last executing test programs: 1.806039562s ago: executing program 0 (id=1): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={r1, 0xb}, 0x8) 1.750069385s ago: executing program 0 (id=6): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000280)=""/230) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000040)={0x3ffffffffffffe96, &(0x7f0000000000)=[{0x2000, 0x5}]}) 1.63133859s ago: executing program 0 (id=7): openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) r0 = socket(0x9, 0x3, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x8205, &(0x7f0000000080)={[{@user_xattr}]}, 0x81, 0x633, &(0x7f0000000600)="$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") r1 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x4, 0xb8, 0x5, 0x0, 0x0, 0xe, 0x2000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x200, 0x1, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x8, 0x9, 0x8, 0x1ff, 0x2, 0x80, 0x0, 0x9, 0x0, 0x401}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r3, 0x0, 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x18) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_mount_image$iso9660(&(0x7f0000000500), &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000040)={[{@showassoc}, {@check_relaxed}]}, 0x3, 0x54c, &(0x7f0000000ac0)="$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") prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x9, 0x7ffc0000}]}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[], 0x48) r6 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={r4, 0x20, &(0x7f0000000540)={&(0x7f0000000c40)=""/195, 0xc3, 0x0, &(0x7f0000000d40)=""/208, 0xd0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x1c, 0x16, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x101}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @alu={0x4, 0x1, 0x4, 0x2, 0x1, 0x18, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000280)='syzkaller\x00', 0x7f41, 0xee, &(0x7f00000003c0)=""/238, 0x41000, 0x10, '\x00', 0x0, @fallback=0x12, r4, 0x8, &(0x7f00000004c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xb, 0x7, 0x7}, 0x10, r7, r5, 0x3, 0x0, &(0x7f0000000e40)=[{0x1, 0x1, 0xf, 0x9}, {0x0, 0x1, 0x2, 0x5}, {0x5, 0x2, 0x3, 0x7}], 0x10, 0xbdb}, 0x94) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000000100)=""/24, 0x18}, {0x0, 0x63}], 0x2, 0x0, 0x20) sendmsg$nl_route(r0, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8862504}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)=@ipv6_deladdr={0x3c, 0x15, 0x400, 0x70bd29, 0x25dfdbfc, {0xa, 0x10, 0x41, 0xfd}, [@IFA_FLAGS={0x8, 0x8, 0x2e}, @IFA_RT_PRIORITY={0x8, 0x9, 0x401}, @IFA_LOCAL={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast2}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004080}, 0x41) 1.429092709s ago: executing program 4 (id=5): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000a80)='kfree\x00', r0}, 0x18) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r1}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) mbind(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4005, 0x0, 0x6, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000480)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000080)='sys_enter\x00', r3}, 0x10) fstatfs(0xffffffffffffffff, 0x0) madvise(&(0x7f0000cf6000/0x4000)=nil, 0x4000, 0x16) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000680)='./file0\x00', 0x0, &(0x7f0000000b80)={[{@usrquota}, {@resgid}], [{@seclabel}]}, 0x21, 0x4bd, &(0x7f00000006c0)="$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") r4 = socket$unix(0x1, 0x5, 0x0) bind$unix(r4, &(0x7f0000000180)=@file={0x1, './file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, 0x6e) r5 = epoll_create1(0x0) epoll_pwait2(r5, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CREATE(0xffffffffffffffff, 0xc02054a5, &(0x7f00000002c0)={0x0, r2, 'id1\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) timerfd_gettime(r6, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_read_part_table(0x1052, &(0x7f0000001080)="$eJzsz8GJwkAYBeCXbDYbWBBL0LM3O4g9pAUPVqGdeNGDTY4YEi+eBYXvY3jMMI8f/vAJDmOWUkrqPM7ptfM/X37G/GuT42p9Hvo66arpb5nLbpNmu0g31/s2+/o55fdaZXo1GW5v2wgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAvsg9AAD//wx9Ctc=") r8 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(0xffffffffffffffff, 0x942e, 0x0) ioctl$TCFLSH(r8, 0x5608, 0x3) sendmmsg$unix(r7, &(0x7f00000bd000), 0x318, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r7, &(0x7f0000000100)={0x20002017}) r9 = syz_open_dev$sg(&(0x7f00000000c0), 0x3, 0x40000) ioctl$SG_GET_RESERVED_SIZE(r9, 0x2272, &(0x7f0000000140)) close_range(r5, 0xffffffffffffffff, 0x0) 1.411822549s ago: executing program 2 (id=3): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="f100000000000000000000000000000071123f000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) 1.37285483s ago: executing program 1 (id=8): utime(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)={0x3, 0x1}) 1.337775582s ago: executing program 2 (id=9): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x5, 0x1a19, &(0x7f0000000d00)) getgroups(0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) read$ptp(r4, &(0x7f0000000040)=""/152, 0x98) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{}, 0x3548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffffd}}}}]}, 0x78}}, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x19b1, 0xff, 0x0, 0x0, 0x400, 0x5, 0x103, 0x2, 0x0, 0xa00, 0x5, 0x0, 0x0, 0xfffffffffffffffe, 0x8001, 0x0, 0x100000000, 0x0, 0xe, 0x0, 0x2, 0xea, 0x0, 0x0, 0x6}) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newtfilter={0x7c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x4c, 0x2, [@TCA_BASIC_EMATCHES={0x48, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xffff}}, @TCA_EMATCH_TREE_LIST={0x3c, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x10, 0x1, 0x0, 0x0, {{}, {0x0, 0x0, 0x1}}}, @TCF_EM_META={0x23, 0x2, 0x0, 0x0, {{0x0, 0x4, 0x4}, [@TCA_EM_META_HDR={0xc}, @TCA_EM_META_RVALUE={0x7, 0x3, [@TCF_META_TYPE_VAR="043f51"]}, @TCA_EM_META_LVALUE={0x5, 0x2, [@TCF_META_TYPE_VAR='3', @TCF_META_TYPE_VAR]}]}}]}]}]}}]}, 0x7c}}, 0x0) 1.326503063s ago: executing program 1 (id=10): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x40) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[], 0x80}}, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xb}, 0x94) r2 = syz_io_uring_setup(0x10d4, &(0x7f0000000000)={0x0, 0xa9eb, 0x8, 0x0, 0x34f}, &(0x7f00000000c0)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', &(0x7f0000002440)='system.posix_acl_default\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYBLOB="02", @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYBLOB="040000000000800008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="100000000000000020"], 0x5c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) lgetxattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000140)=""/246, 0xf6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000004c0)={0x0, &(0x7f0000000500)}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8}) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000002, 0x4008032, 0xffffffffffffffff, 0x0) io_uring_enter(r2, 0x47bc, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) syz_io_uring_setup(0x7c87, &(0x7f0000000e40)={0x0, 0x4caf, 0x80, 0xfffffffe, 0x235}, &(0x7f0000000d40), &(0x7f0000000cc0)) sendmmsg$unix(r8, &(0x7f0000000000), 0x400000000000041, 0x30000000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r9, @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0x94) 1.307037094s ago: executing program 0 (id=11): r0 = socket$kcm(0x2, 0x200000000000001, 0x106) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="14"], &(0x7f0000001300), 0x600) setsockopt$sock_attach_bpf(r0, 0x1, 0x31, &(0x7f0000000000), 0x4) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./bus\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], 0xfe, 0x2b7, &(0x7f0000001340)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x4842, 0x1cb) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000001200)="10", 0x64000}], 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x531, &(0x7f0000000640)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x4000054) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) 1.004540447s ago: executing program 3 (id=4): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000500000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x2}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) socketpair(0x0, 0xa, 0x1, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'team0\x00', 0x0}) socket$key(0xf, 0x3, 0x2) connect$packet(r3, &(0x7f0000000a00)={0x11, 0x24, r4, 0x1, 0x8, 0x6, @broadcast}, 0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x6, 0xfc, 0x0, 0x0, 0x0, 0x12524, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x1, @perf_bp={0x0, 0x3}, 0x0, 0xc8, 0x0, 0x1, 0x100000000000008, 0x0, 0x6, 0x0, 0x8, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r6, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57bea000000000000000000000000ac1414aa"], 0xfdef) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$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") r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='ext4_da_write_pages_extent\x00', r10, 0x0, 0x8}, 0x18) r11 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x101042, 0x137) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) pwrite64(r11, &(0x7f0000000140)='2', 0xfdef, 0xfecc) r12 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$tipc(r12, &(0x7f00000005c0)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x2, {0x4e20, 0x2}}, 0x10, 0x0}, 0x48050) recvmsg(r12, &(0x7f0000000900)={&(0x7f00000005c0)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/226, 0xe2}, {&(0x7f0000000740)=""/75, 0x4b}], 0x2, &(0x7f0000000800)=""/233, 0xe9}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0xe, &(0x7f0000000280)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x39e}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0x6, 0x1, 0x0, r0}, @jmp={0x5, 0x0, 0x2, 0x9, 0x5, 0x80, 0x8}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x40}], &(0x7f0000000000)='syzkaller\x00', 0x3, 0xd9, &(0x7f0000000300)=""/217, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x6, 0x7ff, 0x9}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000440)=[r0, r0, r0, r0, r0], &(0x7f0000000480)=[{0x0, 0x4, 0xd, 0x9}, {0x0, 0x4, 0x2, 0xa}, {0x4, 0x1, 0x9, 0x6}, {0x0, 0x4, 0xc, 0x3}, {0x4, 0x1, 0x8, 0x8}], 0x10, 0x8001}, 0x94) 929.94698ms ago: executing program 2 (id=12): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000680)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x80, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x54, 0x4, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, @target={{0xb}, @val={0x40, 0x2, 0x0, 0x1, [@NFTA_TARGET_INFO={0x2c, 0x3, "7339f2f10455afb9fdd672bad09dfb78c7699c74e891a0c7f5ffffff00"/40}, @NFTA_TARGET_REV={0x8}, @NFTA_TARGET_NAME={0x8, 0x1, 'LED\x00'}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0xa8}, 0x1, 0x0, 0x0, 0x4000880}, 0x20040040) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xc4}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000002c0)="2f913af8afcc4c003e0a3a589c2215fc7ddd9a770b3eea38685902bc465f77892ee516665943a209dc1dddeaaa3b55854bc9989dafdda37cae4d301b877f4cfee9e57ff8e1c91b7e4eeabdf81049f7c15e0f3e763c196a8a0284c697d44860974f39af1cbdded7796a3f0c479eef98c3d13f99faaefa43758153b226ade7896335d51db79693b208b4841e6835450591ca1d89a2fe7f33978ff7187b32fe1bab9c1f498995ff5c937203987181e3", 0xae}, {&(0x7f0000000200)="2b52f2d6c0778ead559851eab05f69973061850755a796d3da96e3a9167f99322e60bc7409c8832a9f7515da7e82bf5ff75ef80b523183df686b6cd1590445eea1933d13d5406cd7dc435b121c3cc6c88e689b2961f7daa4a06645c167dca0c7", 0x60}, {&(0x7f0000000380)="c4581dddc9fce654cb2879bd998be82ee21bd7ca16cf6f7c9652966658d3dde0ae6b2ebf372c47e09dcf6a55b982246f263f5e3c5044e9de2289d7ea32fd2335e04129bb39341165ab4f05553886a0da2010e9aa2538e5", 0x57}], 0x3, 0x101, 0x101) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f0000000280)='./file0\x00', 0x14806, &(0x7f0000000b00)=ANY=[@ANYBLOB="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", @ANYRESHEX], 0x1, 0x6fd, &(0x7f0000000c40)="$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") r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x90) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0xffec, &(0x7f0000000580)={&(0x7f0000000300)=@newqdisc={0x130, 0x24, 0x4ee4e6a52ff56541, 0x8000000, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xfff7}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x100, 0x2, {{0xfffffffe, 0x2, 0x40, 0x7, 0xe9, 0xcc36}, [@TCA_NETEM_LOSS={0xb4, 0x5, 0x0, 0x1, [@NETEM_LOSS_GI={0x18, 0x1, {0x40, 0xf, 0xa, 0x4006559, 0x8}}, @NETEM_LOSS_GE={0x73, 0x2, {0x5, 0xfffffffa, 0xa, 0x4}}, @NETEM_LOSS_GE={0x13, 0x2, {0x1, 0x400, 0x1, 0x8}}, @NETEM_LOSS_GI={0x18, 0x1, {0xcfbb, 0x2, 0x0, 0x8, 0x1}}, @NETEM_LOSS_GI={0x0, 0x1, {0x0, 0x4, 0x9de, 0x9, 0xb502}}, @NETEM_LOSS_GI={0x8, 0x1, {0x8, 0x0, 0xfffff001, 0xf6, 0x3}}, @NETEM_LOSS_GI={0x18, 0x1, {0x7, 0x3, 0x5, 0x4, 0xea}}, @NETEM_LOSS_GE={0x14, 0x2, {0x2, 0x3, 0x0, 0x6}}]}, @TCA_NETEM_CORRUPT={0xc, 0x4, {0x8, 0x1000}}, @TCA_NETEM_CORRUPT={0xc, 0x4, {0xbba5, 0xae}}, @TCA_NETEM_LATENCY64={0xc, 0xa, 0x100020}, @TCA_NETEM_LATENCY64={0xc, 0xa, 0x1}]}}}]}, 0x130}}, 0x0) getdents64(r3, &(0x7f0000000f80)=""/4096, 0x1000) utime(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)={0x3, 0x1}) 632.985453ms ago: executing program 2 (id=13): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x2000000b, 0xe0, 0x0, 0x0, 0x6, 0x7d, 0x0, 0x3, 0x101, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x100000001}, 0x18) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2716, 0x0, &(0x7f0000000000)) r4 = socket$netlink(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000002c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000002000fbdbdf2525003e479c1b54845d23e92ce4a5e63325c200000e0001006e315ef9657464657673696d00"], 0x34}, 0x1, 0x0, 0x0, 0x40840d4}, 0x0) socket$kcm(0x1e, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f00000003c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x7}}, {@journal_dev={'journal_dev', 0x3d, 0x1}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@nouid32}]}, 0x1, 0x441, &(0x7f00000011c0)="$eJzs28tvG8UfAPDv2kn66zP5VeXRBxAoiIpH0qSl9MAFBBIHkJDgUI4hSatQt0FNkGgVQUCoHFEl7ogjEv8AnOCCgBMSV7ijShXKpYWT0dq7ie3aaZI62RR/PtK2M7tjzXw9O/bMThxAzxpO/0ki9kTE7xExWM82Fxiu/3draWHy76WFySSq1Tf/Smrlbi4tTOZF89ftzjN9EaVPkzjcpt65y1fOT1Qq05ey/Oj8hfdG5y5feXbmwsS56XPTF8dPnz55Yuz5U+PPdSXONK6bhz6cPXLw1bevvT555to7P3+T5PG3xNElw6tdfKJa7XJ1xdrbkE76CmwI61KuD9Por43/wSjHSucNxiufFNo4YFNVq9Xq/Z0vL1aB/7Akim4BUIz8iz5d/+bHFk09toUbL9YXQGnct7KjfqUvSlmZ/pb1bTcNR8SZxX++TI/YnOcQAABNvk/nP8+0m/+VovG50L5sD2UoIv4fEfsj4lREHIiI+yJqZR+IiAfXWX/rJsnt85/S9Q0Ftkbp/O+FbG+ref6Xz/5iqJzl9tbi70/OzlSmj2fvybHo35Hmx1ap44eXf/u807XG+V96pPXnc8GsHdf7djS/ZmpifuJuYm504+OIQ33t4k+WdwKSiDgYEYc2WMfMU18f6XTtzvGvogv7TNWvIp6s9/9itMSfS1bfnxz9X1Smj4/md8Xtfvn16hud6r+r+Lsg7f9dbe//5fiHksb92rn113H1j8/ar2n2bfz+H0jeajr3wcT8/KWxiIHktXqjG8+Pt5QbXymfxn/saPvxvz9W3onDEZHexA9FxMMR8UjWd49GxGMRcXSV+H966fF3O13bDv0/ta7+X0kMROuZ9ony+R+/a6p0aD3xp/1/spY6lp1Zy+ffWtq1sbsZAAAA7j2liNgTSWlkOV0qjYzU/4b/QOwqVWbn5p8+O/v+xan6bwSGor+UP+kabHgeOpYt6/P8eEv+RPbc+Ivyzlp+ZHK2MlV08NDjdncY/6k/y0W3Dth0fq8Fvcv4h95l/EPvMv6hd7UZ/zuLaAew9dp9/39UQDuArdcy/m37QQ+x/ofe1Tj+kwLbAWw93//Qk+Z2xp1/JN8DiYHt0Yx7KBGltRf+Nrvbim6zxNoTBX8wAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMm/AQAA//8iOuPQ") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000080)=ANY=[], 0xfe37, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000001040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r6}, 0x18) r7 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) fsmount(r7, 0x0, 0x0) r8 = gettid() mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) process_vm_writev(r8, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 562.020856ms ago: executing program 1 (id=14): r0 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x42, 0x0) mmap(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x0, 0x28011, r0, 0x2000) r1 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200c8004, &(0x7f0000000280)={0xa, 0xe20, 0x0, @mcast2}, 0x1c) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40008081}, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) getpgid(0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40010}, 0x0) sendto$inet6(r1, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_udp_int(r1, 0x88, 0x1, &(0x7f0000000080), 0x4) 512.132398ms ago: executing program 0 (id=15): socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x2, 0x5}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000240)='asymmetric\x00', 0x0, &(0x7f0000000480)="1080ab", 0x3, 0xffffffffffffffff) mq_unlink(&(0x7f0000000000)='kmem_cache_free\x00') r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0), 0x2540, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r3) syz_mount_image$iso9660(&(0x7f0000000800), &(0x7f0000000c80)='./file0\x00', 0x1004491, &(0x7f0000000f00)=ANY=[], 0xfe, 0x875, &(0x7f0000001000)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) 487.752289ms ago: executing program 1 (id=16): request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\x10rust\xe3cusg\x91\xdedn:+\xf0', 0xffffffffffffffff) 464.98005ms ago: executing program 1 (id=17): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x1b8585c, &(0x7f0000000180)=ANY=[@ANYRES8=r0], 0x0, 0x29f, &(0x7f0000000580)="$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") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x40, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x18) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x40000, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) syz_emit_ethernet(0xffffffffffffff29, 0x0, 0x0) syz_open_dev$loop(0x0, 0x5, 0x4040) fcntl$notify(r5, 0x402, 0x21) getdents64(r4, &(0x7f0000000900)=""/156, 0x9c) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xaf86be13, &(0x7f0000000000)='cgroup\x00'}, 0x30) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_int(r9, &(0x7f0000000440)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_subtree(r10, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x27) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x1018, 0xffffffffffffffff}, './file0\x00'}) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r12, &(0x7f0000002040)={0x0, 0x0, &(0x7f0000002000)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001020103000000000000000002000201180001801400018008000100ac14144208000200ac1414009bcb3529a21d9054f65b4becbb"], 0x2c}, 0x1, 0x0, 0x0, 0x4001000}, 0x804) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)=@o_path={&(0x7f0000000380)='./file0\x00', r0, 0x4000, r12}, 0x18) setsockopt$SO_TIMESTAMPING(r11, 0x1, 0x25, &(0x7f0000000300)=0xa08, 0x4) 405.657813ms ago: executing program 4 (id=18): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x5a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00157b", 0x24, 0x6, 0x1, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0xc2, 0x0, 0x0, 0x0, {[@mptcp=@synack={0x1e, 0x10, 0x1, 0x2, 0x6}]}}}}}}}}, 0x0) 377.923893ms ago: executing program 0 (id=19): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000140)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r2, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) connect$vsock_stream(r3, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) r6 = accept4(r2, 0x0, 0x0, 0x0) sendto(r6, &(0x7f0000000000)="00c881d760", 0x5, 0x0, 0x0, 0x0) recvfrom(r3, &(0x7f00000001c0)=""/62, 0x3e, 0x10120, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6(0xa, 0x80002, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000440)=0x10) 329.092136ms ago: executing program 4 (id=20): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x5a, &(0x7f0000000040)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00157b", 0x24, 0x6, 0x1, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0xc2, 0x0, 0x0, 0x0, {[@mptcp=@synack={0x1e, 0x10, 0x1, 0x2, 0x6}]}}}}}}}}, 0x0) 327.537426ms ago: executing program 1 (id=21): setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1, 0xa}, 0x1184c, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x4, &(0x7f00000000c0)=[{0x806, 0x0, 0x40, 0x7ffc0002}, {0x8, 0x45, 0x10, 0x1}, {0x3ff, 0x10, 0x4, 0x8}, {0x5, 0x0, 0xfc, 0x1}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x28011, r0, 0x0) getpeername$tipc(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000001700000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000000180)=@file={0x1}, 0x6e) listen(r3, 0x0) accept4$unix(r3, 0x0, 0x0, 0x80000) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3, 0x80}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r4, 0xf502, 0x0) socket$unix(0x1, 0x1, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r5}, 0x18) capset(&(0x7f0000000380)={0x19980330}, &(0x7f0000000040)={0x200000, 0x40200003, 0x0, 0x6, 0x7}) setrlimit(0x40000000000008, &(0x7f0000000080)={0x0, 0x6}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x4000804) 249.436909ms ago: executing program 4 (id=22): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000680)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x80, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x54, 0x4, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, @target={{0xb}, @val={0x40, 0x2, 0x0, 0x1, [@NFTA_TARGET_INFO={0x2c, 0x3, "7339f2f10455afb9fdd672bad09dfb78c7699c74e891a0c7f5ffffff00"/40}, @NFTA_TARGET_REV={0x8}, @NFTA_TARGET_NAME={0x8, 0x1, 'LED\x00'}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0xa8}, 0x1, 0x0, 0x0, 0x4000880}, 0x20040040) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xc4}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000002c0)="2f913af8afcc4c003e0a3a589c2215fc7ddd9a770b3eea38685902bc465f77892ee516665943a209dc1dddeaaa3b55854bc9989dafdda37cae4d301b877f4cfee9e57ff8e1c91b7e4eeabdf81049f7c15e0f3e763c196a8a0284c697d44860974f39af1cbdded7796a3f0c479eef98c3d13f99faaefa43758153b226ade7896335d51db79693b208b4841e6835450591ca1d89a2fe7f33978ff7187b32fe1bab9c1f498995ff5c937203987181e3", 0xae}, {&(0x7f0000000200)="2b52f2d6c0778ead559851eab05f69973061850755a796d3da96e3a9167f99322e60bc7409c8832a9f7515da7e82bf5ff75ef80b523183df686b6cd1590445eea1933d13d5406cd7dc435b121c3cc6c88e689b2961f7daa4a06645c167dca0c7", 0x60}, {&(0x7f0000000380)="c4581dddc9fce654cb2879bd998be82ee21bd7ca16cf6f7c9652966658d3dde0ae6b2ebf372c47e09dcf6a55b982246f263f5e3c5044e9de2289d7ea32fd2335e04129bb39341165ab4f05553886a0da2010e9aa2538e5", 0x57}], 0x3, 0x101, 0x101) syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f0000000280)='./file0\x00', 0x14806, &(0x7f0000000b00)=ANY=[@ANYBLOB="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", @ANYRESHEX], 0x1, 0x6fd, &(0x7f0000000c40)="$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") openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x90) socket$inet6_udp(0xa, 0x2, 0x0) utime(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)={0x3, 0x1}) 123.045225ms ago: executing program 3 (id=23): r0 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = inotify_init1(0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000280)=""/230) inotify_add_watch(r5, &(0x7f0000000400)='.\x00', 0xa4000021) read(r5, 0x0, 0x20) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x48, 0x140d, 0x200, 0x70bd26, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x3}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x5}, 0x24000000) close(r5) r6 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x800, 0x0) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x20000023896) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000040)={0x3ffffffffffffe96, &(0x7f0000000000)=[{0x2000, 0x5}]}) ioctl$LOOP_CLR_FD(r6, 0x4c01) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004180)=ANY=[@ANYBLOB="020000000400000007000000020000000010"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESHEX=r2, @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r10}, 0x10) quotactl_fd$Q_SYNC(r10, 0xffffffff80000102, 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x6, 0x0, 0x0, 0x0) r11 = fsmount(r0, 0x0, 0x0) openat$cgroup_subtree(r11, &(0x7f0000000100), 0x2, 0x0) 27.494719ms ago: executing program 4 (id=24): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{r0}, &(0x7f0000000740), &(0x7f0000000780)='%-010d \x00'}, 0x20) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\x10rust\xe3cusg\x91\xdedn:+\xf0', 0xffffffffffffffff) 0s ago: executing program 4 (id=25): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) syz_emit_ethernet(0x76, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb0800491f0068006400008a2f9078ac1e0101ac1e0001830b990d6ac3656474d4bc83032400000420880b0000000001000800010086dd080088be0000000113b7e67f0100000000000037080022eb00000000250c6c0402000000000080000005790d0800655800000003b6ed8b4f9c33753307b583dda64525105be47e"], 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) mq_open(&(0x7f0000000180)='\xaa\xaa\xaa\xaa\xaa', 0x40, 0x0, &(0x7f0000000200)={0x7, 0x0, 0x59f, 0x5}) bind$vsock_stream(r1, &(0x7f0000000140)={0x28, 0x0, 0x2710, @host}, 0x10) r2 = socket(0x11, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000040)=0x80000004, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, &(0x7f0000000640)={0x1, &(0x7f0000000680)=[{0x6, 0x0, 0x0, 0x2}]}, 0x10) r3 = dup2(r2, 0xffffffffffffffff) listen(r1, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000600)='fsi_master_acf_cmd_rel_addr\x00', r0}, 0x18) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x1b, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000218110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000200005509017700000000950000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000001010000850000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000000000008500000086000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) connect$vsock_stream(r4, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) r7 = accept4(r1, 0x0, 0x0, 0x800) sendto(r7, &(0x7f0000000000)="00c881d76049ac562e4e5094890b55e5ea113389145c57e7b3479bf3f2cf8ac5d94a71e37b8bc9f4e71c8b097042535f04d39b07b6e29be0a2734c7332f8", 0x3e, 0x8004, 0x0, 0x0) syz_read_part_table(0x1055, &(0x7f0000001080)="$eJzszzGKwkAYBeC3JDubsEXAS9jYiqWnsPcoXsFrWHk+QSKTsfAEkuL7iv/9MzwGJqzCtcX2nv1j83E/vPO5zK6OcuzrOmRO8p+pFfqMNX7y287zX3JYtnN9oyu7JJcxmfqUVik53b7yOQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABYuVcAAAD//3TbCLM=") r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x181002, 0x0) ioctl$TCSETAF(r8, 0x5408, &(0x7f0000000080)={0x49de, 0x0, 0xfffc, 0xbfff, 0x19, "ec28a144f13d7607"}) write$binfmt_aout(r8, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000400)={0x7fff, 0xfffffffc, 0x0, 0x0, 0x10, "0062ba5d8200"}) dup3(0xffffffffffffffff, r8, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.10.11' (ED25519) to the list of known hosts. [ 32.891798][ T29] audit: type=1400 audit(1764160751.414:62): avc: denied { mounton } for pid=3304 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 32.914768][ T29] audit: type=1400 audit(1764160751.434:63): avc: denied { mount } for pid=3304 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 32.915637][ T3304] cgroup: Unknown subsys name 'net' [ 32.942458][ T29] audit: type=1400 audit(1764160751.474:64): avc: denied { unmount } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.078328][ T3304] cgroup: Unknown subsys name 'cpuset' [ 33.084527][ T3304] cgroup: Unknown subsys name 'rlimit' [ 33.214708][ T29] audit: type=1400 audit(1764160751.734:65): avc: denied { setattr } for pid=3304 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.238140][ T29] audit: type=1400 audit(1764160751.734:66): avc: denied { create } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.258604][ T29] audit: type=1400 audit(1764160751.734:67): avc: denied { write } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.279063][ T29] audit: type=1400 audit(1764160751.734:68): avc: denied { read } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.286739][ T3306] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 33.299346][ T29] audit: type=1400 audit(1764160751.734:69): avc: denied { mounton } for pid=3304 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 33.332809][ T29] audit: type=1400 audit(1764160751.734:70): avc: denied { mount } for pid=3304 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 33.356123][ T29] audit: type=1400 audit(1764160751.834:71): avc: denied { relabelto } for pid=3306 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 33.384001][ T3304] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 34.548734][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 34.608484][ T3322] chnl_net:caif_netlink_parms(): no params data found [ 34.636896][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 34.645491][ T3323] chnl_net:caif_netlink_parms(): no params data found [ 34.713808][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.721006][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.728186][ T3313] bridge_slave_0: entered allmulticast mode [ 34.734590][ T3313] bridge_slave_0: entered promiscuous mode [ 34.756642][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.763870][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.771008][ T3313] bridge_slave_1: entered allmulticast mode [ 34.777353][ T3313] bridge_slave_1: entered promiscuous mode [ 34.818633][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.825695][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.832894][ T3319] bridge_slave_0: entered allmulticast mode [ 34.839421][ T3319] bridge_slave_0: entered promiscuous mode [ 34.845794][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.852919][ T3323] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.860189][ T3323] bridge_slave_0: entered allmulticast mode [ 34.866450][ T3323] bridge_slave_0: entered promiscuous mode [ 34.874042][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 34.889940][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.897002][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.904198][ T3322] bridge_slave_0: entered allmulticast mode [ 34.910874][ T3322] bridge_slave_0: entered promiscuous mode [ 34.917373][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.924510][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.931702][ T3319] bridge_slave_1: entered allmulticast mode [ 34.938154][ T3319] bridge_slave_1: entered promiscuous mode [ 34.944604][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.951732][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.958949][ T3323] bridge_slave_1: entered allmulticast mode [ 34.965353][ T3323] bridge_slave_1: entered promiscuous mode [ 34.972568][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 34.991155][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.998240][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.005317][ T3322] bridge_slave_1: entered allmulticast mode [ 35.011714][ T3322] bridge_slave_1: entered promiscuous mode [ 35.029969][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.053503][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 35.062760][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.078095][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.087942][ T3313] team0: Port device team_slave_0 added [ 35.094269][ T3313] team0: Port device team_slave_1 added [ 35.108040][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.126799][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.145061][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.154849][ T3323] team0: Port device team_slave_0 added [ 35.161081][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.168078][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.194029][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.219780][ T3323] team0: Port device team_slave_1 added [ 35.225856][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.232827][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.258718][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.289620][ T3319] team0: Port device team_slave_0 added [ 35.298245][ T3322] team0: Port device team_slave_0 added [ 35.309448][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.316392][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.342423][ T3323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.353909][ T3319] team0: Port device team_slave_1 added [ 35.362450][ T3322] team0: Port device team_slave_1 added [ 35.373195][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.380172][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.406163][ T3323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.459990][ T3313] hsr_slave_0: entered promiscuous mode [ 35.465902][ T3313] hsr_slave_1: entered promiscuous mode [ 35.477374][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.484420][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.510411][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.521191][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.528290][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.535507][ T3315] bridge_slave_0: entered allmulticast mode [ 35.542128][ T3315] bridge_slave_0: entered promiscuous mode [ 35.548797][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.555739][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.581660][ T3322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.592916][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.599933][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.625850][ T3322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.638534][ T3323] hsr_slave_0: entered promiscuous mode [ 35.644563][ T3323] hsr_slave_1: entered promiscuous mode [ 35.650488][ T3323] debugfs: 'hsr0' already exists in 'hsr' [ 35.656204][ T3323] Cannot create hsr debugfs directory [ 35.661997][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.668967][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.694875][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.714828][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.722045][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.729248][ T3315] bridge_slave_1: entered allmulticast mode [ 35.735583][ T3315] bridge_slave_1: entered promiscuous mode [ 35.768137][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.789798][ T3319] hsr_slave_0: entered promiscuous mode [ 35.795795][ T3319] hsr_slave_1: entered promiscuous mode [ 35.801724][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 35.807448][ T3319] Cannot create hsr debugfs directory [ 35.813997][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.873920][ T3322] hsr_slave_0: entered promiscuous mode [ 35.880041][ T3322] hsr_slave_1: entered promiscuous mode [ 35.885822][ T3322] debugfs: 'hsr0' already exists in 'hsr' [ 35.891613][ T3322] Cannot create hsr debugfs directory [ 35.909940][ T3315] team0: Port device team_slave_0 added [ 35.926123][ T3315] team0: Port device team_slave_1 added [ 35.972752][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.979744][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.005740][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.019180][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.026150][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.052094][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.135375][ T3315] hsr_slave_0: entered promiscuous mode [ 36.141518][ T3315] hsr_slave_1: entered promiscuous mode [ 36.147438][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 36.153266][ T3315] Cannot create hsr debugfs directory [ 36.186456][ T3313] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 36.199668][ T3313] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 36.213029][ T3313] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 36.226635][ T3313] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 36.244486][ T3323] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 36.260165][ T3323] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 36.268719][ T3323] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 36.285633][ T3323] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 36.321646][ T3319] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 36.337665][ T3319] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 36.346706][ T3319] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 36.356125][ T3319] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 36.378094][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.399965][ T3322] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 36.408416][ T3322] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 36.417166][ T3322] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 36.433675][ T3322] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 36.447097][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.478929][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.486007][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.495182][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.502325][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.512551][ T3315] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 36.528171][ T3315] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 36.537671][ T3315] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 36.553986][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.564364][ T3315] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 36.582142][ T3323] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.610817][ T1480] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.617980][ T1480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.635098][ T1480] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.642196][ T1480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.672070][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.694558][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.704780][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.720593][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.727658][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.736573][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.743752][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.758524][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.778864][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.804965][ T3322] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.828671][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.835733][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.844950][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.852025][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.884323][ T3323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.899588][ T3322] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 36.922788][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.931430][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 36.948565][ T408] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.955697][ T408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.975218][ T408] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.982304][ T408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.038453][ T3313] veth0_vlan: entered promiscuous mode [ 37.046214][ T3313] veth1_vlan: entered promiscuous mode [ 37.071882][ T3322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.089910][ T3313] veth0_macvtap: entered promiscuous mode [ 37.108941][ T3313] veth1_macvtap: entered promiscuous mode [ 37.120770][ T3319] veth0_vlan: entered promiscuous mode [ 37.139712][ T3319] veth1_vlan: entered promiscuous mode [ 37.149228][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.168414][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.191026][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.212519][ T3319] veth0_macvtap: entered promiscuous mode [ 37.221815][ T37] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.239603][ T3319] veth1_macvtap: entered promiscuous mode [ 37.255232][ T3322] veth0_vlan: entered promiscuous mode [ 37.261280][ T37] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.278784][ T37] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.288870][ T3322] veth1_vlan: entered promiscuous mode [ 37.297344][ T37] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.321356][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.341837][ T3322] veth0_macvtap: entered promiscuous mode [ 37.358401][ T3322] veth1_macvtap: entered promiscuous mode [ 37.371456][ T3313] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 37.372567][ T3323] veth0_vlan: entered promiscuous mode [ 37.393151][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.402816][ T3323] veth1_vlan: entered promiscuous mode [ 37.429693][ T37] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.444179][ T3323] veth0_macvtap: entered promiscuous mode [ 37.464136][ T3323] veth1_macvtap: entered promiscuous mode [ 37.479309][ T37] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.488924][ T408] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.488986][ T408] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.492554][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.512813][ T3315] veth0_vlan: entered promiscuous mode [ 37.518070][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.523079][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.545129][ T3315] veth1_vlan: entered promiscuous mode [ 37.561971][ T31] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.572280][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.589824][ T31] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.603318][ T3488] loop0: detected capacity change from 0 to 1024 [ 37.610901][ T3488] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (32298!=35945) [ 37.632836][ T3488] EXT4-fs (loop0): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 37.635669][ T37] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.653299][ T3488] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 37.666021][ T3490] loop1: detected capacity change from 0 to 164 [ 37.676576][ T3488] EXT4-fs (loop0): orphan cleanup on readonly fs [ 37.694422][ T3315] veth0_macvtap: entered promiscuous mode [ 37.713487][ T37] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.722195][ T3490] rock: directory entry would overflow storage [ 37.722589][ T37] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.728503][ T3490] rock: sig=0x4f50, size=4, remaining=3 [ 37.728519][ T3490] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 37.751238][ T3488] EXT4-fs error (device loop0): ext4_read_inode_bitmap:167: comm syz.0.7: Inode bitmap for bg 0 marked uninitialized [ 37.766953][ T3488] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 37.780547][ T3315] veth1_macvtap: entered promiscuous mode [ 37.799020][ T1480] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.826878][ T1480] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.836403][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.855325][ T3495] loop4: detected capacity change from 0 to 512 [ 37.874649][ T1480] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.885313][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.902989][ T3501] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9'. [ 37.913920][ T3313] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.921873][ T29] kauditd_printk_skb: 56 callbacks suppressed [ 37.921902][ T29] audit: type=1400 audit(1764160756.444:128): avc: denied { create } for pid=3502 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 37.954496][ T3501] netlink: 12 bytes leftover after parsing attributes in process `syz.2.9'. [ 37.967331][ T3495] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 37.970284][ T37] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.988325][ T3495] ext4 filesystem being mounted at /0/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 38.008993][ T3509] loop0: detected capacity change from 0 to 256 [ 38.028451][ T29] audit: type=1400 audit(1764160756.534:129): avc: denied { allowed } for pid=3502 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 38.041344][ T3495] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #12: comm syz.4.5: corrupted xattr block 6: invalid header [ 38.047732][ T29] audit: type=1400 audit(1764160756.534:130): avc: denied { create } for pid=3502 comm="syz.1.10" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 38.061157][ T3495] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=12 [ 38.081256][ T29] audit: type=1400 audit(1764160756.534:131): avc: denied { map } for pid=3502 comm="syz.1.10" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 38.081294][ T29] audit: type=1400 audit(1764160756.534:132): avc: denied { read write } for pid=3502 comm="syz.1.10" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 38.132806][ T3495] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #12: comm syz.4.5: corrupted xattr block 6: invalid header [ 38.147214][ T29] audit: type=1400 audit(1764160756.554:133): avc: denied { read } for pid=3500 comm="syz.2.9" name="ptp0" dev="devtmpfs" ino=246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 38.174110][ T29] audit: type=1400 audit(1764160756.554:134): avc: denied { open } for pid=3500 comm="syz.2.9" path="/dev/ptp0" dev="devtmpfs" ino=246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 38.197273][ T29] audit: type=1400 audit(1764160756.624:135): avc: denied { setopt } for pid=3502 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 38.199494][ T3509] FAT-fs (loop0): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 38.219709][ T37] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.248375][ T37] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.257107][ T37] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.303838][ T3515] loop3: detected capacity change from 0 to 512 [ 38.318835][ T3495] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=12 [ 38.331430][ T3519] loop2: detected capacity change from 0 to 164 [ 38.352104][ T3519] rock: directory entry would overflow storage [ 38.358317][ T3519] rock: sig=0x4f50, size=4, remaining=3 [ 38.363950][ T3519] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 38.373765][ T3515] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 38.387054][ T3509] FAT-fs (loop0): error, fat_bmap_cluster: request beyond EOF (i_pos 196) [ 38.387125][ T3519] rock: directory entry would overflow storage [ 38.395623][ T3509] FAT-fs (loop0): Filesystem has been set read-only [ 38.396107][ T3515] ext4 filesystem being mounted at /0/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 38.401947][ T3519] rock: sig=0x4f50, size=4, remaining=3 [ 38.418998][ T29] audit: type=1400 audit(1764163316.811:136): avc: denied { open } for pid=3514 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 38.424327][ T3519] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 38.450918][ T29] audit: type=1400 audit(1764163316.811:137): avc: denied { kernel } for pid=3514 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 38.471404][ T3495] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #12: comm syz.4.5: corrupted xattr block 6: invalid header [ 38.503717][ T3495] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=12 [ 38.513638][ T3495] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #12: comm syz.4.5: corrupted xattr block 6: invalid header [ 38.527598][ T3495] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=12 [ 38.536741][ T3495] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #12: comm syz.4.5: corrupted xattr block 6: invalid header [ 38.550413][ T3495] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop4 ino=12 [ 38.560086][ T3495] EXT4-fs error (device loop4): ext4_xattr_block_get:597: inode #12: comm syz.4.5: corrupted xattr block 6: invalid header [ 38.608340][ C0] hrtimer: interrupt took 26585 ns [ 38.676048][ T3524] netlink: 32 bytes leftover after parsing attributes in process `syz.2.13'. [ 38.744449][ T3530] loop0: detected capacity change from 0 to 764 [ 38.783043][ T3530] Symlink component flag not implemented [ 38.788737][ T3530] Symlink component flag not implemented [ 38.794512][ T3534] loop1: detected capacity change from 0 to 128 [ 38.795176][ T3530] Symlink component flag not implemented (128) [ 38.807155][ T3530] Symlink component flag not implemented (122) [ 38.815475][ T3323] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.824993][ T3534] ======================================================= [ 38.824993][ T3534] WARNING: The mand mount option has been deprecated and [ 38.824993][ T3534] and is ignored by this kernel. Remove the mand [ 38.824993][ T3534] option from the mount to silence this warning. [ 38.824993][ T3534] ======================================================= [ 38.862991][ T3524] loop2: detected capacity change from 0 to 512 [ 38.924516][ T3524] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 38.937938][ T3524] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 38.977559][ T3524] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2853: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 39.019990][ T3524] EXT4-fs (loop2): 1 truncate cleaned up [ 39.030561][ T3524] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.048927][ T3548] loop4: detected capacity change from 0 to 164 [ 39.103906][ T3004] udevd[3004]: worker [3543] terminated by signal 33 (Unknown signal 33) [ 39.114010][ T3546] capability: warning: `syz.1.21' uses 32-bit capabilities (legacy support in use) [ 39.116655][ T3315] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.151924][ T3548] rock: directory entry would overflow storage [ 39.158243][ T3548] rock: sig=0x4f50, size=4, remaining=3 [ 39.163845][ T3548] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 39.271508][ T3555] loop4: detected capacity change from 0 to 8192 [ 39.376878][ T3555] loop4: p1 < > p2 < > p3 p4 < > [ 39.382147][ T3555] loop4: partition table partially beyond EOD, truncated [ 39.389666][ T3555] loop4: p1 start 67108864 is beyond EOD, truncated [ 39.396293][ T3555] loop4: p2 start 4278190080 is beyond EOD, truncated [ 39.403192][ T3555] loop4: p3 start 100859904 is beyond EOD, truncated [ 39.410797][ T3551] ================================================================== [ 39.418907][ T3551] BUG: KCSAN: data-race in hrtimer_interrupt / print_cpu [ 39.425962][ T3551] [ 39.428297][ T3551] write to 0xffff888237c1b2a0 of 8 bytes by interrupt on cpu 0: [ 39.435939][ T3551] hrtimer_interrupt+0x193/0x460 [ 39.440899][ T3551] __sysvec_apic_timer_interrupt+0x5f/0x1d0 [ 39.446825][ T3551] sysvec_apic_timer_interrupt+0x6f/0x80 [ 39.452490][ T3551] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 39.458501][ T3551] __tsan_read8+0xe9/0x190 [ 39.462939][ T3551] mod_memcg_lruvec_state+0x6f/0x2c0 [ 39.468242][ T3551] __lruvec_stat_mod_folio+0xcd/0x120 [ 39.473636][ T3551] folio_add_new_anon_rmap+0x18e/0x260 [ 39.479102][ T3551] handle_mm_fault+0x27d7/0x2be0 [ 39.484048][ T3551] __get_user_pages+0x102a/0x1ed0 [ 39.489096][ T3551] __gup_longterm_locked+0x8ef/0xe60 [ 39.494390][ T3551] pin_user_pages_remote+0x7e/0xb0 [ 39.499510][ T3551] process_vm_rw+0x484/0x960 [ 39.504117][ T3551] __x64_sys_process_vm_writev+0x78/0x90 [ 39.509763][ T3551] x64_sys_call+0x2a80/0x3000 [ 39.514441][ T3551] do_syscall_64+0xd2/0x200 [ 39.518943][ T3551] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.524847][ T3551] [ 39.527168][ T3551] read to 0xffff888237c1b2a0 of 8 bytes by task 3551 on cpu 1: [ 39.534708][ T3551] print_cpu+0x2ea/0x660 [ 39.538956][ T3551] timer_list_show+0x107/0x170 [ 39.543754][ T3551] seq_read_iter+0x636/0x950 [ 39.548350][ T3551] proc_reg_read_iter+0x110/0x180 [ 39.553371][ T3551] copy_splice_read+0x442/0x660 [ 39.558234][ T3551] splice_direct_to_actor+0x26f/0x680 [ 39.563608][ T3551] do_splice_direct+0xda/0x150 [ 39.568374][ T3551] do_sendfile+0x380/0x650 [ 39.572808][ T3551] __x64_sys_sendfile64+0x105/0x150 [ 39.578023][ T3551] x64_sys_call+0x2bb4/0x3000 [ 39.582714][ T3551] do_syscall_64+0xd2/0x200 [ 39.587210][ T3551] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.593099][ T3551] [ 39.595414][ T3551] value changed: 0x000000092b689b59 -> 0x7fffffffffffffff [ 39.602512][ T3551] [ 39.604828][ T3551] Reported by Kernel Concurrency Sanitizer on: [ 39.610984][ T3551] CPU: 1 UID: 0 PID: 3551 Comm: syz.3.23 Not tainted syzkaller #0 PREEMPT(voluntary) [ 39.620529][ T3551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 39.630581][ T3551] ================================================================== [ 39.809629][ T3322] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.