last executing test programs: 4.456649282s ago: executing program 2 (id=3): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x1000c16, &(0x7f0000000500), 0xff, 0x260, &(0x7f0000000980)="$eJzs3U9IHFccB/DfzO7Wqkux7aVQ+gdKKa0g9lboxV5aEIpIKYW2YCmllxYtWKU37SmXHJJjSIKnXCTkFpNj8CK5JARyMokHcwkkkkMkhySwYXcU/LOJxl13gvP5wDoz+ub93jDzfSPiMAEUVl9EDEVEKSL6I6ISEcnWBh9nn76NzbnupbGIWu2Hh0mjXbad2dyvNyJmI+KriFhMk/irHDG98Mvq4+XvPjs+Vfn03MLP3R09yA1rqyvfr58dOXZx+Mvp6zfvjyQxFNVtx9V+SZPvlZOIdw6j2GsiKec9AvZj9L8Lt+q5fzciPmnkvxJpZCfvxOQbi5X44syL9j354Mb7nRwr0H61WqV+D5ytAYWTRkQ1knQgIrL1NB0YyH6Hv13qSf+emPy3/8+JqfE/8p6pgHapRqx8e7nrUu+O/N8rZfkHjqjsj1IrP47O36mvrJfyHhDQER9ki/r9v/+3mc9D/qFw5B+KS/6huOQfikv+4ehp9v+mzcg/FJf8Q3HJPxSX/ENxHTj/p54d3qCAjtiafwCgWGpdB3pquP0PIgMdl/f8AwAAAAAAAAAAAAAAAAAA7DbXvTS2+WlPj+U9W1w9HbH2TdZ0d/1S433EEW82vvY8Srb1mOyrwsv9+lGLHbTofM5PX791N9/61z7Mt/7MeMTs/xExWC43rr1tF1Sycf0d3Nt7/Lzye4sFXtHOdwN8/VNn6+/0dD7f+sPLEVfq889gs/knjfcay+bzT7V+/lqs/8+TFjsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgY54HAAD//7UiauA=") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @private=0xa010100}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f00000001c0)='\\.\x00', &(0x7f0000000540)="5a386815adf4f3b840613054664d1cdf649acc1b64e23eec84dd90949966b6589ff6e1d443c4c4fc464b9ad6651e309085e7b1d8c7c059751b82dd81d6288b8abeabda3b90947c8d6a611fc4b17923201c9b38e623d52028a873b07c40dd685ce7bbd6a24ea5be8d00a2f2ee227bea2830d7bf505fdb7a37c0bdd7c899c0006c6bb8522d0e4ec164e26430965e3ccf958303f24b5fab007e18b8228de52aaaae0b07cd8c13b4228375e1c6c863dbf41175c46b48d95b2595b44c1514d941f0a098af8a123a165adcccaabe229d846affc3b40c866ee6e252eddedf30", 0xdc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0xc, &(0x7f0000000640)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000308000000b7040000000000008500000001000000952bec7a2a0c3b6e8ca6e2492427d11713d95154c1ce0a915dc5a8f12c02d548748a7bc9f8fb8c5f946fc089ed7c0d1e8da314030786f37827bb383a3fdb48afc4429a70a3fa8b1f5371a9908a3c9ffb815e187afe81c475acedb1762d6ae813e1d41c877b3f7227031436fa6947861ecd1b0b7245b9ddcc49a8f81f41789ba09c9b11090d86ecb55e94274975ce6f000000000000"], 0x0, 0x1a, 0x4, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100003}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000000c0)="010001000000000000001000015b097ead85847817353d2dbad05dd5", 0x1c, 0xfffffffffffffffd) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) write(r8, &(0x7f00000001c0)="f1", 0x1) sendfile(r8, r6, 0x0, 0x40001) sendfile(r8, r7, 0x0, 0x7ffff000) 4.163542011s ago: executing program 1 (id=2): bind$rds(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41100}, 0xfffffee6) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f00000001c0), 0x1, 0x5d8, &(0x7f0000000c00)="$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") socket$inet(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="000000000000000003000000"], &(0x7f0000000200)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r3, 0x10, &(0x7f0000000740)={0x8f, 0x0, &(0x7f00000012c0)=[{&(0x7f0000000580)=""/231, 0xe7}, {&(0x7f0000000500)=""/14, 0xe}, {&(0x7f0000000840)=""/234, 0xea}, {&(0x7f0000000280)=""/64, 0x40}, {&(0x7f0000000400)=""/68, 0x44}, {&(0x7f0000000940)=""/187, 0xbb}, {&(0x7f0000000ac0)=""/138, 0x8a}, {&(0x7f0000001440)=""/174, 0xae}, {&(0x7f0000000380)=""/30, 0x1e}, {&(0x7f0000001880)=""/4096, 0x1000}], &(0x7f0000000480)=[0x8000000000000000], 0xa}, 0x20) r4 = socket(0xa, 0x2, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000240)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r6, @ANYBLOB="14000200ff2300000000000000000000000000011400060000000000060000000000000000000000080008000004"], 0x48}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x5, r6}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@deltaction={0x54, 0x18, 0x1, 0x70bd2a, 0x25dfdc00, {0xa}, [@TCA_ACT_TAB={0x40, 0x1, [{0xc, 0x8f, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x37}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x44000}, 0x20040844) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES64=r2], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x70bd2a, 0x0, {0x0, 0x0, 0x12, 0x0, {0x0, 0xf}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}}, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r11, &(0x7f0000004200)='t', 0x1) sendfile(r11, r10, 0x0, 0x3ffff) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r12}, 0x10) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) 4.135819184s ago: executing program 0 (id=6): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) socket(0x10, 0x803, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xa}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf, 0x5}]}]}}, 0x0, 0x3a, 0x0, 0x8}, 0x28) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) connect$can_bcm(r2, &(0x7f0000000140), 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = shmget(0x0, 0x1000, 0xa04, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_RMID(r4, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x900a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x10001}, 0x6080, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x4, &(0x7f00000001c0)=ANY=[], 0x88, 0x2c6, &(0x7f0000000680)="$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") sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r5, &(0x7f0000000480)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, 0x0, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 4.135440004s ago: executing program 3 (id=4): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae", @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000002, 0x11012, r2, 0x10c000) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x2000000b, 0xe0, &(0x7f0000000240)={0x3, 0x0, 0xfffa, 0x4360}, 0x8, 0x6, 0x7d, 0x0, 0x1, 0x101, 0x0}) ioctl$USBDEVFS_REAPURBNDELAY(r2, 0x4008550d, &(0x7f0000000040)) r3 = socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='freezer.self_freezing\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/164, 0xa4}, {&(0x7f0000000380)=""/35, 0x23}], 0x3, 0x0, 0x7) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x49920d862a92153b, 0x0, 0xffffffff, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6, 0x5, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}, 0x1, 0x0, 0x0, 0x10040880}, 0x20004080) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)={0x18, r5, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR_REMOTE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x24000800}, 0x4000000) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x80, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0xf) r9 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) fcntl$dupfd(r9, 0x406, r9) r10 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r10, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r10, 0x84, 0x75, &(0x7f0000000680)={0x0, 0xfc000000}, 0x8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) bind$inet6(r10, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r10, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x1, @loopback}, 0x1c, &(0x7f0000000580)}}], 0x1, 0x0) 3.521713804s ago: executing program 0 (id=7): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) socket(0x10, 0x803, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xa}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf, 0x5}]}]}}, 0x0, 0x3a, 0x0, 0x8}, 0x28) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) connect$can_bcm(r2, &(0x7f0000000140), 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kfree\x00', r4}, 0x18) r5 = shmget(0x0, 0x1000, 0xa04, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_RMID(r5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x900a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x10001}, 0x6080, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x4, &(0x7f00000001c0)=ANY=[], 0x88, 0x2c6, &(0x7f0000000680)="$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") r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r6, &(0x7f0000000480)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r7, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) r8 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r8, &(0x7f00000003c0)=ANY=[@ANYBLOB="00070000420091"], 0xfe33) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) 3.440170762s ago: executing program 3 (id=8): write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x22052, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a}, 0x1c) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, &(0x7f00000001c0)=0x7, 0x4) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000002780)=ANY=[@ANYBLOB="1c0008200203000014"], 0xfb5) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000280)={@private=0xa010100, 0x1, 0x0, 0x60, 0x0, [{@private}, {@multicast2}, {@local}, {}, {}, {@local}]}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x4000000ffb, 0x8) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x10000, &(0x7f0000000080)={[{@nobh}, {@grpquota}, {@data_err_ignore}]}, 0x3, 0x4d1, &(0x7f0000000180)="$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") lsetxattr$security_selinux(&(0x7f00000001c0)='.\x00', &(0x7f0000000240), &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x1001, 0x0) 3.36273673s ago: executing program 2 (id=9): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000001440), 0x0, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/113, 0x71}], 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x10) setresgid(0xee00, 0xee01, 0x0) setreuid(0x0, 0xee00) r3 = msgget$private(0x0, 0x480) msgsnd(r3, &(0x7f0000000a00)={0x1, "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"}, 0x401, 0x0) msgctl$IPC_RMID(r3, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x542, &(0x7f0000001a00)="$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") 3.107129595s ago: executing program 1 (id=11): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x1000c16, &(0x7f0000000500), 0xff, 0x260, &(0x7f0000000980)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @private=0xa010100}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f00000001c0)='\\.\x00', &(0x7f0000000540)="5a386815adf4f3b840613054664d1cdf649acc1b64e23eec84dd90949966b6589ff6e1d443c4c4fc464b9ad6651e309085e7b1d8c7c059751b82dd81d6288b8abeabda3b90947c8d6a611fc4b17923201c9b38e623d52028a873b07c40dd685ce7bbd6a24ea5be8d00a2f2ee227bea2830d7bf505fdb7a37c0bdd7c899c0006c6bb8522d0e4ec164e26430965e3ccf958303f24b5fab007e18b8228de52aaaae0b07cd8c13b4228375e1c6c863dbf41175c46b48d95b2595b44c1514d941f0a098af8a123a165adcccaabe229d846affc3b40c866ee6e252eddedf30", 0xdc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0xc, &(0x7f0000000640)=ANY=[@ANYRES8=r5, @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000308000000b7040000000000008500000001000000952bec7a2a0c3b6e8ca6e2492427d11713d95154c1ce0a915dc5a8f12c02d548748a7bc9f8fb8c5f946fc089ed7c0d1e8da314030786f37827bb383a3fdb48afc4429a70a3fa8b1f5371a9908a3c9ffb815e187afe81c475acedb1762d6ae813e1d41c877b3f7227031436fa6947861ecd1b0b7245b9ddcc49a8f81f41789ba09c9b11090d86ecb55e94274975ce6f000000000000"], 0x0, 0x1a, 0x4, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100003}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000000c0)="010001000000000000001000015b097ead85847817353d2dbad05dd5", 0x1c, 0xfffffffffffffffd) socket$nl_generic(0x10, 0x3, 0x10) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) write(r9, &(0x7f00000001c0)="f1", 0x1) sendfile(r9, r7, 0x0, 0x40001) sendfile(r9, r8, 0x0, 0x7ffff000) 3.036163992s ago: executing program 3 (id=12): write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x22052, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) writev(0xffffffffffffffff, &(0x7f0000003740)=[{&(0x7f00000001c0)='d', 0x1}], 0x1) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000240)=0x2, 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000280)={@private=0xa010100, 0x1, 0x0, 0x60, 0x0, [{@private}, {@multicast2}, {@local}, {}, {}, {@local}]}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x4000000ffb, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2}, &(0x7f0000000580), &(0x7f00000005c0)=r3}, 0x20) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x10000, &(0x7f0000000080)={[{@nobh}, {@grpquota}, {@data_err_ignore}]}, 0x3, 0x4d1, &(0x7f0000000180)="$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") lsetxattr$security_selinux(&(0x7f00000001c0)='.\x00', &(0x7f0000000240), &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x1001, 0x0) 2.995256856s ago: executing program 0 (id=13): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7020000010000008500000086"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0300000004000000040000000a0000000000000050a056311d43fc8c09c174c5619ff3", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x48) 2.942648961s ago: executing program 0 (id=14): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) socket(0x10, 0x803, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) connect$can_bcm(r2, &(0x7f0000000140), 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kfree\x00', r5}, 0x18) r6 = shmget(0x0, 0x1000, 0xa04, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_RMID(r6, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x900a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x10001}, 0x6080, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x4, &(0x7f00000001c0)=ANY=[], 0x88, 0x2c6, &(0x7f0000000680)="$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") r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r7, &(0x7f0000000480)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r8, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) r9 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="00070000420091"], 0xfe33) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) 2.926833183s ago: executing program 2 (id=15): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x2}, 0x18) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) move_pages(0x0, 0x1efe, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x0) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, 0x0, 0x0) dup2(r3, r3) r4 = getpid() syz_pidfd_open(r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[], 0x0}, 0x94) syz_clone(0xe2840480, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r6, &(0x7f0000000240)='asymmetric\x00', &(0x7f00000001c0)=@keyring={'key_or_keyring:', r1}) 2.622641032s ago: executing program 3 (id=16): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@RTM_NEWMDB={0x18, 0x54, 0x1e5}, 0x18}, 0x1, 0x0, 0x0, 0x4}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000600100004012200a4e2000001000000", @ANYBLOB], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240), &(0x7f0000001940), 0x2000cc0, r0}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240), 0x0, 0x2, r0}, 0x38) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000280)=0x7) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x5412, &(0x7f00000006c0)=0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0202000311000000000000000000000005000500000000000a00000000000000fe8000000000000000000000000000bb000000000000000002000100000007000000000b000000000200090000000000000000000000000005000600000000000a00000000000000fe8800000000000000000000000000010000000000000000010018"], 0x88}}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000340)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r4, 0xffffffffffffffff}, &(0x7f0000000040)=0x18, &(0x7f0000000140)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b70300000000ecff850000000400000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) 2.496899765s ago: executing program 4 (id=17): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) socket(0x10, 0x803, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xa}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf, 0x5}]}]}}, 0x0, 0x3a, 0x0, 0x8}, 0x28) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kfree\x00', r5}, 0x18) r6 = shmget(0x0, 0x1000, 0xa04, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_RMID(r6, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x900a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x10001}, 0x6080, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x4, &(0x7f00000001c0)=ANY=[], 0x88, 0x2c6, &(0x7f0000000680)="$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") r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r7, &(0x7f0000000480)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r8, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) r9 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r9, &(0x7f00000003c0)=ANY=[@ANYBLOB="00070000420091"], 0xfe33) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) 2.260661339s ago: executing program 0 (id=18): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000004c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xa1000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2}, 0x94) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x1a00404, &(0x7f0000000180)={[{@i_version}, {@nomblk_io_submit}]}, 0x1, 0xbac, &(0x7f00000017c0)="$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") openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x1c9441, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x6, &(0x7f0000000000)=0x9, 0x8, 0x0) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) creat(&(0x7f0000000140)='./bus\x00', 0xc) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0, 0x0, 0x1ffffffffffffffd}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000000c00)=@newtaction={0x488, 0x30, 0x12f, 0x0, 0x0, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0xa, 0x4, 0x1, 0x5, 0x4, {0x3, 0x0, 0x101, 0x5, 0x5, 0x2}, {0x3, 0x1, 0x3ff, 0x2137, 0x5}, 0x2, 0x3, 0xeea4}}, @TCA_POLICE_RATE={0x404, 0x2, [0x80000000, 0xf2, 0x0, 0x9, 0x10001, 0x7, 0x3, 0x4, 0x3, 0x2, 0x75, 0x3, 0x8, 0x8, 0x7fffffff, 0x1800, 0x1, 0x0, 0x4, 0x6f5, 0xfffffffb, 0x5, 0x0, 0x6, 0x1000, 0x7fffffff, 0x0, 0x6, 0x2, 0x8, 0x10000, 0x5, 0x6, 0x5, 0x4, 0x7f, 0xcf, 0x1, 0x1, 0x4, 0x6, 0x1, 0x8, 0xffffffff, 0x6, 0x201, 0x9, 0x0, 0xfffffffd, 0x2, 0x5, 0x6, 0x244e0b2b, 0x2, 0x4679156e, 0x9, 0x6, 0x8000, 0x10, 0x7, 0x1cb6, 0x6, 0xe43, 0xe08, 0x8000, 0x0, 0x0, 0x7, 0x83, 0x2, 0xf, 0x3, 0x400, 0xff, 0x0, 0x95, 0x4, 0x4, 0xa, 0x800, 0x5, 0x6, 0x0, 0x1, 0x40, 0xf177, 0x8, 0x7, 0x514753e, 0x9c65, 0x2, 0x0, 0x6, 0x2, 0x7, 0x5, 0x3, 0xfeffeff2, 0x75d, 0x4, 0x9, 0x5, 0x2, 0x0, 0x8, 0x6, 0xffffff86, 0x80000000, 0x6, 0x6, 0x8, 0x0, 0x9, 0x7, 0x0, 0x7, 0x0, 0xffffffea, 0x0, 0x10, 0x7, 0x81, 0xc, 0xae, 0x0, 0xd, 0x3, 0x4, 0x4, 0x0, 0x6, 0x9, 0x2, 0x0, 0x5, 0x4, 0x3, 0x101, 0x5, 0x5, 0x7, 0x6, 0xba7b2704, 0x5, 0x500, 0x170, 0xb, 0x7, 0x5, 0x0, 0x9ab, 0xfffffffc, 0xfffffff7, 0xdbb3, 0x0, 0xf, 0x8, 0x1ff, 0xfffffffb, 0xc0000, 0x8, 0x4, 0x1, 0x3, 0xdf71, 0x9, 0x0, 0x7, 0x89, 0x9, 0x2, 0x1, 0xe4db, 0x37, 0x102, 0x40, 0x8, 0x1, 0xfffffc0f, 0x7fffffff, 0x0, 0x2, 0x3c97, 0x7, 0x9, 0x4, 0x81, 0x1000, 0x7, 0x4, 0x1000, 0x5, 0x9, 0x800, 0x8, 0x4c93, 0x5, 0xc34, 0x7, 0x7ff, 0x6e5, 0x5, 0xfffffbff, 0x9, 0x2, 0xfffffff7, 0x0, 0x5c6c34b0, 0x8, 0x8, 0x9, 0xe8, 0x2000, 0x8, 0x200, 0xb822, 0x0, 0xbc, 0x10001, 0x7, 0x800, 0x4, 0x7, 0x8, 0x9c, 0x1c, 0x2, 0x2, 0x7ff, 0x80000001, 0x1, 0x3, 0x7, 0xff, 0x80000001, 0x7, 0x1, 0x5, 0x5, 0xe7, 0x7, 0x0, 0xfffffbd9, 0x3, 0x7, 0x9, 0xb, 0xff, 0x8, 0x100, 0x3, 0xabd1, 0x4, 0x1f66, 0xa, 0x2]}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x1}}}}]}]}, 0x488}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000001240), 0x4) futex(&(0x7f00000040c0), 0x6, 0x0, 0x0, 0x0, 0x0) 1.978302026s ago: executing program 3 (id=19): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000004c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xa1000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2}, 0x94) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x1a00404, &(0x7f0000000180)={[{@i_version}, {@nomblk_io_submit}]}, 0x1, 0xbac, &(0x7f00000017c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x1c9441, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x6, &(0x7f0000000000)=0x9, 0x8, 0x0) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = creat(&(0x7f0000000140)='./bus\x00', 0xc) write$cgroup_int(r1, &(0x7f0000000540), 0xfffffdd8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2, 0x0, 0x1ffffffffffffffd}, 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000000c00)=@newtaction={0x488, 0x30, 0x12f, 0x0, 0x0, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0xa, 0x4, 0x1, 0x5, 0x4, {0x3, 0x0, 0x101, 0x5, 0x5, 0x2}, {0x3, 0x1, 0x3ff, 0x2137, 0x5}, 0x2, 0x3, 0xeea4}}, @TCA_POLICE_RATE={0x404, 0x2, [0x80000000, 0xf2, 0x0, 0x9, 0x10001, 0x7, 0x3, 0x4, 0x3, 0x2, 0x75, 0x3, 0x8, 0x8, 0x7fffffff, 0x1800, 0x1, 0x0, 0x4, 0x6f5, 0xfffffffb, 0x5, 0x0, 0x6, 0x1000, 0x7fffffff, 0x0, 0x6, 0x2, 0x8, 0x10000, 0x5, 0x6, 0x5, 0x4, 0x7f, 0xcf, 0x1, 0x1, 0x4, 0x6, 0x1, 0x8, 0xffffffff, 0x6, 0x201, 0x9, 0x0, 0xfffffffd, 0x2, 0x5, 0x6, 0x244e0b2b, 0x2, 0x4679156e, 0x9, 0x6, 0x8000, 0x10, 0x7, 0x1cb6, 0x6, 0xe43, 0xe08, 0x8000, 0x0, 0x0, 0x7, 0x83, 0x2, 0xf, 0x3, 0x400, 0xff, 0x0, 0x95, 0x4, 0x4, 0xa, 0x800, 0x5, 0x6, 0x0, 0x1, 0x40, 0xf177, 0x8, 0x7, 0x514753e, 0x9c65, 0x2, 0x0, 0x6, 0x2, 0x7, 0x5, 0x3, 0xfeffeff2, 0x75d, 0x4, 0x9, 0x5, 0x2, 0x0, 0x8, 0x6, 0xffffff86, 0x80000000, 0x6, 0x6, 0x8, 0x0, 0x9, 0x7, 0x0, 0x7, 0x0, 0xffffffea, 0x0, 0x10, 0x7, 0x81, 0xc, 0xae, 0x0, 0xd, 0x3, 0x4, 0x4, 0x0, 0x6, 0x9, 0x2, 0x0, 0x5, 0x4, 0x3, 0x101, 0x5, 0x5, 0x7, 0x6, 0xba7b2704, 0x5, 0x500, 0x170, 0xb, 0x7, 0x5, 0x0, 0x9ab, 0xfffffffc, 0xfffffff7, 0xdbb3, 0x0, 0xf, 0x8, 0x1ff, 0xfffffffb, 0xc0000, 0x8, 0x4, 0x1, 0x3, 0xdf71, 0x9, 0x0, 0x7, 0x89, 0x9, 0x2, 0x1, 0xe4db, 0x37, 0x102, 0x40, 0x8, 0x1, 0xfffffc0f, 0x7fffffff, 0x0, 0x2, 0x3c97, 0x7, 0x9, 0x4, 0x81, 0x1000, 0x7, 0x4, 0x1000, 0x5, 0x9, 0x800, 0x8, 0x4c93, 0x5, 0xc34, 0x7, 0x7ff, 0x6e5, 0x5, 0xfffffbff, 0x9, 0x2, 0xfffffff7, 0x0, 0x5c6c34b0, 0x8, 0x8, 0x9, 0xe8, 0x2000, 0x8, 0x200, 0xb822, 0x0, 0xbc, 0x10001, 0x7, 0x800, 0x4, 0x7, 0x8, 0x9c, 0x1c, 0x2, 0x2, 0x7ff, 0x80000001, 0x1, 0x3, 0x7, 0xff, 0x80000001, 0x7, 0x1, 0x5, 0x5, 0xe7, 0x7, 0x0, 0xfffffbd9, 0x3, 0x7, 0x9, 0xb, 0xff, 0x8, 0x100, 0x3, 0xabd1, 0x4, 0x1f66, 0xa, 0x2]}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x1}}}}]}]}, 0x488}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000001240), 0x4) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1b0000000000000000000000ff03000000000000", @ANYRES32=r0, @ANYBLOB="00000000000000000000b280ba27d068664832b8", @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="040000000300"/28], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r4, 0x58, &(0x7f0000000200)}, 0x10) futex(&(0x7f00000040c0), 0x6, 0x0, 0x0, 0x0, 0x0) pwrite64(r0, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) 1.925726211s ago: executing program 2 (id=20): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0xc2f00, 0x4d, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='mm_page_free\x00', r0}, 0x18) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) 1.868835096s ago: executing program 2 (id=21): bind$rds(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41100}, 0xfffffee6) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f00000001c0), 0x1, 0x5d8, &(0x7f0000000c00)="$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") r1 = socket$inet(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="000000000000000003000000"], &(0x7f0000000200)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r4, 0x10, &(0x7f0000000740)={0x8f, 0x0, &(0x7f00000012c0)=[{&(0x7f0000000580)=""/231, 0xe7}, {&(0x7f0000000500)=""/14, 0xe}, {&(0x7f0000000840)=""/234, 0xea}, {&(0x7f0000000280)=""/64, 0x40}, {&(0x7f0000000400)=""/68, 0x44}, {&(0x7f0000000940)=""/187, 0xbb}, {&(0x7f0000000ac0)=""/138, 0x8a}, {&(0x7f0000001440)=""/174, 0xae}, {&(0x7f0000000380)=""/30, 0x1e}, {&(0x7f0000001880)=""/4096, 0x1000}], &(0x7f0000000480)=[0x8000000000000000], 0xa}, 0x20) r5 = socket(0xa, 0x2, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000240)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="480000001400030400000000000000000a3f0000", @ANYRES32=r7, @ANYBLOB="14000200ff2300000000000000000000000000011400060000000000060000000000000000000000080008000004"], 0x48}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x5, r7}) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@deltaction={0x54, 0x18, 0x1, 0x70bd2a, 0x25dfdc00, {0xa}, [@TCA_ACT_TAB={0x40, 0x1, [{0xc, 0x8f, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x37}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x44000}, 0x20040844) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES64=r3], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r9}, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x70bd2a, 0x0, {0x0, 0x0, 0x12, r10, {0x0, 0xf}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}}, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x4040, 0x0) r12 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r12, &(0x7f0000004200)='t', 0x1) sendfile(r12, r11, 0x0, 0x3ffff) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r13}, 0x10) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) 1.83652777s ago: executing program 1 (id=22): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000000c0)='kfree\x00', r1}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0x439, 0x4, 0x25dfdbfc, {0x0, 0x0, 0xe403, 0x0, 0x800, 0x610c3}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_6RD_PREFIXLEN={0x6, 0xd, 0x41}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @private=0xa010102}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x4000810) 1.579738785s ago: executing program 4 (id=23): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0xc2f00, 0x4d, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='mm_page_free\x00', r0}, 0x18) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) 1.434938729s ago: executing program 1 (id=24): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRESOCT=r3], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='kfree\x00', r5}, 0x18) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000440)='system.posix_acl_access\x00', 0x0, 0xff83, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x41aa1000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x0, &(0x7f0000000640), 0x1, 0x5a8, &(0x7f0000000680)="$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") socket(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'lo\x00'}) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000e00), &(0x7f0000000e40)=0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00'}) 1.419450961s ago: executing program 4 (id=25): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000001440), 0x0, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/113, 0x71}], 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x10) setresgid(0xee00, 0xee01, 0x0) setreuid(0x0, 0xee00) r3 = msgget$private(0x0, 0x480) msgsnd(r3, &(0x7f0000000a00)={0x1, "1ed0c436a214761fd7732fb6cb3ea28a9f48bb02eb141f79bf60b803048f88ff56c163e58fccc51656c914a2aab43c1a8f330b17e465467c2b1281717176bfd8155eb6a5f7b99be8731f4bb5065ca1d00c286692f1dbef423d804a7aed7326347d8c9b24f60fb42ca7daf28d317dd44a96e825684ee2f99dcc17aa0a5d8222ac28e071217d9556765da9db24dcdfd2fec4d502c6d1815cef885111edce9c2f39142319f5b234c707c027bcab6f1b207130c963e2071b7de4aba435ad27d2923252ce76d4a07d920a174a6fcebef85ca405dc1407d27596c1a3e02fe9756894f929aad6cfe644932fe5aae77ad0d24efc289f3d2e2c2fb1c8db334278b6b5cf2d4f1fa7d4b91061fd6da9031cc72f457d2bb19f17ec0a8d85fb3c7c32e94ed52b8bf9f8a71d295978fb78666bf68ef15f11e101cd0db8392c8d45bff0772256ebb00574423ae8306575edc31598c570b8417c8d2087e85352116dcbc28df5cd92c2047ad4471167e99c84d86309533e77dddc7ae97271df280e95be64e6dab8055b0a1248ac5a9fd496b2434c0a2e188660c05dcfd9350d0ac619519b057c08742cdf94579b121a1bc5e350f45bb69c876797d9820cd06f8d14e61c3d51f0c91eb2e8ccab11f5d3f7f53ca3b420c4c023144124391b3d054d70a7526655120e46d385a184bf930ae19d360943235f800b9658f9bd139774ca7ba27de416447438cd5ae524a3f8fe13f4d5699e4d406fc820c0a2914efdf8326e994f63ca6bb37c1cf4830e4a1f35552cbe3c72134879dfd2038969f91c237de7e8bfae14d772b20677e175772a725f9630d0000a49e6b26bc82e2ed151e69e22a02b1a9c9baf8e8806b22f34fe082ac5412396002f806ddb7d0665e9678a264a5487dcf29253943840c20ab5388735f22237681923f447386621f6aef2d7cae61723b5c3ca062de416655588751d802911ce58f8a64c149c927286338b54579b105e3e6881eb1a1302bbcf91c1fd176706744dba253a6007d7511a8d0b92a00fa04701364370e9048662a1ce71b362f64bcb2f452811d21bd64c73061c839232ae24d8df5299952eaf4eabf2db9f35f1384ded0037b6a401303cec4020dca9b729829171df72c2979695420ee007107ddd670d5c2610b95830fb5683e1e0d9365ca8b2dba742a289a9d370ae8d4c0827ce63908162d39b5243a50da528f24d93d9a987b6da7736d2129de83e324e544826bdf24ae219db40271d9e3ac283046742740de4d65b0b66d425248f42df859fb0c07e6be4f16476390ecfc3ee64157ab113af8b700ea54cada85cdede584cb8a92dbb7b338248a97237ed3ddcc72fedf5d45b4ec6390f191767ba979a75f1db73736791a6f8c9f68eec2e4170e90bac256a5a28722a956b191ffd752ddf285252ec522f4fc9d1a961553cd6db"}, 0x3fe, 0x0) msgctl$IPC_RMID(r3, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000001340)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "122d92", 0x28, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @remote, @private1}}}}}}, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x542, &(0x7f0000001a00)="$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") 854.235927ms ago: executing program 0 (id=26): bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0xb, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs(0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0xffffffffffffff34, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000008085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r2}, 0x10) ftruncate(r1, 0xc17a) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000004280)) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, 0x0) lseek(r1, 0x2000, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x2, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x800000000}, 0x0, 0x7, 0xffffffffffffffff, 0x0) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0xfe, 0x0, 0xff, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close(r3) 651.520937ms ago: executing program 2 (id=27): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x1000c16, &(0x7f0000000500), 0xff, 0x260, &(0x7f0000000980)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @private=0xa010100}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f00000001c0)='\\.\x00', &(0x7f0000000540)="5a386815adf4f3b840613054664d1cdf649acc1b64e23eec84dd90949966b6589ff6e1d443c4c4fc464b9ad6651e309085e7b1d8c7c059751b82dd81d6288b8abeabda3b90947c8d6a611fc4b17923201c9b38e623d52028a873b07c40dd685ce7bbd6a24ea5be8d00a2f2ee227bea2830d7bf505fdb7a37c0bdd7c899c0006c6bb8522d0e4ec164e26430965e3ccf958303f24b5fab007e18b8228de52aaaae0b07cd8c13b4228375e1c6c863dbf41175c46b48d95b2595b44c1514d941f0a098af8a123a165adcccaabe229d846affc3b40c866ee6e252eddedf30", 0xdc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0xc, &(0x7f0000000640)=ANY=[@ANYRES8=r5, @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000308000000b7040000000000008500000001000000952bec7a2a0c3b6e8ca6e2492427d11713d95154c1ce0a915dc5a8f12c02d548748a7bc9f8fb8c5f946fc089ed7c0d1e8da314030786f37827bb383a3fdb48afc4429a70a3fa8b1f5371a9908a3c9ffb815e187afe81c475acedb1762d6ae813e1d41c877b3f7227031436fa6947861ecd1b0b7245b9ddcc49a8f81f41789ba09c9b11090d86ecb55e94274975ce6f000000000000"], 0x0, 0x1a, 0x4, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000000c0)="010001000000000000001000015b097ead85847817353d2dbad05dd5", 0x1c, 0xfffffffffffffffd) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) write(r8, &(0x7f00000001c0)="f1", 0x1) sendfile(r8, r6, 0x0, 0x40001) sendfile(r8, r7, 0x0, 0x7ffff000) 634.651148ms ago: executing program 4 (id=28): write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x22052, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='setgroups\x00') writev(r0, &(0x7f0000003740)=[{&(0x7f00000001c0)='d', 0x1}], 0x1) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a}, 0x1c) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f00000001c0)=0x7, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000280)={@private=0xa010100, 0x1, 0x0, 0x60, 0x0, [{@private}, {@multicast2}, {@local}, {}, {}, {@local}]}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x4000000ffb, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r3}, &(0x7f0000000580), &(0x7f00000005c0)=r4}, 0x20) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x10000, &(0x7f0000000080)={[{@nobh}, {@grpquota}, {@data_err_ignore}]}, 0x3, 0x4d1, &(0x7f0000000180)="$eJzs3MFvFFUcAODfbLu0gEhFREGUAhobE1soKBy8YGLiQRMjHuTYtJUgCxjagxAiJTF4JvFuPBpvmnjVo/HkH4AHDyaGhBgugKc1szvTbndn211YWsp+X7LtezNv5r03M2/65r3OBtC3RtMfScRTEXEzIrbXo8sTjNZ/3btzZfr+nSvTsVCtnvw3qaW7m8Yz+XZbs8hYKaL0VdK0w7q5S5fPTlUqsxez+MT8uc8n5i5dfuPMuanTs6dnz08eP370yOFjb02+2X2lCvJL63V3z5cX9u5+79SND6YH8+XD2e/GerQ12F0xRldY92p3u3rsbWsIJ63H6eqaFoaODWeXdTlt/1cqB06td4GANVOtVqtD7VcvVJtda1kCbFhJrHcJgPWR/6FPn3/zzxp1PR4Lt0/UH4DSet/LPvU1g1HK0pSbnm97aTQiPln479v0EyuNQ/z1iAoAAPSdX0/kPcHm/l8pdjWkezqbQxmJiGciYkdEPBsROyPiuYha2ucj4oXmDJKIeidze2H+O5viS/n/lM0ilG71pKJtpP2/t7O5reX9v7z3FyMDWWxbRN5hnj2UHZOxKA99eqYye7jN/jetkn9j/y/9pPnnfcGsHLcGmwboZqbmpx6stq1uX4vYM9hc/2QwPXH5NE4SEbsjYk8X+x1pCJ95/fu9i5Hy8nSr17+mWjCl1/V8XJHqdxGv1c//Qiw7/0s5JivPT04MR2X20ER6FRwqzOP3P65/2C7/Vev/89/Nm7x77JeTD1vtRen539Jw/Uc+f7tU/5EkIlmcr52LqA50l8f1P7+u7Xf0YOu6B73+NyUf18J5+/pian7+4uGITcn7rcsnl7bN43n6tP5jB4vb/45sm/RIvBgR6UX8UkS8HBH7srLvj4gDEVFQtUW/vfPKZ+3WdXj9PzJp/WcK73/Lzv/SfH2HgXzjdMnA2f0377e5eXR2/o/WQmPZkuL7X7LsFtFpSR/u6AEAAMDGUIra//6XxhfDpdL4eH0MaGdsKVUuzM3vi4jzM/V3BEaiXMpHuurjweUkH/8caYhPNsWPZOPG3wxsrsXHpy9UZta78tDnttbafNLS/lP/dDnOC2xAPZhHAzao1dr/rhtrVBBgza3Q/j0CwBOuof0vtEmy4D9l4Mnk+R/6V1H7vxo/rPjugnsGbHxVbRn6mvYP/WswPloM1157LnzbFngS+fsPfanb9/q7C1SHilcNR8E3Bgw/mmJsLshrXQJpz6qHOyxHRGeJNz9IFnkXsP03PJS62+FQtK4aiJW2Srr4Hoc8kB6VVROf3tXziz//TpReXzY/LrXTcoenu0eBdbkdAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA9Nz/AQAA//9jjdaK") lsetxattr$security_selinux(&(0x7f00000001c0)='.\x00', &(0x7f0000000240), &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x1001, 0x0) 601.060451ms ago: executing program 3 (id=29): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x1000c16, &(0x7f0000000500), 0xff, 0x260, &(0x7f0000000980)="$eJzs3U9IHFccB/DfzO7Wqkux7aVQ+gdKKa0g9lboxV5aEIpIKYW2YCmllxYtWKU37SmXHJJjSIKnXCTkFpNj8CK5JARyMokHcwkkkkMkhySwYXcU/LOJxl13gvP5wDoz+ub93jDzfSPiMAEUVl9EDEVEKSL6I6ISEcnWBh9nn76NzbnupbGIWu2Hh0mjXbad2dyvNyJmI+KriFhMk/irHDG98Mvq4+XvPjs+Vfn03MLP3R09yA1rqyvfr58dOXZx+Mvp6zfvjyQxFNVtx9V+SZPvlZOIdw6j2GsiKec9AvZj9L8Lt+q5fzciPmnkvxJpZCfvxOQbi5X44syL9j354Mb7nRwr0H61WqV+D5ytAYWTRkQ1knQgIrL1NB0YyH6Hv13qSf+emPy3/8+JqfE/8p6pgHapRqx8e7nrUu+O/N8rZfkHjqjsj1IrP47O36mvrJfyHhDQER9ki/r9v/+3mc9D/qFw5B+KS/6huOQfikv+4ehp9v+mzcg/FJf8Q3HJPxSX/ENxHTj/p54d3qCAjtiafwCgWGpdB3pquP0PIgMdl/f8AwAAAAAAAAAAAAAAAAAA7DbXvTS2+WlPj+U9W1w9HbH2TdZ0d/1S433EEW82vvY8Srb1mOyrwsv9+lGLHbTofM5PX791N9/61z7Mt/7MeMTs/xExWC43rr1tF1Sycf0d3Nt7/Lzye4sFXtHOdwN8/VNn6+/0dD7f+sPLEVfq889gs/knjfcay+bzT7V+/lqs/8+TFjsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgY54HAAD//7UiauA=") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @private=0xa010100}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f00000001c0)='\\.\x00', &(0x7f0000000540)="5a386815adf4f3b840613054664d1cdf649acc1b64e23eec84dd90949966b6589ff6e1d443c4c4fc464b9ad6651e309085e7b1d8c7c059751b82dd81d6288b8abeabda3b90947c8d6a611fc4b17923201c9b38e623d52028a873b07c40dd685ce7bbd6a24ea5be8d00a2f2ee227bea2830d7bf505fdb7a37c0bdd7c899c0006c6bb8522d0e4ec164e26430965e3ccf958303f24b5fab007e18b8228de52aaaae0b07cd8c13b4228375e1c6c863dbf41175c46b48d95b2595b44c1514d941f0a098af8a123a165adcccaabe229d846affc3b40c866ee6e252eddedf30", 0xdc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0xc, &(0x7f0000000640)=ANY=[@ANYRES8=r5, @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000308000000b7040000000000008500000001000000952bec7a2a0c3b6e8ca6e2492427d11713d95154c1ce0a915dc5a8f12c02d548748a7bc9f8fb8c5f946fc089ed7c0d1e8da314030786f37827bb383a3fdb48afc4429a70a3fa8b1f5371a9908a3c9ffb815e187afe81c475acedb1762d6ae813e1d41c877b3f7227031436fa6947861ecd1b0b7245b9ddcc49a8f81f41789ba09c9b11090d86ecb55e94274975ce6f000000000000"], 0x0, 0x1a, 0x4, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100003}, 0x94) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000000c0)="010001000000000000001000015b097ead85847817353d2dbad05dd5", 0x1c, 0xfffffffffffffffd) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) write(r8, &(0x7f00000001c0)="f1", 0x1) sendfile(r8, r6, 0x0, 0x40001) sendfile(r8, r7, 0x0, 0x7ffff000) 490.931552ms ago: executing program 1 (id=30): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x1000c16, &(0x7f0000000500), 0xff, 0x260, &(0x7f0000000980)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @private=0xa010100}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f00000001c0)='\\.\x00', &(0x7f0000000540)="5a386815adf4f3b840613054664d1cdf649acc1b64e23eec84dd90949966b6589ff6e1d443c4c4fc464b9ad6651e309085e7b1d8c7c059751b82dd81d6288b8abeabda3b90947c8d6a611fc4b17923201c9b38e623d52028a873b07c40dd685ce7bbd6a24ea5be8d00a2f2ee227bea2830d7bf505fdb7a37c0bdd7c899c0006c6bb8522d0e4ec164e26430965e3ccf958303f24b5fab007e18b8228de52aaaae0b07cd8c13b4228375e1c6c863dbf41175c46b48d95b2595b44c1514d941f0a098af8a123a165adcccaabe229d846affc3b40c866ee6e252eddedf30", 0xdc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0xc, &(0x7f0000000640)=ANY=[@ANYRES8=r5, @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000308000000b7040000000000008500000001000000952bec7a2a0c3b6e8ca6e2492427d11713d95154c1ce0a915dc5a8f12c02d548748a7bc9f8fb8c5f946fc089ed7c0d1e8da314030786f37827bb383a3fdb48afc4429a70a3fa8b1f5371a9908a3c9ffb815e187afe81c475acedb1762d6ae813e1d41c877b3f7227031436fa6947861ecd1b0b7245b9ddcc49a8f81f41789ba09c9b11090d86ecb55e94274975ce6f000000000000"], 0x0, 0x1a, 0x4, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100003}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000000c0)="010001000000000000001000015b097ead85847817353d2dbad05dd5", 0x1c, 0xfffffffffffffffd) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000e80)='./bus\x00', 0x1c1002, 0x0) write(r9, &(0x7f00000001c0)="f1", 0x1) sendfile(r9, r7, 0x0, 0x40001) sendfile(r9, r8, 0x0, 0x7ffff000) 363.473755ms ago: executing program 4 (id=31): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) socket(0x10, 0x803, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xa}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf, 0x5}]}]}}, 0x0, 0x3a, 0x0, 0x8}, 0x28) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, 0x0) connect$can_bcm(r2, &(0x7f0000000140), 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kfree\x00', r4}, 0x18) r5 = shmget(0x0, 0x1000, 0xa04, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_RMID(r5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x900a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x10001}, 0x6080, 0x0, 0x700000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x4, &(0x7f00000001c0)=ANY=[], 0x88, 0x2c6, &(0x7f0000000680)="$eJzs3U9rY1UUAPDz0tc0My5SxJW4eOAsXJWpWzetMoLYlRJBXWhxMiBJGEih4Aim8yFc6ufwI7hx4xcQwa3gri5Gn7x/TWJfM7VTU3R+v0V7c+85957k0nSVk09fmYzuP0zi8enP0fspic5e7MWfSWxHJxonkcZ5bXMAwH/B73kev+VXyUw7118NALAO1f//yk3XAgCsx/sffvTu/sHBvfeyrHycDJLi50mzvv8gPo9xDONu9ONJRH6mGr/9zsG9SLPCdmxGxOB4EDH55Icm/9eIMn83+rNoz9/NKnFnMjuu8mfHg824HVnsP9hsSunHS+35r7fkx6Abr726UP9O9OPHz+JhjON+Wcc8/6vdLHsr//r0y4+LY4r8pBODrTJuLt8of91az70AAAAAAAAAAAAAAAAAAAAAAPD/tpNlSdW+J9uOO5Niqu6/s/GkXN+pm+tkaSz356nyk2ajqj9Q3rT4meXxTdNf526WZXkdOM9P4+XUlwgAAAAAAAAAAAAAAAAAAABA4eiLR6PD8Xg4vZZB0w2g+Vj/VffZm89sLZXbElwGdC911mK3gaLWlcGRprF6w9O88vTn1WkObY+5NV/qXhTzzwdb88v9IKpBczHPtHP+t7t48c3q8aPRYVbHNC/y6DB52lm9Zp/vFpe68awvQl5WuLW8T/TOSi1ejZOiwnKpe01/Bd0XWpf+yPP8cvu88Ut1R/VMUrbYuNzpm/VgIX05pnf+Lr6/eMML3zI2rv5uAwAAAAAAAAAAAAAAAAAArFJ+1vf2t8PpUcvi45WpnX+tKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABYs/L7/8fj4fRs0IuI5Zlzg1mdvCqmHnRjenTDTxEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDnwF8BAAD//0JgRcc=") r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r6, &(0x7f0000000480)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r7, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) r8 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r8, &(0x7f00000003c0)=ANY=[@ANYBLOB="00070000420091"], 0xfe33) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) 0s ago: executing program 4 (id=32): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000001440), 0x0, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/113, 0x71}], 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x10) setresgid(0xee00, 0xee01, 0x0) r3 = msgget$private(0x0, 0x480) msgsnd(r3, &(0x7f0000000a00)={0x1, "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"}, 0x205, 0x0) msgctl$IPC_RMID(r3, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000001340)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "122d92", 0x28, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @remote, @private1}}}}}}, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000340)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x542, &(0x7f0000001a00)="$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") kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.7' (ED25519) to the list of known hosts. [ 28.464538][ T29] audit: type=1400 audit(1761214664.914:62): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.487538][ T29] audit: type=1400 audit(1761214664.944:63): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.488547][ T3302] cgroup: Unknown subsys name 'net' [ 28.515269][ T29] audit: type=1400 audit(1761214664.964:64): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.646554][ T3302] cgroup: Unknown subsys name 'cpuset' [ 28.652927][ T3302] cgroup: Unknown subsys name 'rlimit' [ 28.803849][ T29] audit: type=1400 audit(1761214665.254:65): avc: denied { setattr } for pid=3302 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.827125][ T29] audit: type=1400 audit(1761214665.254:66): avc: denied { create } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.847583][ T29] audit: type=1400 audit(1761214665.254:67): avc: denied { write } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.868102][ T29] audit: type=1400 audit(1761214665.254:68): avc: denied { read } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 28.888396][ T29] audit: type=1400 audit(1761214665.274:69): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.897323][ T3306] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 28.913164][ T29] audit: type=1400 audit(1761214665.274:70): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 28.944951][ T29] audit: type=1400 audit(1761214665.374:71): avc: denied { relabelto } for pid=3306 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.986692][ T3302] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 30.171877][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 30.256766][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 30.275277][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 30.312762][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.320034][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.327288][ T3314] bridge_slave_0: entered allmulticast mode [ 30.333685][ T3314] bridge_slave_0: entered promiscuous mode [ 30.342361][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.349456][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.356681][ T3314] bridge_slave_1: entered allmulticast mode [ 30.363088][ T3314] bridge_slave_1: entered promiscuous mode [ 30.379806][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 30.400795][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.421355][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 30.430933][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.450714][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.457860][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.464959][ T3315] bridge_slave_0: entered allmulticast mode [ 30.471341][ T3315] bridge_slave_0: entered promiscuous mode [ 30.494756][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.501918][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.509134][ T3315] bridge_slave_1: entered allmulticast mode [ 30.515418][ T3315] bridge_slave_1: entered promiscuous mode [ 30.553917][ T3314] team0: Port device team_slave_0 added [ 30.569465][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.580118][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.589891][ T3314] team0: Port device team_slave_1 added [ 30.595630][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.602769][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.609982][ T3312] bridge_slave_0: entered allmulticast mode [ 30.616408][ T3312] bridge_slave_0: entered promiscuous mode [ 30.640957][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.648040][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.655196][ T3312] bridge_slave_1: entered allmulticast mode [ 30.661654][ T3312] bridge_slave_1: entered promiscuous mode [ 30.683093][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.690101][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.716003][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.727168][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.734115][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.760113][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.785530][ T3315] team0: Port device team_slave_0 added [ 30.793895][ T3315] team0: Port device team_slave_1 added [ 30.804585][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.811681][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.818909][ T3320] bridge_slave_0: entered allmulticast mode [ 30.825166][ T3320] bridge_slave_0: entered promiscuous mode [ 30.831753][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.838960][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.846200][ T3319] bridge_slave_0: entered allmulticast mode [ 30.852577][ T3319] bridge_slave_0: entered promiscuous mode [ 30.859798][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.866893][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.873979][ T3319] bridge_slave_1: entered allmulticast mode [ 30.880555][ T3319] bridge_slave_1: entered promiscuous mode [ 30.892695][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.906474][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.913532][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.920913][ T3320] bridge_slave_1: entered allmulticast mode [ 30.927293][ T3320] bridge_slave_1: entered promiscuous mode [ 30.944850][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.954321][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.961354][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.987318][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.018207][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.025159][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.051119][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.068113][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.078347][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.088489][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.106748][ T3314] hsr_slave_0: entered promiscuous mode [ 31.112813][ T3314] hsr_slave_1: entered promiscuous mode [ 31.120047][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.139798][ T3312] team0: Port device team_slave_0 added [ 31.151911][ T3320] team0: Port device team_slave_0 added [ 31.158604][ T3312] team0: Port device team_slave_1 added [ 31.191641][ T3320] team0: Port device team_slave_1 added [ 31.203509][ T3319] team0: Port device team_slave_0 added [ 31.215836][ T3315] hsr_slave_0: entered promiscuous mode [ 31.221752][ T3315] hsr_slave_1: entered promiscuous mode [ 31.227733][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 31.233461][ T3315] Cannot create hsr debugfs directory [ 31.250922][ T3319] team0: Port device team_slave_1 added [ 31.268645][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.275663][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.301616][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.314892][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.321955][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.347872][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.363577][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.370575][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.396579][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.407556][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.414495][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.440444][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.453555][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.460625][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.486598][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.507745][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.514701][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.540755][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.607002][ T3312] hsr_slave_0: entered promiscuous mode [ 31.613042][ T3312] hsr_slave_1: entered promiscuous mode [ 31.619005][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 31.624740][ T3312] Cannot create hsr debugfs directory [ 31.642678][ T3319] hsr_slave_0: entered promiscuous mode [ 31.648857][ T3319] hsr_slave_1: entered promiscuous mode [ 31.654648][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 31.660388][ T3319] Cannot create hsr debugfs directory [ 31.668108][ T3320] hsr_slave_0: entered promiscuous mode [ 31.674106][ T3320] hsr_slave_1: entered promiscuous mode [ 31.680206][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 31.685955][ T3320] Cannot create hsr debugfs directory [ 31.840390][ T3314] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 31.851328][ T3314] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 31.866777][ T3314] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 31.875636][ T3314] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 31.897510][ T3315] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 31.910965][ T3315] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 31.923151][ T3315] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 31.932618][ T3315] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 31.966008][ T3320] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 31.977481][ T3320] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 31.993433][ T3320] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 32.003018][ T3320] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 32.032391][ T3319] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 32.046700][ T3319] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 32.062087][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.069333][ T3319] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 32.083354][ T3319] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 32.107966][ T3312] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 32.117115][ T3312] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 32.132552][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.139619][ T3312] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 32.148700][ T3312] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 32.164356][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.174064][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.181138][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.209468][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.219903][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.226971][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.237535][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.254410][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.261548][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.270866][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.277926][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.313289][ T3314] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 32.323729][ T3314] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.349167][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.371141][ T266] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.378324][ T266] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.390304][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.404741][ T266] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.411814][ T266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.429671][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.438866][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.462860][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.485234][ T266] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.492419][ T266] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.503100][ T266] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.510207][ T266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.520503][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.530260][ T266] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.537332][ T266] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.557564][ T266] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.564747][ T266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.582577][ T3319] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 32.592995][ T3319] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.626562][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.661078][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.722401][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.775470][ T3314] veth0_vlan: entered promiscuous mode [ 32.795341][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.803908][ T3314] veth1_vlan: entered promiscuous mode [ 32.841824][ T3315] veth0_vlan: entered promiscuous mode [ 32.871633][ T3314] veth0_macvtap: entered promiscuous mode [ 32.882157][ T3315] veth1_vlan: entered promiscuous mode [ 32.905737][ T3319] veth0_vlan: entered promiscuous mode [ 32.913133][ T3314] veth1_macvtap: entered promiscuous mode [ 32.924865][ T3319] veth1_vlan: entered promiscuous mode [ 32.940869][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.954371][ T3315] veth0_macvtap: entered promiscuous mode [ 32.971513][ T3319] veth0_macvtap: entered promiscuous mode [ 32.981114][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.992821][ T3312] veth0_vlan: entered promiscuous mode [ 33.007995][ T3315] veth1_macvtap: entered promiscuous mode [ 33.018811][ T3450] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.027995][ T3450] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.036941][ T3312] veth1_vlan: entered promiscuous mode [ 33.043599][ T3319] veth1_macvtap: entered promiscuous mode [ 33.050620][ T3450] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.063606][ T3450] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.072539][ T3320] veth0_vlan: entered promiscuous mode [ 33.084473][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.098533][ T3320] veth1_vlan: entered promiscuous mode [ 33.118135][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.128790][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.140056][ T3320] veth0_macvtap: entered promiscuous mode [ 33.152909][ T3314] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 33.170024][ T3312] veth0_macvtap: entered promiscuous mode [ 33.177289][ T314] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.187077][ T3312] veth1_macvtap: entered promiscuous mode [ 33.194449][ T3320] veth1_macvtap: entered promiscuous mode [ 33.205151][ T314] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.220288][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.221113][ T3483] loop2: detected capacity change from 0 to 128 [ 33.241245][ T314] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.242369][ T3483] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 33.250471][ T314] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.273201][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.281940][ T3483] ext4 filesystem being mounted at /0/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 33.284115][ T31] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.303645][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.318716][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.330191][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.338536][ T31] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.364466][ T31] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.394644][ T31] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.431618][ T31] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.462516][ T31] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.477924][ T31] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.509389][ T31] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.534383][ T31] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.566438][ T31] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.575368][ T31] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.585151][ T31] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.596507][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 33.596522][ T29] audit: type=1400 audit(1761214670.054:108): avc: denied { write } for pid=3504 comm="syz.3.4" name="001" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 33.627204][ T3505] loop1: detected capacity change from 0 to 1024 [ 33.634920][ T29] audit: type=1400 audit(1761214670.084:109): avc: denied { map } for pid=3504 comm="syz.3.4" path="/dev/bus/usb/006/001" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 33.687746][ T3505] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 33.710874][ T29] audit: type=1400 audit(1761214670.164:110): avc: denied { create } for pid=3507 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 33.734190][ T3505] IPv6: NLM_F_CREATE should be specified when creating new route [ 33.755564][ T29] audit: type=1400 audit(1761214670.164:111): avc: denied { ioctl } for pid=3507 comm="syz.0.6" path="socket:[3889]" dev="sockfs" ino=3889 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 33.779727][ T3506] usb usb6: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 33.779742][ T29] audit: type=1400 audit(1761214670.174:112): avc: denied { connect } for pid=3507 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 33.787311][ T3506] vhci_hcd: invalid port number 96 [ 33.811525][ T3506] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 33.872618][ T29] audit: type=1400 audit(1761214670.304:113): avc: denied { write } for pid=3504 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.892718][ T29] audit: type=1400 audit(1761214670.304:114): avc: denied { read } for pid=3504 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.928644][ T29] audit: type=1400 audit(1761214670.374:115): avc: denied { open } for pid=3507 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 33.947572][ T29] audit: type=1400 audit(1761214670.374:116): avc: denied { kernel } for pid=3507 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 33.966957][ T29] audit: type=1400 audit(1761214670.374:117): avc: denied { create } for pid=3504 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 33.989775][ T3516] loop0: detected capacity change from 0 to 256 [ 34.071070][ T3516] FAT-fs (loop0): bogus sectors per cluster 223 [ 34.077429][ T3516] FAT-fs (loop0): Can't find a valid FAT filesystem [ 34.162978][ C0] hrtimer: interrupt took 36067 ns [ 34.208169][ T3527] loop0: detected capacity change from 0 to 256 [ 34.229936][ T3529] syz.3.8 uses obsolete (PF_INET,SOCK_PACKET) [ 34.247728][ T3527] FAT-fs (loop0): bogus sectors per cluster 223 [ 34.254367][ T3527] FAT-fs (loop0): Can't find a valid FAT filesystem [ 34.280197][ T3529] loop3: detected capacity change from 0 to 512 [ 34.300554][ T3314] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 34.313404][ T3529] EXT4-fs: Ignoring removed nobh option [ 34.337817][ T3529] EXT4-fs error (device loop3): ext4_orphan_get:1392: inode #15: comm syz.3.8: iget: bad i_size value: 38620345925642 [ 34.366627][ T3529] EXT4-fs error (device loop3): ext4_orphan_get:1397: comm syz.3.8: couldn't read orphan inode 15 (err -117) [ 34.386777][ T3529] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 34.413128][ T3535] loop4: detected capacity change from 0 to 128 [ 34.468226][ T3529] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 34.508264][ T3529] EXT4-fs error (device loop3): ext4_validate_block_bitmap:432: comm syz.3.8: bg 0: block 5: invalid block bitmap [ 34.547419][ T3533] loop2: detected capacity change from 0 to 512 [ 34.564711][ T3312] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.579227][ T3527] syz.0.7 (3527) used greatest stack depth: 9928 bytes left [ 34.587246][ T3533] EXT4-fs warning (device loop2): ext4_enable_quotas:7180: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 34.633893][ T3319] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.660043][ T3542] loop1: detected capacity change from 0 to 128 [ 34.671119][ T3533] EXT4-fs (loop2): mount failed [ 34.705038][ T3542] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 34.757426][ T3542] ext4 filesystem being mounted at /1/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 34.776970][ T3554] loop3: detected capacity change from 0 to 512 [ 34.783638][ T3554] EXT4-fs: Ignoring removed nobh option [ 34.802757][ T3554] EXT4-fs error (device loop3): ext4_orphan_get:1392: inode #15: comm syz.3.12: iget: bad i_size value: 38620345925642 [ 34.847497][ T3554] EXT4-fs error (device loop3): ext4_orphan_get:1397: comm syz.3.12: couldn't read orphan inode 15 (err -117) [ 34.907555][ T3552] loop0: detected capacity change from 0 to 256 [ 34.939109][ T3552] FAT-fs (loop0): bogus sectors per cluster 223 [ 34.945858][ T3552] FAT-fs (loop0): Can't find a valid FAT filesystem [ 34.953239][ T3554] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.009124][ T3547] EXT4-fs error (device loop3): ext4_validate_block_bitmap:432: comm syz.3.12: bg 0: block 5: invalid block bitmap [ 35.038162][ T3319] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.272887][ T3563] loop4: detected capacity change from 0 to 256 [ 35.367621][ T3563] FAT-fs (loop4): bogus sectors per cluster 223 [ 35.374373][ T3563] FAT-fs (loop4): Can't find a valid FAT filesystem [ 35.513571][ T3567] loop0: detected capacity change from 0 to 4096 [ 35.522461][ T3567] EXT4-fs: Ignoring removed i_version option [ 35.528626][ T3567] EXT4-fs: Ignoring removed nomblk_io_submit option [ 35.603615][ T3567] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.816296][ T3587] loop2: detected capacity change from 0 to 1024 [ 35.825936][ T3312] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 35.861338][ T3581] loop3: detected capacity change from 0 to 4096 [ 35.870840][ T3581] EXT4-fs: Ignoring removed i_version option [ 35.876882][ T3581] EXT4-fs: Ignoring removed nomblk_io_submit option [ 35.907359][ T3581] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.099565][ T3587] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.151661][ T3587] IPv6: NLM_F_CREATE should be specified when creating new route [ 36.411362][ T3602] loop4: detected capacity change from 0 to 512 [ 36.444575][ T3602] EXT4-fs warning (device loop4): ext4_enable_quotas:7180: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 36.562368][ T3611] loop1: detected capacity change from 0 to 512 [ 36.872171][ T3611] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.885691][ T3315] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.902326][ T3602] EXT4-fs (loop4): mount failed [ 37.010701][ T3314] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.059386][ T3618] loop4: detected capacity change from 0 to 512 [ 37.070363][ T3618] EXT4-fs: Ignoring removed nobh option [ 37.077584][ T3620] loop2: detected capacity change from 0 to 128 [ 37.089275][ T3618] EXT4-fs error (device loop4): ext4_orphan_get:1392: inode #15: comm syz.4.28: iget: bad i_size value: 38620345925642 [ 37.103355][ T3319] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.122763][ T3618] EXT4-fs error (device loop4): ext4_orphan_get:1397: comm syz.4.28: couldn't read orphan inode 15 (err -117) [ 37.135046][ T3620] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 37.149388][ T3620] ext4 filesystem being mounted at /5/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 37.168543][ T3312] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.179143][ T3618] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 37.195995][ T3618] EXT4-fs error (device loop4): ext4_validate_block_bitmap:432: comm syz.4.28: bg 0: block 5: invalid block bitmap [ 37.219493][ T3625] loop3: detected capacity change from 0 to 128 [ 37.228965][ T3628] loop1: detected capacity change from 0 to 128 [ 37.228946][ T3625] EXT4-fs (loop3): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 37.234306][ T3625] ext4 filesystem being mounted at /5/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 37.259573][ T3628] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 37.272873][ T3628] ext4 filesystem being mounted at /4/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 37.299067][ T3320] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.381404][ T3632] loop4: detected capacity change from 0 to 256 [ 37.399368][ T3632] FAT-fs (loop4): bogus sectors per cluster 223 [ 37.406350][ T3632] FAT-fs (loop4): Can't find a valid FAT filesystem [ 37.762673][ T3637] loop4: detected capacity change from 0 to 512 [ 37.781410][ T3625] ================================================================== [ 37.789524][ T3625] BUG: KCSAN: data-race in file_write_and_wait_range / xas_set_mark [ 37.797545][ T3625] [ 37.799883][ T3625] write to 0xffff888100781844 of 4 bytes by task 3633 on cpu 1: [ 37.807521][ T3625] xas_set_mark+0x12b/0x140 [ 37.812242][ T3625] __folio_start_writeback+0x155/0x390 [ 37.817750][ T3625] ext4_bio_write_folio+0x5ad/0x9f0 [ 37.822989][ T3625] mpage_process_page_bufs+0x4a1/0x620 [ 37.828500][ T3625] mpage_prepare_extent_to_map+0x786/0xc00 [ 37.834331][ T3625] ext4_do_writepages+0xa05/0x2750 [ 37.839443][ T3625] ext4_writepages+0x176/0x300 [ 37.844232][ T3625] do_writepages+0x1c6/0x310 [ 37.848842][ T3625] file_write_and_wait_range+0x156/0x2c0 [ 37.854505][ T3625] generic_buffers_fsync_noflush+0x45/0x120 [ 37.860414][ T3625] ext4_sync_file+0x1ab/0x690 [ 37.865104][ T3625] vfs_fsync_range+0x10d/0x130 [ 37.869890][ T3625] ext4_buffered_write_iter+0x34f/0x3c0 [ 37.875449][ T3625] ext4_file_write_iter+0x387/0xf60 [ 37.880659][ T3625] iter_file_splice_write+0x666/0xa60 [ 37.886057][ T3625] direct_splice_actor+0x156/0x2a0 [ 37.891176][ T3625] splice_direct_to_actor+0x312/0x680 [ 37.896560][ T3625] do_splice_direct+0xda/0x150 [ 37.901330][ T3625] do_sendfile+0x380/0x650 [ 37.905776][ T3625] __x64_sys_sendfile64+0x105/0x150 [ 37.910992][ T3625] x64_sys_call+0x2bb4/0x3000 [ 37.915679][ T3625] do_syscall_64+0xd2/0x200 [ 37.920192][ T3625] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.926091][ T3625] [ 37.928420][ T3625] read to 0xffff888100781844 of 4 bytes by task 3625 on cpu 0: [ 37.935964][ T3625] file_write_and_wait_range+0x10e/0x2c0 [ 37.941609][ T3625] generic_buffers_fsync_noflush+0x45/0x120 [ 37.947510][ T3625] ext4_sync_file+0x1ab/0x690 [ 37.952210][ T3625] vfs_fsync_range+0x10d/0x130 [ 37.956982][ T3625] ext4_buffered_write_iter+0x34f/0x3c0 [ 37.962530][ T3625] ext4_file_write_iter+0x387/0xf60 [ 37.967730][ T3625] iter_file_splice_write+0x666/0xa60 [ 37.973119][ T3625] direct_splice_actor+0x156/0x2a0 [ 37.978235][ T3625] splice_direct_to_actor+0x312/0x680 [ 37.983629][ T3625] do_splice_direct+0xda/0x150 [ 37.988398][ T3625] do_sendfile+0x380/0x650 [ 37.992825][ T3625] __x64_sys_sendfile64+0x105/0x150 [ 37.998043][ T3625] x64_sys_call+0x2bb4/0x3000 [ 38.002742][ T3625] do_syscall_64+0xd2/0x200 [ 38.007246][ T3625] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 38.013140][ T3625] [ 38.015458][ T3625] value changed: 0x0a000021 -> 0x04000021 [ 38.021169][ T3625] [ 38.023486][ T3625] Reported by Kernel Concurrency Sanitizer on: [ 38.029649][ T3625] CPU: 0 UID: 0 PID: 3625 Comm: syz.3.29 Not tainted syzkaller #0 PREEMPT(voluntary) [ 38.039194][ T3625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 38.049258][ T3625] ================================================================== [ 38.118157][ T3637] EXT4-fs warning (device loop4): ext4_enable_quotas:7180: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 38.148236][ T3637] EXT4-fs (loop4): mount failed [ 38.255250][ T3314] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 38.267442][ T3319] EXT4-fs (loop3): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 38.308787][ T3312] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09.