223.498056][ T56] vhci_hcd: disconnect device [ 225.690424][ T29] kauditd_printk_skb: 673 callbacks suppressed [ 225.690461][ T29] audit: type=1400 audit(1746258790.021:19508): avc: denied { prog_load } for pid=13661 comm="syz.6.4114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 225.858313][T13665] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 226.045253][ T29] audit: type=1326 audit(1746258790.101:19509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13661 comm="syz.6.4114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 226.069277][ T29] audit: type=1326 audit(1746258790.101:19510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13661 comm="syz.6.4114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 226.092936][ T29] audit: type=1326 audit(1746258790.101:19511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13661 comm="syz.6.4114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 226.116692][ T29] audit: type=1400 audit(1746258790.101:19512): avc: denied { map_create } for pid=13661 comm="syz.6.4114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 226.136113][ T29] audit: type=1326 audit(1746258790.101:19513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13661 comm="syz.6.4114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 226.160162][ T29] audit: type=1326 audit(1746258790.101:19514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13661 comm="syz.6.4114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 226.183901][ T29] audit: type=1400 audit(1746258790.101:19515): avc: denied { prog_load } for pid=13661 comm="syz.6.4114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 226.203229][ T29] audit: type=1326 audit(1746258790.101:19516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13661 comm="syz.6.4114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 226.226921][ T29] audit: type=1326 audit(1746258790.101:19517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13661 comm="syz.6.4114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 226.769885][T13696] bond0: (slave veth0_to_hsr): Error: Device can not be enslaved while up [ 229.365815][ T3381] Process accounting resumed [ 229.544626][T13778] ALSA: seq fatal error: cannot create timer (-19) [ 230.517707][T13824] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 230.837115][ T29] kauditd_printk_skb: 610 callbacks suppressed [ 230.837131][ T29] audit: type=1400 audit(1746258795.171:20128): avc: denied { map_create } for pid=13830 comm="syz.2.4183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 230.879271][ T29] audit: type=1400 audit(1746258795.201:20129): avc: denied { prog_load } for pid=13830 comm="syz.2.4183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 230.898774][ T29] audit: type=1400 audit(1746258795.201:20130): avc: denied { execute } for pid=13830 comm="syz.2.4183" dev="tmpfs" ino=1347 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 230.920196][ T29] audit: type=1400 audit(1746258795.201:20131): avc: denied { prog_load } for pid=13830 comm="syz.2.4183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 230.939608][ T29] audit: type=1400 audit(1746258795.201:20132): avc: denied { create } for pid=13830 comm="syz.2.4183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 230.960334][ T29] audit: type=1400 audit(1746258795.201:20133): avc: denied { create } for pid=13830 comm="syz.2.4183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 230.981164][ T29] audit: type=1400 audit(1746258795.201:20134): avc: denied { create } for pid=13830 comm="syz.2.4183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 231.001806][ T29] audit: type=1400 audit(1746258795.201:20135): avc: denied { map_create } for pid=13830 comm="syz.2.4183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 231.021229][ T29] audit: type=1400 audit(1746258795.201:20136): avc: denied { block_suspend } for pid=13830 comm="syz.2.4183" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 231.042835][ T29] audit: type=1400 audit(1746258795.201:20137): avc: denied { prog_load } for pid=13830 comm="syz.2.4183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 233.697857][T14003] binfmt_misc: register: failed to install interpreter file ./file2 [ 235.845477][ T29] kauditd_printk_skb: 1741 callbacks suppressed [ 235.845496][ T29] audit: type=1400 audit(1746258800.171:21879): avc: denied { map_create } for pid=14112 comm="syz.0.4311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.871315][ T29] audit: type=1400 audit(1746258800.171:21880): avc: denied { prog_load } for pid=14112 comm="syz.0.4311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.901843][ T29] audit: type=1400 audit(1746258800.191:21881): avc: denied { prog_load } for pid=14112 comm="syz.0.4311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.921456][ T29] audit: type=1400 audit(1746258800.191:21882): avc: denied { create } for pid=14112 comm="syz.0.4311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 235.942395][ T29] audit: type=1326 audit(1746258800.201:21883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14108 comm="syz.5.4310" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 235.966292][ T29] audit: type=1326 audit(1746258800.201:21884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14108 comm="syz.5.4310" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 235.990053][ T29] audit: type=1326 audit(1746258800.201:21885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14108 comm="syz.5.4310" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 236.013934][ T29] audit: type=1326 audit(1746258800.201:21886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14108 comm="syz.5.4310" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 236.013978][ T29] audit: type=1326 audit(1746258800.201:21887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14108 comm="syz.5.4310" exe="/root/syz-executor" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 236.014036][ T29] audit: type=1326 audit(1746258800.201:21888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14108 comm="syz.5.4310" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 240.435778][T14233] ªªªªªª: renamed from vlan0 [ 240.889513][ T29] kauditd_printk_skb: 1077 callbacks suppressed [ 240.889530][ T29] audit: type=1400 audit(1746258805.221:22966): avc: denied { create } for pid=14245 comm="syz.2.4362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 240.943098][ T29] audit: type=1400 audit(1746258805.251:22967): avc: denied { create } for pid=14245 comm="syz.2.4362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 240.963640][ T29] audit: type=1400 audit(1746258805.251:22968): avc: denied { prog_load } for pid=14245 comm="syz.2.4362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 240.983072][ T29] audit: type=1400 audit(1746258805.251:22969): avc: denied { create } for pid=14245 comm="syz.2.4362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 241.003623][ T29] audit: type=1400 audit(1746258805.251:22970): avc: denied { read write } for pid=14245 comm="syz.2.4362" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 241.027375][ T29] audit: type=1400 audit(1746258805.251:22971): avc: denied { prog_load } for pid=14245 comm="syz.2.4362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 241.047297][ T29] audit: type=1400 audit(1746258805.251:22972): avc: denied { create } for pid=14245 comm="syz.2.4362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 241.068070][ T29] audit: type=1400 audit(1746258805.251:22973): avc: denied { create } for pid=14245 comm="syz.2.4362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 241.088629][ T29] audit: type=1400 audit(1746258805.251:22974): avc: denied { map_create } for pid=14245 comm="syz.2.4362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 241.108064][ T29] audit: type=1400 audit(1746258805.251:22975): avc: denied { load_policy } for pid=14245 comm="syz.2.4362" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=0 [ 241.695651][T14294] syzkaller0: entered promiscuous mode [ 241.701184][T14294] syzkaller0: entered allmulticast mode [ 241.765220][T14297] SELinux: syz.0.4383 (14297) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 242.820179][T14395] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:0 [ 244.519290][T14473] SELinux: security_context_str_to_sid (Eá…) failed with errno=-22 [ 245.934241][ T29] kauditd_printk_skb: 1915 callbacks suppressed [ 245.934259][ T29] audit: type=1400 audit(1746258810.241:24891): avc: denied { prog_load } for pid=14533 comm="syz.6.4477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 245.959818][ T29] audit: type=1400 audit(1746258810.241:24892): avc: denied { map_create } for pid=14541 comm="syz.5.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 245.979398][ T29] audit: type=1400 audit(1746258810.241:24893): avc: denied { prog_load } for pid=14541 comm="syz.5.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 245.998766][ T29] audit: type=1400 audit(1746258810.241:24894): avc: denied { prog_load } for pid=14541 comm="syz.5.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 246.018147][ T29] audit: type=1400 audit(1746258810.241:24895): avc: denied { create } for pid=14541 comm="syz.5.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 246.037925][ T29] audit: type=1400 audit(1746258810.241:24896): avc: denied { create } for pid=14541 comm="syz.5.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 246.057646][ T29] audit: type=1400 audit(1746258810.241:24897): avc: denied { prog_load } for pid=14541 comm="syz.5.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 246.076905][ T29] audit: type=1400 audit(1746258810.241:24898): avc: denied { prog_load } for pid=14541 comm="syz.5.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 246.096189][ T29] audit: type=1400 audit(1746258810.271:24899): avc: denied { read } for pid=14533 comm="syz.6.4477" dev="nsfs" ino=4026532447 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 246.128087][ T29] audit: type=1400 audit(1746258810.311:24900): avc: denied { allowed } for pid=14537 comm="syz.4.4479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 246.343097][T14563] syzkaller0: entered promiscuous mode [ 246.348766][T14563] syzkaller0: entered allmulticast mode [ 246.356051][T14563] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 247.427622][T14603] syzkaller0: entered promiscuous mode [ 247.427680][T14603] syzkaller0: entered allmulticast mode [ 248.662469][T14640] SET target dimension over the limit! [ 249.017653][T14655] xt_hashlimit: size too large, truncated to 1048576 [ 249.024596][T14655] xt_hashlimit: invalid rate [ 249.382882][T14670] SELinux: syz.2.4529 (14670) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 250.503269][T14716] binfmt_misc: register: failed to install interpreter file ./file2 [ 251.142618][ T29] kauditd_printk_skb: 1455 callbacks suppressed [ 251.142636][ T29] audit: type=1400 audit(1746258815.471:26356): avc: denied { prog_load } for pid=14727 comm="syz.4.4552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 251.182653][ T29] audit: type=1400 audit(1746258815.501:26357): avc: denied { write } for pid=14729 comm="syz.2.4563" name="001" dev="devtmpfs" ino=171 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 251.205761][ T29] audit: type=1400 audit(1746258815.501:26358): avc: denied { prog_load } for pid=14729 comm="syz.2.4563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 251.225037][ T29] audit: type=1400 audit(1746258815.501:26359): avc: denied { map_create } for pid=14729 comm="syz.2.4563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 251.244567][ T29] audit: type=1400 audit(1746258815.501:26360): avc: denied { prog_load } for pid=14729 comm="syz.2.4563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 251.263883][ T29] audit: type=1400 audit(1746258815.521:26361): avc: denied { create } for pid=14731 comm="syz.5.4553" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=0 [ 251.284950][ T29] audit: type=1400 audit(1746258815.561:26362): avc: denied { create } for pid=14729 comm="syz.2.4563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 251.304647][ T29] audit: type=1400 audit(1746258815.561:26363): avc: denied { prog_load } for pid=14729 comm="syz.2.4563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 251.324347][ T29] audit: type=1400 audit(1746258815.561:26364): avc: denied { create } for pid=14729 comm="syz.2.4563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 251.345260][ T29] audit: type=1400 audit(1746258815.571:26365): avc: denied { create } for pid=14731 comm="syz.5.4553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 252.474906][T14791] syzkaller0: entered promiscuous mode [ 252.480640][T14791] syzkaller0: entered allmulticast mode [ 252.586029][T14795] xt_hashlimit: size too large, truncated to 1048576 [ 252.592775][T14795] xt_hashlimit: invalid rate [ 253.291853][T14815] Q±6ã×\b‹¡Y­4: renamed from lo [ 255.423317][T14898] syz.4.4617(14898): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 256.438144][ T29] kauditd_printk_skb: 828 callbacks suppressed [ 256.438162][ T29] audit: type=1400 audit(1746258820.771:27194): avc: denied { create } for pid=14921 comm="syz.0.4626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 256.524423][ T29] audit: type=1400 audit(1746258820.861:27195): avc: denied { read write } for pid=4770 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 256.561723][ T29] audit: type=1400 audit(1746258820.881:27196): avc: denied { read write } for pid=14923 comm="syz.6.4627" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 256.585312][ T29] audit: type=1400 audit(1746258820.881:27197): avc: denied { create } for pid=14921 comm="syz.0.4626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 256.605217][ T29] audit: type=1400 audit(1746258820.881:27198): avc: denied { create } for pid=14921 comm="syz.0.4626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 256.624915][ T29] audit: type=1400 audit(1746258820.881:27199): avc: denied { map_create } for pid=14921 comm="syz.0.4626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 256.644565][ T29] audit: type=1400 audit(1746258820.881:27200): avc: denied { allowed } for pid=14921 comm="syz.0.4626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 256.664379][ T29] audit: type=1400 audit(1746258820.881:27201): avc: denied { prog_load } for pid=14921 comm="syz.0.4626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 256.684189][ T29] audit: type=1400 audit(1746258820.881:27202): avc: denied { prog_load } for pid=14923 comm="syz.6.4627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 256.703744][ T29] audit: type=1400 audit(1746258820.881:27203): avc: denied { create } for pid=14923 comm="syz.6.4627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 256.800787][T14935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=785 sclass=netlink_route_socket pid=14935 comm=syz.6.4632 [ 257.170284][T14969] xt_hashlimit: max too large, truncated to 1048576 [ 258.628988][T15039] binfmt_misc: register: failed to install interpreter file ./file2 [ 259.577237][T15057] syzkaller0: entered promiscuous mode [ 259.582785][T15057] syzkaller0: entered allmulticast mode [ 260.345098][ T3381] Process accounting resumed [ 260.963836][T15105] syzkaller0: entered promiscuous mode [ 260.969354][T15105] syzkaller0: entered allmulticast mode [ 261.263751][T15119] IPVS: set_ctl: invalid protocol: 59 0.0.0.0:20002 [ 261.327871][T15121] SELinux: syz.5.4704 (15121) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 261.443487][ T29] kauditd_printk_skb: 1725 callbacks suppressed [ 261.443505][ T29] audit: type=1326 audit(1746258825.771:28929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15107 comm="syz.2.4699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 261.515465][ T29] audit: type=1326 audit(1746258825.811:28930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15107 comm="syz.2.4699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 261.539353][ T29] audit: type=1326 audit(1746258825.811:28931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15107 comm="syz.2.4699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 261.562995][ T29] audit: type=1326 audit(1746258825.811:28932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15107 comm="syz.2.4699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 261.586879][ T29] audit: type=1326 audit(1746258825.811:28933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15107 comm="syz.2.4699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 261.610393][ T29] audit: type=1326 audit(1746258825.811:28934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15107 comm="syz.2.4699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 261.634183][ T29] audit: type=1326 audit(1746258825.811:28935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15107 comm="syz.2.4699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=299 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 261.657880][ T29] audit: type=1326 audit(1746258825.811:28936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15107 comm="syz.2.4699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 261.771927][ T29] audit: type=1400 audit(1746258825.901:28937): avc: denied { open } for pid=15132 comm="syz.0.4707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 261.791855][ T29] audit: type=1400 audit(1746258825.901:28938): avc: denied { map_create } for pid=15132 comm="syz.0.4707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.045039][T15130] sit0: entered promiscuous mode [ 262.050050][T15130] sit0: entered allmulticast mode [ 263.162165][T15164] xt_TPROXY: Can be used only with -p tcp or -p udp [ 263.177548][T15167] SELinux: syz.2.4718 (15167) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 263.334262][T15174] set match dimension is over the limit! [ 263.338283][T15170] syzkaller0: entered promiscuous mode [ 263.345472][T15170] syzkaller0: entered allmulticast mode [ 263.400866][T15178] SELinux: security_context_str_to_sid (Eá…) failed with errno=-22 [ 264.188506][T15200] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=15200 comm=syz.0.4732 [ 264.914632][T15224] x_tables: duplicate underflow at hook 3 [ 265.804814][T15266] serio: Serial port ptm2 [ 266.510993][ T29] kauditd_printk_skb: 1085 callbacks suppressed [ 266.511012][ T29] audit: type=1400 audit(1746258829.839:30024): avc: denied { map_create } for pid=15290 comm="syz.6.4767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.536781][ T29] audit: type=1400 audit(1746258829.839:30025): avc: denied { prog_load } for pid=15290 comm="syz.6.4767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.556044][ T29] audit: type=1400 audit(1746258829.839:30026): avc: denied { prog_load } for pid=15290 comm="syz.6.4767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.577181][ T29] audit: type=1400 audit(1746258829.839:30027): avc: denied { prog_load } for pid=15290 comm="syz.6.4767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.596747][ T29] audit: type=1400 audit(1746258829.839:30028): avc: denied { create } for pid=15290 comm="syz.6.4767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 266.616581][ T29] audit: type=1400 audit(1746258829.839:30029): avc: denied { create } for pid=15290 comm="syz.6.4767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 266.637000][ T29] audit: type=1400 audit(1746258829.969:30030): avc: denied { prog_load } for pid=15295 comm="syz.0.4768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.656496][ T29] audit: type=1400 audit(1746258829.969:30031): avc: denied { create } for pid=15295 comm="syz.0.4768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 266.676228][ T29] audit: type=1326 audit(1746258829.969:30032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15295 comm="syz.0.4768" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 266.700041][ T29] audit: type=1326 audit(1746258829.969:30033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15295 comm="syz.0.4768" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 266.814399][T15305] xt_bpf: check failed: parse error [ 267.127980][T15322] xt_l2tp: v2 tid > 0xffff: 150994944 [ 267.471076][T15364] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 267.477769][T15364] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 267.485411][T15364] vhci_hcd vhci_hcd.0: Device attached [ 267.533814][T15365] vhci_hcd: cannot find a urb of seqnum 0 max seqnum 0 [ 267.551246][ T37] vhci_hcd: stop threads [ 267.555678][ T37] vhci_hcd: release socket [ 267.560118][ T37] vhci_hcd: disconnect device [ 267.727248][T15376] binfmt_misc: register: failed to install interpreter file ./file2 [ 268.283492][T15393] ipt_rpfilter: unknown options [ 268.381841][T15399] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 268.420505][T15401] futex_wake_op: syz.0.4814 tries to shift op by -1; fix this program [ 268.745000][T15430] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15430 comm=syz.2.4823 [ 269.391598][T15440] binfmt_misc: register: failed to install interpreter file ./file2 [ 269.634289][T15449] ipt_rpfilter: unknown options [ 269.860073][T15453] serio: Serial port ptm2 [ 270.042115][T15464] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=15464 comm=syz.2.4837 [ 270.390090][T15472] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15472 comm=syz.4.4840 [ 271.609666][ T29] kauditd_printk_skb: 1633 callbacks suppressed [ 271.609723][ T29] audit: type=1326 audit(1746258834.939:31469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15505 comm="syz.5.4856" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 271.683450][ T29] audit: type=1326 audit(1746258834.979:31470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15505 comm="syz.5.4856" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 271.785505][ T29] audit: type=1400 audit(1746258835.119:31471): avc: denied { create } for pid=15517 comm="syz.5.4860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 271.843243][ T29] audit: type=1400 audit(1746258835.119:31472): avc: denied { create } for pid=15517 comm="syz.5.4860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 271.863993][ T29] audit: type=1400 audit(1746258835.119:31473): avc: denied { create } for pid=15517 comm="syz.5.4860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 271.884683][ T29] audit: type=1400 audit(1746258835.119:31474): avc: denied { open } for pid=15517 comm="syz.5.4860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 271.904171][ T29] audit: type=1400 audit(1746258835.119:31475): avc: denied { map_create } for pid=15517 comm="syz.5.4860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.923573][ T29] audit: type=1400 audit(1746258835.119:31476): avc: denied { map_create } for pid=15517 comm="syz.5.4860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.943012][ T29] audit: type=1400 audit(1746258835.119:31477): avc: denied { prog_load } for pid=15517 comm="syz.5.4860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.962274][ T29] audit: type=1400 audit(1746258835.119:31478): avc: denied { prog_load } for pid=15517 comm="syz.5.4860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.271026][T15525] serio: Serial port ptm2 [ 272.393932][T15538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=15538 comm=syz.2.4867 [ 272.661560][T15553] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 273.302501][T15580] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15580 comm=syz.0.4882 [ 273.383524][T15585] validate_nla: 17 callbacks suppressed [ 273.383541][T15585] netlink: 'syz.6.4883': attribute type 1 has an invalid length. [ 273.932464][T15618] xt_TPROXY: Can be used only with -p tcp or -p udp [ 273.991521][T15625] xt_connbytes: Forcing CT accounting to be enabled [ 274.003526][T15625] Cannot find add_set index 0 as target [ 274.232859][T15635] netlink: 60 bytes leftover after parsing attributes in process `syz.5.4904'. [ 274.796926][T15654] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4913'. [ 275.057338][T15656] syzkaller0: entered promiscuous mode [ 275.062980][T15656] syzkaller0: entered allmulticast mode [ 275.372196][T15703] sit0: entered allmulticast mode [ 275.381739][T15703] sit0: entered promiscuous mode [ 275.480771][T15710] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(10) [ 275.487464][T15710] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 275.495003][T15710] vhci_hcd vhci_hcd.0: Device attached [ 275.531128][T15710] vhci_hcd vhci_hcd.0: pdev(2) rhport(1) sockfd(12) [ 275.537913][T15710] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 275.545590][T15710] vhci_hcd vhci_hcd.0: Device attached [ 275.558786][T15710] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 275.582826][T15710] vhci_hcd vhci_hcd.0: pdev(2) rhport(3) sockfd(16) [ 275.589561][T15710] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 275.597053][T15710] vhci_hcd vhci_hcd.0: Device attached [ 275.609903][T15710] vhci_hcd vhci_hcd.0: pdev(2) rhport(4) sockfd(18) [ 275.617150][T15710] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 275.624904][T15710] vhci_hcd vhci_hcd.0: Device attached [ 275.671262][T15710] vhci_hcd vhci_hcd.0: pdev(2) rhport(5) sockfd(20) [ 275.677937][T15710] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 275.685630][T15710] vhci_hcd vhci_hcd.0: Device attached [ 275.694504][ T10] vhci_hcd: vhci_device speed not set [ 275.695119][T15730] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 275.713737][T15710] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 275.723131][T15721] vhci_hcd: connection closed [ 275.723274][ T56] vhci_hcd: stop threads [ 275.723386][T15724] vhci_hcd: connection closed [ 275.728006][ T56] vhci_hcd: release socket [ 275.728019][ T56] vhci_hcd: disconnect device [ 275.728397][T15716] vhci_hcd: connection closed [ 275.732551][T15718] vhci_hcd: connection closed [ 275.738564][T15711] vhci_hcd: connection closed [ 275.756502][ T56] vhci_hcd: stop threads [ 275.764885][ T10] usb 5-1: new low-speed USB device number 2 using vhci_hcd [ 275.765517][ T56] vhci_hcd: release socket [ 275.772831][T15712] vhci_hcd: sendmsg failed!, ret=-32 for 48 [ 275.777220][ T56] vhci_hcd: disconnect device [ 275.777685][ T56] vhci_hcd: stop threads [ 275.792310][ T56] vhci_hcd: release socket [ 275.796993][ T56] vhci_hcd: disconnect device [ 275.802417][ T56] vhci_hcd: stop threads [ 275.806753][ T56] vhci_hcd: release socket [ 275.811277][ T56] vhci_hcd: disconnect device [ 275.816192][ T56] vhci_hcd: stop threads [ 275.820458][ T56] vhci_hcd: release socket [ 275.824952][ T56] vhci_hcd: disconnect device [ 275.957511][T15732] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4941'. [ 276.412491][T15752] pim6reg: entered allmulticast mode [ 276.423072][T15752] pim6reg: left allmulticast mode [ 276.773293][ T29] kauditd_printk_skb: 1406 callbacks suppressed [ 276.773308][ T29] audit: type=1400 audit(1746258840.099:32885): avc: denied { create } for pid=15757 comm="syz.4.4951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 276.819188][T15758] netlink: 60 bytes leftover after parsing attributes in process `syz.4.4951'. [ 276.831355][ T29] audit: type=1400 audit(1746258840.109:32886): avc: denied { write } for pid=15757 comm="syz.4.4951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 276.838692][T15758] netlink: 60 bytes leftover after parsing attributes in process `syz.4.4951'. [ 276.851823][ T29] audit: type=1400 audit(1746258840.109:32887): avc: denied { nlmsg_write } for pid=15757 comm="syz.4.4951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 276.881958][ T29] audit: type=1400 audit(1746258840.109:32888): avc: denied { ioctl } for pid=15757 comm="syz.4.4951" path="socket:[49946]" dev="sockfs" ino=49946 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 276.907680][ T29] audit: type=1400 audit(1746258840.109:32889): avc: denied { module_request } for pid=15757 comm="syz.4.4951" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 276.929719][ T29] audit: type=1400 audit(1746258840.139:32890): avc: denied { sys_module } for pid=15757 comm="syz.4.4951" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 276.951090][ T29] audit: type=1400 audit(1746258840.149:32891): avc: denied { create } for pid=15757 comm="syz.4.4951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 276.972067][ T29] audit: type=1400 audit(1746258840.149:32892): avc: denied { write } for pid=15757 comm="syz.4.4951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 277.007657][T15758] netlink: 60 bytes leftover after parsing attributes in process `syz.4.4951'. [ 277.023719][T15758] netlink: 60 bytes leftover after parsing attributes in process `syz.4.4951'. [ 277.081004][T15758] netlink: 60 bytes leftover after parsing attributes in process `syz.4.4951'. [ 277.091336][T15758] netlink: 60 bytes leftover after parsing attributes in process `syz.4.4951'. [ 277.187564][ T29] audit: type=1400 audit(1746258840.519:32893): avc: denied { create } for pid=15766 comm="syz.4.4952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 277.227958][ T29] audit: type=1400 audit(1746258840.519:32894): avc: denied { setopt } for pid=15766 comm="syz.4.4952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 277.306370][T15771] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4954'. [ 277.454031][T15774] SELinux: Context system_u:object_r:iptables_initrc_exec_t:s0 is not valid (left unmapped). [ 277.540635][T15777] block device autoloading is deprecated and will be removed. [ 277.569992][T15777] syz.4.4956: attempt to access beyond end of device [ 277.569992][T15777] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 277.668227][T15780] netlink: 'syz.4.4957': attribute type 1 has an invalid length. [ 277.676456][T15780] vhci_hcd: invalid port number 11 [ 277.681581][T15780] vhci_hcd: default hub control req: 040d v0009 i000b l0 [ 278.770652][T15800] syz.2.4966: attempt to access beyond end of device [ 278.770652][T15800] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 278.825339][T15802] loop0: detected capacity change from 0 to 512 [ 278.888982][T15802] EXT4-fs (loop0): 1 orphan inode deleted [ 278.895626][T15802] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 278.908547][ T781] EXT4-fs error (device loop0): ext4_release_dquot:6971: comm kworker/u8:5: Failed to release dquot type 1 [ 278.920482][T15802] ext4 filesystem being mounted at /1004/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 279.126288][ T56] EXT4-fs error (device loop0): ext4_release_dquot:6971: comm kworker/u8:4: Failed to release dquot type 1 [ 279.166308][ T3306] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 279.367403][T15815] __nla_validate_parse: 3 callbacks suppressed [ 279.367418][T15815] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4970'. [ 279.616597][T15823] netlink: 68 bytes leftover after parsing attributes in process `syz.2.4972'. [ 279.632745][T15819] xt_hashlimit: max too large, truncated to 1048576 [ 279.656532][T15823] netlink: 80 bytes leftover after parsing attributes in process `syz.2.4972'. [ 279.856675][T15839] tipc: Enabled bearer , priority 1 [ 279.865674][T15836] loop6: detected capacity change from 0 to 8192 [ 279.974215][T15849] netlink: 60 bytes leftover after parsing attributes in process `syz.6.4979'. [ 279.983331][T15849] netlink: 60 bytes leftover after parsing attributes in process `syz.6.4979'. [ 280.066915][T15849] netlink: 60 bytes leftover after parsing attributes in process `syz.6.4979'. [ 280.093722][T15849] netlink: 60 bytes leftover after parsing attributes in process `syz.6.4979'. [ 280.192009][T15849] netlink: 60 bytes leftover after parsing attributes in process `syz.6.4979'. [ 280.212660][T15849] netlink: 60 bytes leftover after parsing attributes in process `syz.6.4979'. [ 280.222112][T15826] xt_CT: You must specify a L4 protocol and not use inversions on it [ 280.652784][T15867] loop0: detected capacity change from 0 to 128 [ 281.372280][ T10] usb 5-1: enqueue for inactive port 0 [ 281.387753][ T10] usb 5-1: enqueue for inactive port 0 [ 281.445574][T15864] xt_CT: You must specify a L4 protocol and not use inversions on it [ 281.475025][T15864] x_tables: duplicate underflow at hook 1 [ 281.475122][ T10] vhci_hcd: vhci_device speed not set [ 281.543598][T15886] IPVS: sync thread started: state = BACKUP, mcast_ifn = ip6_vti0, syncid = 1, id = 0 [ 281.559478][T15867] syz.0.4986: attempt to access beyond end of device [ 281.559478][T15867] loop0: rw=2049, sector=153, nr_sectors = 8 limit=128 [ 281.577291][T15867] syz.0.4986: attempt to access beyond end of device [ 281.577291][T15867] loop0: rw=2049, sector=169, nr_sectors = 8 limit=128 [ 281.591014][T15867] syz.0.4986: attempt to access beyond end of device [ 281.591014][T15867] loop0: rw=2049, sector=185, nr_sectors = 8 limit=128 [ 281.604861][T15867] syz.0.4986: attempt to access beyond end of device [ 281.604861][T15867] loop0: rw=2049, sector=201, nr_sectors = 8 limit=128 [ 281.618627][T15867] syz.0.4986: attempt to access beyond end of device [ 281.618627][T15867] loop0: rw=2049, sector=217, nr_sectors = 8 limit=128 [ 281.652515][T15867] syz.0.4986: attempt to access beyond end of device [ 281.652515][T15867] loop0: rw=2049, sector=233, nr_sectors = 8 limit=128 [ 281.712377][T15867] syz.0.4986: attempt to access beyond end of device [ 281.712377][T15867] loop0: rw=2049, sector=249, nr_sectors = 8 limit=128 [ 281.742927][T15867] syz.0.4986: attempt to access beyond end of device [ 281.742927][T15867] loop0: rw=2049, sector=265, nr_sectors = 8 limit=128 [ 281.778470][T15884] block device autoloading is deprecated and will be removed. [ 281.793471][ T29] kauditd_printk_skb: 296 callbacks suppressed [ 281.793487][ T29] audit: type=1400 audit(1746258845.119:33189): avc: denied { create } for pid=15890 comm="syz.4.4993" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 281.821382][ T29] audit: type=1400 audit(1746258845.119:33190): avc: denied { write } for pid=15890 comm="syz.4.4993" name="file0" dev="tmpfs" ino=5127 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 281.844104][ T29] audit: type=1400 audit(1746258845.119:33191): avc: denied { open } for pid=15890 comm="syz.4.4993" path="/965/file0" dev="tmpfs" ino=5127 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 282.089781][T15904] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 282.093467][ T29] audit: type=1326 audit(1746258845.219:33192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15866 comm="syz.0.4986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 282.116863][T15904] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 282.122335][ T29] audit: type=1326 audit(1746258845.219:33193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15866 comm="syz.0.4986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 282.154126][ T29] audit: type=1326 audit(1746258845.279:33194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15902 comm="syz.5.4996" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 282.177995][ T29] audit: type=1326 audit(1746258845.279:33195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15902 comm="syz.5.4996" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 282.201829][ T29] audit: type=1326 audit(1746258845.289:33196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15902 comm="syz.5.4996" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 282.225500][ T29] audit: type=1326 audit(1746258845.289:33197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15902 comm="syz.5.4996" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 282.249643][ T29] audit: type=1326 audit(1746258845.289:33198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15902 comm="syz.5.4996" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 282.551399][T15903] netlink: 8 bytes leftover after parsing attributes in process `+à{}[!'. [ 282.885047][T15904] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 282.912233][T15904] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 283.002812][T15920] xt_hashlimit: max too large, truncated to 1048576 [ 283.054597][T15929] xt_CT: You must specify a L4 protocol and not use inversions on it [ 283.062332][T15931] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=none:owns=io+mem [ 283.212001][T15940] loop6: detected capacity change from 0 to 512 [ 283.216300][T15942] xt_hashlimit: max too large, truncated to 1048576 [ 283.248329][T15940] EXT4-fs error (device loop6): ext4_acquire_dquot:6935: comm syz.6.5005: Failed to acquire dquot type 1 [ 283.270619][T15940] EXT4-fs (loop6): 1 truncate cleaned up [ 283.282401][T15940] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 283.326374][T15940] ext4 filesystem being mounted at /849/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 283.403060][T15952] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 283.503735][T15945] EXT4-fs error (device loop6): ext4_validate_block_bitmap:441: comm ext4lazyinit: bg 0: block 248: padding at end of block bitmap is not set [ 283.604472][ T4770] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 283.668403][T15963] loop6: detected capacity change from 0 to 2048 [ 283.743877][T15963] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 283.836772][T15974] loop0: detected capacity change from 0 to 128 [ 283.855775][T15974] FAT-fs (loop0): Invalid FSINFO signature: 0x00615252, 0x61417272 (sector = 1) [ 284.066405][ T31] FAT-fs (loop0): Invalid FSINFO signature: 0x00615252, 0x61417272 (sector = 1) [ 284.128951][ T31] bio_check_eod: 45 callbacks suppressed [ 284.128965][ T31] kworker/u8:1: attempt to access beyond end of device [ 284.128965][ T31] loop0: rw=1, sector=145, nr_sectors = 8 limit=128 [ 284.148233][ T31] kworker/u8:1: attempt to access beyond end of device [ 284.148233][ T31] loop0: rw=1, sector=161, nr_sectors = 8 limit=128 [ 284.161872][ T31] kworker/u8:1: attempt to access beyond end of device [ 284.161872][ T31] loop0: rw=1, sector=177, nr_sectors = 16 limit=128 [ 284.176175][ T31] kworker/u8:1: attempt to access beyond end of device [ 284.176175][ T31] loop0: rw=1, sector=201, nr_sectors = 8 limit=128 [ 284.189786][ T31] kworker/u8:1: attempt to access beyond end of device [ 284.189786][ T31] loop0: rw=1, sector=217, nr_sectors = 8 limit=128 [ 284.220431][ T31] kworker/u8:1: attempt to access beyond end of device [ 284.220431][ T31] loop0: rw=1, sector=233, nr_sectors = 8 limit=128 [ 284.234099][ T31] kworker/u8:1: attempt to access beyond end of device [ 284.234099][ T31] loop0: rw=1, sector=249, nr_sectors = 8 limit=128 [ 284.247913][ T31] kworker/u8:1: attempt to access beyond end of device [ 284.247913][ T31] loop0: rw=1, sector=265, nr_sectors = 8 limit=128 [ 284.261678][ T31] kworker/u8:1: attempt to access beyond end of device [ 284.261678][ T31] loop0: rw=1, sector=281, nr_sectors = 8 limit=128 [ 284.275344][ T31] kworker/u8:1: attempt to access beyond end of device [ 284.275344][ T31] loop0: rw=1, sector=297, nr_sectors = 8 limit=128 [ 284.290296][ T56] FAT-fs (loop0): Invalid FSINFO signature: 0x00615252, 0x61417272 (sector = 1) [ 284.329062][T15995] SELinux: Context system_u:object_r:bsdpty_d is not valid (left unmapped). [ 284.521772][T16000] __nla_validate_parse: 5 callbacks suppressed [ 284.521787][T16000] netlink: 14601 bytes leftover after parsing attributes in process `syz.5.5022'. [ 284.693664][T16007] netlink: 7 bytes leftover after parsing attributes in process `syz.5.5025'. [ 284.704062][T16008] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5024'. [ 284.716462][T16007] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 284.734365][ T4770] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 284.750419][ T56] FAT-fs (loop0): Invalid FSINFO signature: 0x00615252, 0x61417272 (sector = 1) [ 284.978314][T16020] tipc: Enabled bearer , priority 0 [ 285.301791][T16019] tipc: Resetting bearer [ 285.372930][T16019] tipc: Disabling bearer [ 285.512743][T16030] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 285.521084][T16030] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 285.541613][T16030] netlink: 20 bytes leftover after parsing attributes in process `syz.5.5033'. [ 285.612848][T16036] loop0: detected capacity change from 0 to 512 [ 285.629301][T16036] EXT4-fs (loop0): feature flags set on rev 0 fs, running e2fsck is recommended [ 285.638556][T16036] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 285.703895][T16036] EXT4-fs (loop0): warning: checktime reached, running e2fsck is recommended [ 285.735366][T16036] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a042c01c, mo2=0002] [ 285.754413][T16043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16043 comm=syz.2.5037 [ 285.767283][T16043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16043 comm=syz.2.5037 [ 285.804833][T16036] System zones: 0-2, 18-18, 34-34 [ 285.871167][T16043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16043 comm=syz.2.5037 [ 285.893652][T16036] EXT4-fs warning (device loop0): ext4_update_dynamic_rev:1132: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 285.893846][T16043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16043 comm=syz.2.5037 [ 285.923015][T16048] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5036'. [ 285.932988][T16036] EXT4-fs (loop0): 1 truncate cleaned up [ 285.939652][T16048] netlink: 36 bytes leftover after parsing attributes in process `syz.4.5036'. [ 285.960644][T16036] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 285.983860][T16043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16043 comm=syz.2.5037 [ 286.025391][T16043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16043 comm=syz.2.5037 [ 286.048796][T16043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16043 comm=syz.2.5037 [ 286.062402][T16043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16043 comm=syz.2.5037 [ 286.082560][T16043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16043 comm=syz.2.5037 [ 286.096366][T16043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16043 comm=syz.2.5037 [ 286.157969][T16057] loop6: detected capacity change from 0 to 512 [ 286.188751][T16060] EXT4-fs error (device loop0): ext4_find_dest_de:2054: inode #2: block 3: comm syz.0.5035: bad entry in directory: inode out of bounds - offset=0, inode=63, rec_len=12, size=4096 fake=1 [ 286.217047][T16057] EXT4-fs (loop6): feature flags set on rev 0 fs, running e2fsck is recommended [ 286.240421][T16057] EXT4-fs error (device loop6): ext4_acquire_dquot:6935: comm syz.6.5041: Failed to acquire dquot type 0 [ 286.268932][T16057] EXT4-fs warning (device loop6): ext4_update_dynamic_rev:1132: updating to rev 1 because of new feature flag, running e2fsck is recommended [ 286.284679][T16057] EXT4-fs (loop6): 1 truncate cleaned up [ 286.290851][T16057] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 286.361195][ T4770] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 286.396655][T16063] xt_CT: You must specify a L4 protocol and not use inversions on it [ 286.406062][T16063] x_tables: duplicate underflow at hook 1 [ 286.482737][ T3306] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 286.524308][T16074] xt_CT: You must specify a L4 protocol and not use inversions on it [ 286.589340][T16073] SELinux: security_context_str_to_sid () failed with errno=-22 [ 286.850841][ T29] kauditd_printk_skb: 830 callbacks suppressed [ 286.850857][ T29] audit: type=1400 audit(1746258850.179:34025): avc: denied { write } for pid=16075 comm="syz.0.5045" laddr=172.20.20.36 lport=43698 faddr=172.20.20.0 fport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 286.851282][T16084] x_tables: duplicate underflow at hook 1 [ 287.766739][T16086] xt_CT: You must specify a L4 protocol and not use inversions on it [ 287.857468][ T29] audit: type=1326 audit(1746258851.189:34026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16094 comm="syz.6.5048" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 287.962576][ T29] audit: type=1326 audit(1746258851.249:34027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16094 comm="syz.6.5048" exe="/root/syz-executor" sig=0 arch=c000003e syscall=151 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 287.986383][ T29] audit: type=1326 audit(1746258851.249:34028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16094 comm="syz.6.5048" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 287.993713][T16109] random: crng reseeded on system resumption [ 288.010207][ T29] audit: type=1326 audit(1746258851.249:34029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16094 comm="syz.6.5048" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 288.041862][ T29] audit: type=1326 audit(1746258851.319:34030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16102 comm="syz.2.5051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 288.065558][ T29] audit: type=1326 audit(1746258851.319:34031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16102 comm="syz.2.5051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 288.089415][ T29] audit: type=1326 audit(1746258851.319:34032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16102 comm="syz.2.5051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 288.113059][ T29] audit: type=1326 audit(1746258851.319:34033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16102 comm="syz.2.5051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 288.137113][ T29] audit: type=1326 audit(1746258851.319:34034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16102 comm="syz.2.5051" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 288.389031][T16112] loop6: detected capacity change from 0 to 1024 [ 288.484338][T16112] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 288.774964][T16112] EXT4-fs error (device loop6): ext4_validate_block_bitmap:441: comm syz.6.5053: bg 0: block 88: padding at end of block bitmap is not set [ 288.971195][T16123] loop0: detected capacity change from 0 to 1024 [ 288.995233][T16123] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 289.006297][T16123] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 289.016615][ T4770] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 289.032267][T16123] JBD2: no valid journal superblock found [ 289.038115][T16123] EXT4-fs (loop0): Could not load journal inode [ 289.116422][T16130] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5070'. [ 289.138689][T16136] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5060'. [ 289.239242][T16141] siw: device registration error -23 [ 289.245933][T16141] netlink: 20 bytes leftover after parsing attributes in process `syz.2.5062'. [ 289.273793][T16135] xt_CT: You must specify a L4 protocol and not use inversions on it [ 289.283205][T16135] x_tables: duplicate underflow at hook 1 [ 289.312782][T16146] xt_CT: You must specify a L4 protocol and not use inversions on it [ 289.433473][T16153] xt_hashlimit: max too large, truncated to 1048576 [ 289.762174][T16160] netlink: 8 bytes leftover after parsing attributes in process `+à{}[!'. [ 289.772743][T16160] netlink: 8 bytes leftover after parsing attributes in process `+à{}[!'. [ 289.782323][T16160] netlink: 8 bytes leftover after parsing attributes in process `+à{}[!'. [ 289.791654][T16160] netlink: 8 bytes leftover after parsing attributes in process `+à{}[!'. [ 290.222211][T16168] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5072'. [ 290.265531][T16168] netlink: 36 bytes leftover after parsing attributes in process `syz.0.5072'. [ 290.277086][T16167] xt_CT: You must specify a L4 protocol and not use inversions on it [ 290.286868][T16167] x_tables: duplicate underflow at hook 1 [ 290.488745][T16178] loop0: detected capacity change from 0 to 512 [ 290.520398][T16183] loop6: detected capacity change from 0 to 128 [ 290.717495][T16178] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 290.732216][T16178] ext4 filesystem being mounted at /1021/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 290.750334][T16192] xt_CT: You must specify a L4 protocol and not use inversions on it [ 290.766628][T16183] bio_check_eod: 102 callbacks suppressed [ 290.766645][T16183] syz.6.5076: attempt to access beyond end of device [ 290.766645][T16183] loop6: rw=2049, sector=153, nr_sectors = 8 limit=128 [ 290.787566][T16191] IPVS: sync thread started: state = BACKUP, mcast_ifn = ip6_vti0, syncid = 1, id = 0 [ 290.797421][T16183] syz.6.5076: attempt to access beyond end of device [ 290.797421][T16183] loop6: rw=2049, sector=169, nr_sectors = 8 limit=128 [ 290.813521][T16183] syz.6.5076: attempt to access beyond end of device [ 290.813521][T16183] loop6: rw=2049, sector=185, nr_sectors = 8 limit=128 [ 290.839559][T16183] syz.6.5076: attempt to access beyond end of device [ 290.839559][T16183] loop6: rw=2049, sector=201, nr_sectors = 8 limit=128 [ 290.900033][T16183] syz.6.5076: attempt to access beyond end of device [ 290.900033][T16183] loop6: rw=2049, sector=217, nr_sectors = 8 limit=128 [ 290.927889][T16183] syz.6.5076: attempt to access beyond end of device [ 290.927889][T16183] loop6: rw=2049, sector=233, nr_sectors = 8 limit=128 [ 290.941635][T16183] syz.6.5076: attempt to access beyond end of device [ 290.941635][T16183] loop6: rw=2049, sector=249, nr_sectors = 8 limit=128 [ 290.962934][T16183] syz.6.5076: attempt to access beyond end of device [ 290.962934][T16183] loop6: rw=2049, sector=265, nr_sectors = 8 limit=128 [ 290.977215][T16183] syz.6.5076: attempt to access beyond end of device [ 290.977215][T16183] loop6: rw=2049, sector=281, nr_sectors = 8 limit=128 [ 290.997536][T16200] netlink: 'syz.2.5080': attribute type 10 has an invalid length. [ 291.003673][T16183] syz.6.5076: attempt to access beyond end of device [ 291.003673][T16183] loop6: rw=2049, sector=297, nr_sectors = 8 limit=128 [ 291.005498][T16200] netlink: 40 bytes leftover after parsing attributes in process `syz.2.5080'. [ 291.041224][T16200] A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check. [ 291.089828][T16199] tipc: Started in network mode [ 291.095006][T16199] tipc: Node identity fe80000000000000000000000000001, cluster identity 4711 [ 291.104003][T16199] tipc: Enabling of bearer rejected, failed to enable media [ 291.198494][T16208] netlink: 8 bytes leftover after parsing attributes in process `+à{}[!'. [ 291.209423][T16208] netlink: 8 bytes leftover after parsing attributes in process `+à{}[!'. [ 291.236530][T16208] netlink: 8 bytes leftover after parsing attributes in process `+à{}[!'. [ 291.569035][T16170] syz.5.5073 (16170) used greatest stack depth: 5952 bytes left [ 292.030676][ T29] kauditd_printk_skb: 274 callbacks suppressed [ 292.030694][ T29] audit: type=1326 audit(1746258855.359:34309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16222 comm="syz.5.5087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 292.124181][ T29] audit: type=1326 audit(1746258855.399:34310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16222 comm="syz.5.5087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 292.148026][ T29] audit: type=1326 audit(1746258855.409:34311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16222 comm="syz.5.5087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 292.168127][ T3306] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 292.171780][ T29] audit: type=1326 audit(1746258855.409:34312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16222 comm="syz.5.5087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 292.204640][ T29] audit: type=1326 audit(1746258855.409:34313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16222 comm="syz.5.5087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 292.228290][ T29] audit: type=1326 audit(1746258855.419:34314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16222 comm="syz.5.5087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 292.252049][ T29] audit: type=1326 audit(1746258855.419:34315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16222 comm="syz.5.5087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 292.275750][ T29] audit: type=1326 audit(1746258855.419:34316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16222 comm="syz.5.5087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 292.299810][ T29] audit: type=1326 audit(1746258855.419:34317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16222 comm="syz.5.5087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=428 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 292.323581][ T29] audit: type=1326 audit(1746258855.429:34318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16222 comm="syz.5.5087" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 292.423233][T16232] SELinux: security_context_str_to_sid () failed with errno=-22 [ 292.664324][T16241] xt_CT: You must specify a L4 protocol and not use inversions on it [ 292.934990][T16249] xt_CT: You must specify a L4 protocol and not use inversions on it [ 292.945048][T16249] x_tables: duplicate underflow at hook 1 [ 292.952305][T16264] hsr_slave_0: left promiscuous mode [ 292.960032][T16264] hsr_slave_1: left promiscuous mode [ 293.019426][T16263] loop0: detected capacity change from 0 to 512 [ 293.026889][T16263] ext4: Unknown parameter 'fsuuid' [ 293.323041][T16275] loop0: detected capacity change from 0 to 512 [ 293.330023][T16275] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 293.699240][T16284] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 294.311554][T16289] SELinux: security_context_str_to_sid () failed with errno=-22 [ 294.340743][T16289] loop6: detected capacity change from 0 to 256 [ 294.706379][T16307] xt_addrtype: ipv6 does not support BROADCAST matching [ 295.134310][T16314] SELinux: Context #! ./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 296.220097][T16323] __nla_validate_parse: 8 callbacks suppressed [ 296.220117][T16323] netlink: 16 bytes leftover after parsing attributes in process `syz.2.5126'. [ 296.345820][T16319] xt_CT: You must specify a L4 protocol and not use inversions on it [ 296.466689][T16338] xt_CT: You must specify a L4 protocol and not use inversions on it [ 296.659406][T16342] tipc: Enabled bearer , priority 0 [ 296.685212][T16353] loop6: detected capacity change from 0 to 4096 [ 296.691884][T16353] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 296.711167][T16353] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5128'. [ 296.722697][T16353] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5128'. [ 296.801134][T16341] tipc: Resetting bearer [ 296.822001][T16341] tipc: Disabling bearer [ 297.097110][T16361] loop0: detected capacity change from 0 to 128 [ 297.153007][ T29] kauditd_printk_skb: 449 callbacks suppressed [ 297.153024][ T29] audit: type=1326 audit(1746258860.479:34768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.0.5125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 297.185586][ T29] audit: type=1326 audit(1746258860.519:34769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.0.5125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 297.209586][ T29] audit: type=1326 audit(1746258860.519:34770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.0.5125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 297.233350][ T29] audit: type=1326 audit(1746258860.519:34771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.0.5125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 297.257186][ T29] audit: type=1326 audit(1746258860.519:34772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.0.5125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 297.281146][ T29] audit: type=1326 audit(1746258860.519:34773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.0.5125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 297.304762][ T29] audit: type=1326 audit(1746258860.519:34774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.0.5125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=82 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 297.328644][ T29] audit: type=1326 audit(1746258860.519:34775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.0.5125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 297.352349][ T29] audit: type=1326 audit(1746258860.519:34776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.0.5125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 297.376163][ T29] audit: type=1326 audit(1746258860.519:34777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16360 comm="syz.0.5125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 297.638960][ T51] bio_check_eod: 65 callbacks suppressed [ 297.638978][ T51] kworker/u8:3: attempt to access beyond end of device [ 297.638978][ T51] loop0: rw=1, sector=129, nr_sectors = 8 limit=128 [ 297.668888][ T51] kworker/u8:3: attempt to access beyond end of device [ 297.668888][ T51] loop0: rw=1, sector=145, nr_sectors = 8 limit=128 [ 297.752295][ T51] kworker/u8:3: attempt to access beyond end of device [ 297.752295][ T51] loop0: rw=1, sector=161, nr_sectors = 8 limit=128 [ 297.774559][ T51] kworker/u8:3: attempt to access beyond end of device [ 297.774559][ T51] loop0: rw=1, sector=177, nr_sectors = 8 limit=128 [ 297.798147][ T51] kworker/u8:3: attempt to access beyond end of device [ 297.798147][ T51] loop0: rw=1, sector=193, nr_sectors = 8 limit=128 [ 297.833516][ T51] kworker/u8:3: attempt to access beyond end of device [ 297.833516][ T51] loop0: rw=1, sector=209, nr_sectors = 8 limit=128 [ 297.873468][ T51] kworker/u8:3: attempt to access beyond end of device [ 297.873468][ T51] loop0: rw=1, sector=225, nr_sectors = 8 limit=128 [ 297.913483][ T51] kworker/u8:3: attempt to access beyond end of device [ 297.913483][ T51] loop0: rw=1, sector=241, nr_sectors = 8 limit=128 [ 297.937044][ T51] kworker/u8:3: attempt to access beyond end of device [ 297.937044][ T51] loop0: rw=1, sector=257, nr_sectors = 8 limit=128 [ 297.963552][ T51] kworker/u8:3: attempt to access beyond end of device [ 297.963552][ T51] loop0: rw=1, sector=273, nr_sectors = 8 limit=128 [ 298.161639][T16383] netlink: 'syz.0.5141': attribute type 13 has an invalid length. [ 298.255810][T16387] loop0: detected capacity change from 0 to 2048 [ 298.305154][T16387] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 298.342610][T16387] ext4 filesystem being mounted at /1033/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 298.575210][T16392] xt_CT: You must specify a L4 protocol and not use inversions on it [ 298.996713][ T3306] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 299.170430][T16405] tipc: Enabled bearer , priority 0 [ 299.180521][ T56] tipc: Resetting bearer [ 299.688844][T16413] xt_hashlimit: max too large, truncated to 1048576 [ 299.801277][T16395] tipc: Resetting bearer [ 299.814703][T16395] tipc: Disabling bearer [ 300.059308][T16428] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5145'. [ 300.070142][T16427] loop6: detected capacity change from 0 to 512 [ 300.113741][T16430] loop0: detected capacity change from 0 to 2048 [ 300.171934][T16427] EXT4-fs error (device loop6): ext4_acquire_dquot:6935: comm syz.6.5142: Failed to acquire dquot type 1 [ 300.209727][T16427] EXT4-fs (loop6): 1 truncate cleaned up [ 300.224414][T16436] siw: device registration error -23 [ 300.231023][T16436] netlink: 20 bytes leftover after parsing attributes in process `syz.4.5146'. [ 300.239330][T16427] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 300.252736][T16427] ext4 filesystem being mounted at /873/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 300.348078][ T4770] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 300.409217][T16440] gtp0: entered promiscuous mode [ 300.421422][T16445] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 300.444833][T16445] infiniband srz1: RDMA CMA: cma_listen_on_dev, error -98 [ 300.474427][T16448] netlink: 'syz.6.5158': attribute type 1 has an invalid length. [ 300.820588][T16450] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5148'. [ 300.830336][T16450] netlink: 12 bytes leftover after parsing attributes in process `syz.5.5148'. [ 301.354574][T16458] loop6: detected capacity change from 0 to 128 [ 301.504362][T16461] IPVS: sync thread started: state = BACKUP, mcast_ifn = ip6_vti0, syncid = 1, id = 0 [ 301.700814][T16457] netlink: 'syz.4.5162': attribute type 10 has an invalid length. [ 302.028630][T16457] netlink: 'syz.4.5162': attribute type 10 has an invalid length. [ 302.036583][T16457] netlink: 2 bytes leftover after parsing attributes in process `syz.4.5162'. [ 302.795208][T16479] netlink: 'syz.5.5159': attribute type 6 has an invalid length. [ 302.894133][T16491] netlink: 40 bytes leftover after parsing attributes in process `syz.6.5160'. [ 302.926519][ T29] kauditd_printk_skb: 329 callbacks suppressed [ 302.926533][ T29] audit: type=1400 audit(1746258866.259:35105): avc: denied { read } for pid=16493 comm="syz.0.5163" path="socket:[52856]" dev="sockfs" ino=52856 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 302.934424][T16491] x_tables: unsorted entry at hook 3 [ 302.974517][T16497] netlink: 100 bytes leftover after parsing attributes in process `syz.5.5164'. [ 303.087188][T16508] netlink: 24 bytes leftover after parsing attributes in process `syz.0.5163'. [ 303.140184][T16507] netlink: 'syz.6.5165': attribute type 10 has an invalid length. [ 303.148974][T16507] netlink: 40 bytes leftover after parsing attributes in process `syz.6.5165'. [ 303.162711][T16501] netlink: 'syz.0.5163': attribute type 10 has an invalid length. [ 303.201540][T16501] loop0: detected capacity change from 0 to 2048 [ 303.203627][T16507] dummy0: entered promiscuous mode [ 303.223190][T16507] A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check. [ 303.257355][T16501] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 303.323043][ T29] audit: type=1400 audit(1746258866.649:35106): avc: denied { append } for pid=16493 comm="syz.0.5163" path="/1039/file0/cpu.stat" dev="loop0" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 303.474893][ T29] audit: type=1400 audit(1746258866.809:35107): avc: denied { map } for pid=16493 comm="syz.0.5163" path="/1039/file0/cpu.stat" dev="loop0" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 303.745434][T16501] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz.0.5163: bg 0: block 234: padding at end of block bitmap is not set [ 303.887823][T16501] EXT4-fs (loop0): Remounting filesystem read-only [ 304.194751][T16525] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5170'. [ 304.226442][ T3306] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 304.280660][T16529] tipc: Enabled bearer , priority 0 [ 304.300923][ T29] audit: type=1326 audit(1746258867.629:35108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16526 comm="syz.2.5182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 304.307564][T16532] netlink: 'syz.2.5182': attribute type 1 has an invalid length. [ 304.390083][ T29] audit: type=1326 audit(1746258867.629:35109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16526 comm="syz.2.5182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 304.413880][ T29] audit: type=1326 audit(1746258867.629:35110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16526 comm="syz.2.5182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 304.437904][ T29] audit: type=1326 audit(1746258867.629:35111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16526 comm="syz.2.5182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 304.461771][ T29] audit: type=1326 audit(1746258867.629:35112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16526 comm="syz.2.5182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=173 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 304.485577][ T29] audit: type=1326 audit(1746258867.629:35113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16526 comm="syz.2.5182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 304.509445][ T29] audit: type=1326 audit(1746258867.629:35114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16526 comm="syz.2.5182" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 304.558617][T16540] loop0: detected capacity change from 0 to 512 [ 304.565597][T16528] tipc: Resetting bearer [ 304.591172][T16528] tipc: Disabling bearer [ 304.639172][T16540] EXT4-fs error (device loop0): ext4_acquire_dquot:6935: comm syz.0.5171: Failed to acquire dquot type 1 [ 304.678323][T16540] EXT4-fs (loop0): 1 truncate cleaned up [ 304.684855][T16540] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 304.714928][T16540] ext4 filesystem being mounted at /1040/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 305.611786][ T3306] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 305.878957][T16576] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5184'. [ 305.900973][T16576] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 305.909284][T16576] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 305.917670][T16576] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 305.925906][T16576] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 305.943675][T16576] vxlan0: entered promiscuous mode [ 305.948871][T16576] vxlan0: entered allmulticast mode [ 306.773528][T16604] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5189'. [ 306.806099][T16599] netdevsim netdevsim2 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 306.823409][T16599] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 306.944759][T16599] netdevsim netdevsim2 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 306.958981][T16599] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 307.053364][T16599] netdevsim netdevsim2 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 307.067193][T16599] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 307.161406][T16627] SELinux: Context  is not valid (left unmapped). [ 307.351395][T16599] netdevsim netdevsim2 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 307.362947][T16599] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 307.713858][T16599] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 307.722147][T16599] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.731713][T16638] xt_hashlimit: size too large, truncated to 1048576 [ 307.734585][T16599] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 307.746694][T16599] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.761317][T16599] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 307.769651][T16599] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.799577][T16599] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 307.807928][T16599] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 308.095940][ T29] kauditd_printk_skb: 262 callbacks suppressed [ 308.096011][ T29] audit: type=1326 audit(1746258871.429:35375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.0.5205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 308.126759][ T29] audit: type=1326 audit(1746258871.429:35376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.0.5205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 308.150598][ T29] audit: type=1326 audit(1746258871.429:35377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.0.5205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=137 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 308.174225][ T29] audit: type=1326 audit(1746258871.429:35378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.0.5205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 308.197893][ T29] audit: type=1326 audit(1746258871.429:35379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.0.5205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 308.221565][ T29] audit: type=1326 audit(1746258871.429:35380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.0.5205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 308.245171][ T29] audit: type=1326 audit(1746258871.429:35381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.0.5205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 308.268839][ T29] audit: type=1326 audit(1746258871.429:35382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.0.5205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 308.292512][ T29] audit: type=1326 audit(1746258871.429:35383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.0.5205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 308.316274][ T29] audit: type=1326 audit(1746258871.429:35384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16647 comm="syz.0.5205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 308.395844][T16656] xt_addrtype: ipv6 does not support BROADCAST matching [ 308.471805][T16660] netlink: 'syz.6.5207': attribute type 6 has an invalid length. [ 308.655556][T16672] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5211'. [ 308.856436][T16680] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 308.948030][T16680] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 309.061440][T16690] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 309.091684][T16690] SELinux: failed to load policy [ 309.100666][T16680] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 309.285769][T16680] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 309.628143][T16680] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 309.695740][T16710] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5222'. [ 309.723335][T16680] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 309.766248][T16680] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 309.793192][T16680] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.549819][T16723] SELinux: security_context_str_to_sid () failed with errno=-22 [ 310.601459][T16722] usb usb2: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 310.608918][T16722] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 310.616482][T16722] vhci_hcd: default hub control req: 6314 v0008 i0002 l0 [ 311.303731][T16733] netdevsim netdevsim2 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 311.313799][T16733] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.364195][T16741] siw: device registration error -23 [ 311.380108][T16733] netdevsim netdevsim2 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 311.389955][T16733] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.435543][T16733] netdevsim netdevsim2 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 311.445544][T16733] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.576606][T16733] netdevsim netdevsim2 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 311.586519][T16733] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.675307][T16755] xt_hashlimit: size too large, truncated to 1048576 [ 311.693489][T16757] SELinux: Context system_u:object_r:semanage_exec_t:s0 is not valid (left unmapped). [ 312.584952][T16775] netlink: 173236 bytes leftover after parsing attributes in process `syz.5.5242'. [ 312.852182][T16782] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5244'. [ 313.158241][ T29] kauditd_printk_skb: 667 callbacks suppressed [ 313.158258][ T29] audit: type=1400 audit(1746258876.489:36052): avc: denied { create } for pid=16796 comm="syz.5.5251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 313.210039][T16798] xt_hashlimit: max too large, truncated to 1048576 [ 313.239495][ T29] audit: type=1400 audit(1746258876.569:36053): avc: denied { relabelfrom } for pid=16796 comm="+}[@" name="" dev="pipefs" ino=54088 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 313.261716][ T29] audit: type=1326 audit(1746258876.569:36054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16796 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 313.285049][ T29] audit: type=1326 audit(1746258876.569:36055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16796 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 313.665843][ T29] audit: type=1326 audit(1746258876.619:36056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16796 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 313.689047][ T29] audit: type=1326 audit(1746258876.619:36057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16796 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 313.712149][ T29] audit: type=1326 audit(1746258876.619:36058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16796 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 313.735352][ T29] audit: type=1326 audit(1746258876.619:36059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16796 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 313.758617][ T29] audit: type=1400 audit(1746258876.659:36060): avc: denied { read } for pid=16799 comm="syz.6.5245" name="usbmon7" dev="devtmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 313.782284][ T29] audit: type=1400 audit(1746258876.659:36061): avc: denied { open } for pid=16799 comm="syz.6.5245" path="/dev/usbmon7" dev="devtmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 313.988818][T16820] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5255'. [ 314.267731][T16812] xt_CT: You must specify a L4 protocol and not use inversions on it [ 314.396681][T16836] gtp0: entered promiscuous mode [ 314.402184][T16838] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5262'. [ 314.423309][T16838] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5262'. [ 314.636820][T16733] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 314.645157][T16733] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.744879][T16851] netlink: 104 bytes leftover after parsing attributes in process `syz.5.5266'. [ 314.773021][T16851] netlink: 28 bytes leftover after parsing attributes in process `syz.5.5266'. [ 314.917178][T16733] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 314.925480][T16733] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.947311][T16733] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 314.955623][T16733] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.970198][T16733] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 314.978511][T16733] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 315.580677][T16874] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 315.594254][T16865] gtp0: entered promiscuous mode [ 315.646550][T16881] netlink: 36 bytes leftover after parsing attributes in process `syz.2.5275'. [ 315.866230][T16893] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5276'. [ 316.217100][T16911] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5284'. [ 317.101233][T16922] xt_hashlimit: max too large, truncated to 1048576 [ 317.109326][T16922] Cannot find set identified by id 0 to match [ 317.149260][T16927] netlink: 244 bytes leftover after parsing attributes in process `syz.6.5285'. [ 317.329755][T16940] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 317.746798][T16940] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 317.835285][T16940] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 317.847938][T16946] program syz.5.5296 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 317.858811][T16951] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5298'. [ 317.895170][T16940] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 317.971365][T16940] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.062040][T16940] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.074218][T16940] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.095190][T16940] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.111069][T16959] 9pnet: p9_errstr2errno: server reported unknown error [ 318.654156][ T29] kauditd_printk_skb: 211 callbacks suppressed [ 318.654229][ T29] audit: type=1326 audit(1746258881.989:36273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16965 comm="syz.2.5302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 318.727563][T16966] netlink: 'syz.2.5302': attribute type 10 has an invalid length. [ 318.877301][ T29] audit: type=1326 audit(1746258882.019:36274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16965 comm="syz.2.5302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 318.901301][ T29] audit: type=1326 audit(1746258882.019:36275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16965 comm="syz.2.5302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=194 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 318.925135][ T29] audit: type=1326 audit(1746258882.019:36276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16965 comm="syz.2.5302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 318.949096][ T29] audit: type=1326 audit(1746258882.019:36277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16965 comm="syz.2.5302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 318.972809][ T29] audit: type=1326 audit(1746258882.019:36278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16965 comm="syz.2.5302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 318.996626][ T29] audit: type=1326 audit(1746258882.029:36279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16965 comm="syz.2.5302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 319.017965][T16966] team0: Device hsr_slave_0 failed to register rx_handler [ 319.021007][ T29] audit: type=1326 audit(1746258882.029:36280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16965 comm="syz.2.5302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 319.051835][ T29] audit: type=1326 audit(1746258882.029:36281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16965 comm="syz.2.5302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=334 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 319.075454][ T29] audit: type=1326 audit(1746258882.029:36282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16965 comm="syz.2.5302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 319.148778][T16978] tipc: Bearer : already 2 bearers with priority 10 [ 319.156460][T16978] tipc: Bearer : trying with adjusted priority [ 319.163588][T16978] tipc: Enabling of bearer rejected, max 3 bearers permitted [ 319.250390][T16986] xt_addrtype: ipv6 does not support BROADCAST matching [ 319.424586][T17004] selinux_netlink_send: 42 callbacks suppressed [ 319.424602][T17004] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17004 comm=syz.5.5315 [ 319.445105][T17004] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17004 comm=syz.5.5315 [ 319.457880][T16997] usb usb2: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 319.465419][T16997] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 319.473924][T17004] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17004 comm=syz.5.5315 [ 319.486734][T16997] vhci_hcd: default hub control req: 6314 v0008 i0002 l0 [ 319.508028][T17004] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17004 comm=syz.5.5315 [ 319.526953][T17004] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17004 comm=syz.5.5315 [ 319.540212][T17004] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17004 comm=syz.5.5315 [ 319.553538][T17004] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17004 comm=syz.5.5315 [ 319.583809][T17004] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17004 comm=syz.5.5315 [ 319.610070][T17004] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17004 comm=syz.5.5315 [ 319.666133][T17004] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17004 comm=syz.5.5315 [ 320.129804][T17016] netlink: 'syz.4.5322': attribute type 13 has an invalid length. [ 320.309749][T17025] xt_addrtype: ipv6 does not support BROADCAST matching [ 320.861767][T17033] bond1: entered promiscuous mode [ 320.866911][T17033] bond1: entered allmulticast mode [ 320.872587][T17033] 8021q: adding VLAN 0 to HW filter on device bond1 [ 320.882646][T17033] bond1 (unregistering): Released all slaves [ 320.940295][T17039] xt_addrtype: ipv6 does not support BROADCAST matching [ 321.177218][T17052] __nla_validate_parse: 1 callbacks suppressed [ 321.177255][T17052] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5332'. [ 321.233194][T17057] xt_hashlimit: size too large, truncated to 1048576 [ 321.465108][T17067] xt_addrtype: ipv6 does not support BROADCAST matching [ 321.956173][T17076] xt_addrtype: ipv6 does not support BROADCAST matching [ 322.005359][T17079] xt_addrtype: ipv6 does not support BROADCAST matching [ 322.119534][T17077] usb usb2: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 322.127049][T17077] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 322.135091][T17077] vhci_hcd: default hub control req: 6314 v0008 i0002 l0 [ 322.170703][T17099] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5345'. [ 322.225797][T17104] 9pnet: p9_errstr2errno: server reported unknown error [ 322.263662][T17106] tipc: New replicast peer: 10.1.1.2 [ 322.269049][T17106] tipc: Enabled bearer , priority 10 [ 322.402387][T17115] xt_addrtype: ipv6 does not support BROADCAST matching [ 322.480931][T17125] xt_addrtype: ipv6 does not support BROADCAST matching [ 322.697547][T17128] xt_hashlimit: size too large, truncated to 1048576 [ 324.075475][ T29] kauditd_printk_skb: 1205 callbacks suppressed [ 324.075494][ T29] audit: type=1326 audit(1746258887.399:37488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17185 comm="syz.6.5379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 324.106228][ T29] audit: type=1326 audit(1746258887.399:37489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17185 comm="syz.6.5379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 324.130283][ T29] audit: type=1326 audit(1746258887.399:37490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17185 comm="syz.6.5379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 324.154216][ T29] audit: type=1326 audit(1746258887.399:37491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17185 comm="syz.6.5379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 324.177959][ T29] audit: type=1326 audit(1746258887.399:37492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17185 comm="syz.6.5379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 324.201658][ T29] audit: type=1326 audit(1746258887.399:37493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17185 comm="syz.6.5379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 324.226106][ T29] audit: type=1326 audit(1746258887.399:37494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17185 comm="syz.6.5379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=87 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 324.249961][ T29] audit: type=1326 audit(1746258887.399:37495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17185 comm="syz.6.5379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 324.273684][ T29] audit: type=1326 audit(1746258887.409:37496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17185 comm="syz.6.5379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f4798990887 code=0x7ffc0000 [ 324.297495][ T29] audit: type=1326 audit(1746258887.409:37497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17185 comm="syz.6.5379" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f47989907fc code=0x7ffc0000 [ 325.118477][T17227] xt_addrtype: ipv6 does not support BROADCAST matching [ 325.220992][T17229] tipc: Enabled bearer , priority 0 [ 325.230030][T17229] siw: device registration error -23 [ 325.236301][T17228] tipc: Resetting bearer [ 325.250235][T17228] tipc: Disabling bearer [ 325.583739][T17241] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5396'. [ 325.592796][T17241] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5396'. [ 325.601997][T17241] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5396'. [ 325.628499][T17246] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5395'. [ 325.869774][T17255] xt_addrtype: ipv6 does not support BROADCAST matching [ 325.981652][T17262] xt_addrtype: ipv6 does not support BROADCAST matching [ 326.102285][T17270] netlink: 180 bytes leftover after parsing attributes in process `syz.0.5406'. [ 326.126647][T17270] netlink: 'syz.0.5406': attribute type 10 has an invalid length. [ 326.181523][T17272] geneve0: entered allmulticast mode [ 326.332198][T17266] program syz.4.5403 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 327.276391][T17323] netlink: 'syz.5.5424': attribute type 13 has an invalid length. [ 327.546597][T17323] netdevsim netdevsim5 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 327.555175][T17323] netdevsim netdevsim5 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 327.563651][T17323] netdevsim netdevsim5 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 327.572168][T17323] netdevsim netdevsim5 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 327.793127][ T10] syz1: Port: 1 Link DOWN [ 327.987563][T17339] xt_addrtype: ipv6 does not support BROADCAST matching [ 328.025652][T17347] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5434'. [ 328.321932][T17362] netlink: 44 bytes leftover after parsing attributes in process `syz.0.5437'. [ 328.331073][T17362] netlink: 43 bytes leftover after parsing attributes in process `syz.0.5437'. [ 328.340086][T17362] netlink: 'syz.0.5437': attribute type 6 has an invalid length. [ 328.347907][T17362] netlink: 'syz.0.5437': attribute type 5 has an invalid length. [ 328.355670][T17362] netlink: 43 bytes leftover after parsing attributes in process `syz.0.5437'. [ 328.644866][T17369] xt_NFQUEUE: number of queues (65532) out of range (got 66665) [ 328.831042][T17335] syz.6.5427 (17335) used greatest stack depth: 5776 bytes left [ 328.886474][T17382] gtp0: entered promiscuous mode [ 328.956493][T17384] xt_addrtype: ipv6 does not support BROADCAST matching [ 328.978125][T17386] xt_addrtype: ipv6 does not support BROADCAST matching [ 329.114689][T17397] xt_addrtype: ipv6 does not support BROADCAST matching [ 329.132250][T17398] tipc: Enabled bearer , priority 0 [ 329.132623][ T29] kauditd_printk_skb: 493 callbacks suppressed [ 329.132648][ T29] audit: type=1326 audit(1746258892.459:37991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17395 comm="team_slave_0" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 329.141712][T17398] siw: device registration error -23 [ 329.145164][ T29] audit: type=1326 audit(1746258892.459:37992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17395 comm="team_slave_0" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 329.198486][ T29] audit: type=1326 audit(1746258892.459:37993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17395 comm="team_slave_0" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 329.222542][ T29] audit: type=1326 audit(1746258892.459:37994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17395 comm="team_slave_0" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 329.246632][ T29] audit: type=1326 audit(1746258892.459:37995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17395 comm="team_slave_0" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 329.270787][ T29] audit: type=1326 audit(1746258892.599:37996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17395 comm="team_slave_0" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 329.295016][ T29] audit: type=1326 audit(1746258892.629:37997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17395 comm="team_slave_0" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 329.319264][ T29] audit: type=1326 audit(1746258892.629:37998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17395 comm="team_slave_0" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 329.343751][ T29] audit: type=1326 audit(1746258892.629:37999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17395 comm="team_slave_0" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 329.367758][ T29] audit: type=1326 audit(1746258892.629:38000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17395 comm="team_slave_0" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 329.391858][T17396] tipc: Resetting bearer [ 329.419913][T17396] tipc: Disabling bearer [ 329.537863][T17402] xt_addrtype: ipv6 does not support BROADCAST matching [ 329.640729][T17415] gtp0: entered promiscuous mode [ 329.818874][T17423] xt_addrtype: ipv6 does not support BROADCAST matching [ 329.895133][T17428] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5461'. [ 329.906343][T17428] bond0: left allmulticast mode [ 329.911287][T17428] bond0: left promiscuous mode [ 329.916377][T17428] bridge0: port 2(bond0) entered disabled state [ 329.924267][T17428] dummy0: left allmulticast mode [ 329.929460][T17428] bridge0: port 1(dummy0) entered disabled state [ 329.958645][T17429] netlink: 'syz.0.5461': attribute type 10 has an invalid length. [ 329.979515][T17429] bond0: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 329.990107][T17433] netlink: 'syz.4.5463': attribute type 1 has an invalid length. [ 330.002040][T17429] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5461'. [ 330.030084][T17433] 8021q: adding VLAN 0 to HW filter on device bond1 [ 330.039498][T17429] IPVS: Unknown mcast interface: vcan0 [ 330.062257][T17438] xt_addrtype: ipv6 does not support BROADCAST matching [ 330.063526][T17436] bond1: (slave gretap1): making interface the new active one [ 330.099829][T17436] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 330.117173][T17439] bond1: entered promiscuous mode [ 330.122415][T17439] bond1: entered allmulticast mode [ 330.131519][T17439] 8021q: adding VLAN 0 to HW filter on device bond1 [ 330.148895][T17439] bond1 (unregistering): Released all slaves [ 330.398952][T17461] xt_addrtype: ipv6 does not support BROADCAST matching [ 330.459997][T17465] xt_addrtype: ipv6 does not support BROADCAST matching [ 330.561831][T17470] netdevsim netdevsim2 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 330.571864][T17470] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 330.646939][T17470] netdevsim netdevsim2 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 330.657016][T17470] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 330.715348][T17470] netdevsim netdevsim2 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 330.725377][T17470] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 330.767776][T17479] xt_addrtype: ipv6 does not support BROADCAST matching [ 330.801707][T17470] netdevsim netdevsim2 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 330.811537][T17470] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 330.925863][T17470] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 330.934175][T17470] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.990288][T17470] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 330.998606][T17470] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.056010][T17470] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 331.064323][T17470] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.099693][T17470] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 331.108005][T17470] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.246639][T17499] xt_addrtype: ipv6 does not support BROADCAST matching [ 331.458616][T17509] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5494'. [ 331.470871][T17508] xt_addrtype: ipv6 does not support BROADCAST matching [ 331.872828][T17515] xt_addrtype: ipv6 does not support BROADCAST matching [ 332.496890][T17524] program syz.6.5488 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 333.849968][T17561] xt_addrtype: ipv6 does not support BROADCAST matching [ 333.922981][T17568] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 334.143615][ T29] kauditd_printk_skb: 1180 callbacks suppressed [ 334.143633][ T29] audit: type=1326 audit(1746258897.479:39181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17566 comm="syz.0.5503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 334.164808][T17580] bond3: entered promiscuous mode [ 334.178671][T17580] bond3: entered allmulticast mode [ 334.184508][T17580] 8021q: adding VLAN 0 to HW filter on device bond3 [ 334.199624][T17580] bond3 (unregistering): Released all slaves [ 334.213471][ T29] audit: type=1326 audit(1746258897.529:39182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17566 comm="syz.0.5503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 334.237562][ T29] audit: type=1326 audit(1746258897.529:39183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17566 comm="syz.0.5503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 334.322485][ T29] audit: type=1326 audit(1746258897.649:39184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17566 comm="syz.0.5503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=318 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 334.347735][ T29] audit: type=1326 audit(1746258897.649:39185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17566 comm="syz.0.5503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 334.371584][ T29] audit: type=1326 audit(1746258897.649:39186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17566 comm="syz.0.5503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07b4a2e969 code=0x7ffc0000 [ 334.504858][ T29] audit: type=1400 audit(1746258897.829:39187): avc: denied { read write } for pid=17592 comm="syz.4.5510" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 334.528566][ T29] audit: type=1400 audit(1746258897.829:39188): avc: denied { open } for pid=17592 comm="syz.4.5510" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 334.552016][ T29] audit: type=1400 audit(1746258897.829:39189): avc: denied { ioctl } for pid=17592 comm="syz.4.5510" path="/dev/ppp" dev="devtmpfs" ino=140 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 334.590899][T17594] netlink: 28 bytes leftover after parsing attributes in process `syz.6.5508'. [ 334.634515][T17593] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5510'. [ 334.644087][T17603] xt_addrtype: ipv6 does not support BROADCAST matching [ 334.665483][ T29] audit: type=1326 audit(1746258897.989:39190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17602 comm="team_slave_0" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f479898e969 code=0x7ffc0000 [ 335.001458][T17625] SELinux: syz.4.5521 (17625) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 335.081508][T17625] selinux_netlink_send: 52 callbacks suppressed [ 335.081541][T17625] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=17625 comm=syz.4.5521 [ 335.173702][T17595] program syz.0.5507 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 335.506264][T17644] xt_addrtype: ipv6 does not support BROADCAST matching [ 335.567925][T17642] netlink: 16 bytes leftover after parsing attributes in process `syz.4.5526'. [ 335.584017][T17642] siw: device registration error -23 [ 335.706231][T17653] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5531'. [ 335.924359][T17668] xt_addrtype: ipv6 does not support BROADCAST matching [ 336.526851][T17689] netlink: 'syz.6.5544': attribute type 13 has an invalid length. [ 336.615846][T17695] xt_addrtype: ipv6 does not support BROADCAST matching [ 336.799661][T17689] netdevsim netdevsim6 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.808616][T17689] netdevsim netdevsim6 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.817198][T17689] netdevsim netdevsim6 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.826028][T17689] netdevsim netdevsim6 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 337.167285][T17727] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 337.223234][T17726] xt_addrtype: ipv6 does not support BROADCAST matching [ 337.233112][T17721] siw: device registration error -23 [ 337.373020][T17736] xt_CT: You must specify a L4 protocol and not use inversions on it [ 337.787008][T17756] netlink: 'syz.2.5567': attribute type 13 has an invalid length. [ 337.988321][T17761] xt_addrtype: ipv6 does not support BROADCAST matching [ 338.063421][T17756] netdevsim netdevsim2 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.071891][T17756] netdevsim netdevsim2 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.080453][T17756] netdevsim netdevsim2 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.089304][T17756] netdevsim netdevsim2 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.178957][T17756] netdevsim netdevsim2 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 338.187553][T17756] netdevsim netdevsim2 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 338.196165][T17756] netdevsim netdevsim2 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 338.204923][T17756] netdevsim netdevsim2 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 338.376824][T17770] xt_addrtype: ipv6 does not support BROADCAST matching [ 338.495903][T17778] bond2: entered promiscuous mode [ 338.501005][T17778] bond2: entered allmulticast mode [ 338.507335][T17778] 8021q: adding VLAN 0 to HW filter on device bond2 [ 338.516805][T17778] bond2 (unregistering): Released all slaves [ 339.180538][ T29] kauditd_printk_skb: 935 callbacks suppressed [ 339.180554][ T29] audit: type=1400 audit(1746258902.509:40126): avc: denied { override_creds } for pid=17790 comm="syz.6.5579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 339.774217][ T29] audit: type=1326 audit(1746258903.109:40127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17803 comm="syz.5.5584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 339.798153][ T29] audit: type=1326 audit(1746258903.109:40128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17803 comm="syz.5.5584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 339.861621][ T29] audit: type=1326 audit(1746258903.169:40129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17803 comm="syz.5.5584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 339.885537][ T29] audit: type=1326 audit(1746258903.169:40130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17803 comm="syz.5.5584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 339.909164][ T29] audit: type=1326 audit(1746258903.169:40131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17803 comm="syz.5.5584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 339.932848][ T29] audit: type=1326 audit(1746258903.179:40132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17803 comm="syz.5.5584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 339.956700][ T29] audit: type=1326 audit(1746258903.179:40133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17803 comm="syz.5.5584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 339.980930][ T29] audit: type=1326 audit(1746258903.179:40134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17803 comm="syz.5.5584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 340.004850][ T29] audit: type=1326 audit(1746258903.179:40135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17803 comm="syz.5.5584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f82306ee969 code=0x7ffc0000 [ 340.008109][T17811] xt_hashlimit: size too large, truncated to 1048576 [ 340.365468][T17820] xt_addrtype: ipv6 does not support BROADCAST matching [ 340.656247][T17832] tipc: Bearer : already 2 bearers with priority 10 [ 340.663824][T17832] tipc: Bearer : trying with adjusted priority [ 340.670874][T17832] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5592'. [ 340.679921][T17832] tipc: Enabling of bearer rejected, failed to enable media [ 340.770382][T17836] random: crng reseeded on system resumption [ 341.219507][T17852] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 341.340829][T17859] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5601'. [ 341.493949][T17868] syz!: rxe_newlink: already configured on team_slave_0 [ 341.530090][T17880] Invalid ELF header magic: != ELF [ 341.565105][T17883] xt_addrtype: ipv6 does not support BROADCAST matching [ 341.584033][T17880] sd 0:0:1:0: device reset [ 341.708092][T17895] netlink: 'syz.0.5613': attribute type 13 has an invalid length. [ 341.987723][T17924] xt_addrtype: ipv6 does not support BROADCAST matching [ 342.520638][T17935] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5628'. [ 342.529821][T17935] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5628'. [ 342.539781][T17935] futex_wake_op: syz.5.5628 tries to shift op by 32; fix this program [ 342.548667][T17935] hub 2-0:1.0: USB hub found [ 342.553469][T17935] hub 2-0:1.0: 8 ports detected [ 342.644291][T17944] netlink: 'syz.4.5632': attribute type 13 has an invalid length. [ 342.717672][T17946] xt_CT: You must specify a L4 protocol and not use inversions on it [ 343.521094][T17986] netlink: 'syz.6.5647': attribute type 13 has an invalid length. [ 343.672309][T17990] xt_addrtype: ipv6 does not support BROADCAST matching [ 343.990415][T18001] binfmt_misc: register: failed to install interpreter file ./file2 [ 344.053705][T18002] ================================================================== [ 344.061854][T18002] BUG: KCSAN: data-race in atime_needs_update / touch_atime [ 344.069296][T18002] [ 344.071640][T18002] write to 0xffff8881243343d8 of 4 bytes by task 18001 on cpu 1: [ 344.079387][T18002] touch_atime+0x1e8/0x330 [ 344.083846][T18002] shmem_file_splice_read+0x582/0x5d0 [ 344.089261][T18002] splice_direct_to_actor+0x26c/0x680 [ 344.094661][T18002] do_splice_direct+0xda/0x150 [ 344.099463][T18002] do_sendfile+0x380/0x640 [ 344.103925][T18002] __x64_sys_sendfile64+0x105/0x150 [ 344.109166][T18002] x64_sys_call+0xb39/0x2fb0 [ 344.113875][T18002] do_syscall_64+0xd0/0x1a0 [ 344.118415][T18002] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 344.124340][T18002] [ 344.126718][T18002] read to 0xffff8881243343d8 of 4 bytes by task 18002 on cpu 0: [ 344.134385][T18002] atime_needs_update+0x25f/0x3e0 [ 344.139459][T18002] touch_atime+0x4a/0x330 [ 344.143919][T18002] shmem_file_splice_read+0x582/0x5d0 [ 344.149339][T18002] splice_direct_to_actor+0x26c/0x680 [ 344.154752][T18002] do_splice_direct+0xda/0x150 [ 344.159529][T18002] do_sendfile+0x380/0x640 [ 344.164258][T18002] __x64_sys_sendfile64+0x105/0x150 [ 344.169502][T18002] x64_sys_call+0xb39/0x2fb0 [ 344.174127][T18002] do_syscall_64+0xd0/0x1a0 [ 344.178660][T18002] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 344.184592][T18002] [ 344.186930][T18002] value changed: 0x16a2379e -> 0x173ace1e [ 344.192670][T18002] [ 344.195002][T18002] Reported by Kernel Concurrency Sanitizer on: [ 344.201195][T18002] CPU: 0 UID: 0 PID: 18002 Comm: syz.5.5653 Not tainted 6.15.0-rc4-syzkaller-00256-g95d3481af6dc #0 PREEMPT(voluntary) [ 344.213903][T18002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 344.224163][T18002] ================================================================== [ 344.495294][ T29] kauditd_printk_skb: 1268 callbacks suppressed [ 344.495315][ T29] audit: type=1326 audit(1746258907.829:41404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17989 comm="team_slave_0" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000 [ 344.526528][ T29] audit: type=1326 audit(1746258907.829:41405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17989 comm="team_slave_0" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f429b4ee969 code=0x7ffc0000