last executing test programs: 3m39.007938671s ago: executing program 0 (id=741): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0xe83, 0x1, 0x5, 0x40, 0x4, 0x8, 0x100}, 0xc) 3m38.993291711s ago: executing program 0 (id=742): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000d00)=@newqdisc={0x484, 0x24, 0xd0f, 0x70bd27, 0x25dfdbfc, {0x60, 0x0, 0x0, r4, {0x0, 0x10}, {0xffe0, 0xa}, {0xfff3, 0xe}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x458, 0x2, [@TCA_TBF_PBURST={0x8, 0x7, 0x1889}, @TCA_TBF_RTAB={0x404, 0x2, [0x4a, 0x100, 0x6f5e895f, 0xf, 0x1, 0x7, 0x4a187b7a, 0x5, 0x7, 0x6, 0x10000, 0x8, 0x1, 0xf, 0x100, 0x2, 0x0, 0x3, 0x800, 0x2c1, 0x3, 0x101, 0x7d, 0x7fff, 0x0, 0x0, 0x606, 0x5, 0x0, 0xaf3, 0x8000, 0xd, 0x80000000, 0x9, 0x10, 0x8, 0x2, 0x0, 0x2, 0x5, 0x5, 0x7, 0x6, 0x26d, 0x7, 0xfffff53b, 0x8, 0x41fe, 0x4, 0x8, 0x0, 0x9, 0x43c, 0xfffffffd, 0xffff, 0xffffff21, 0xf, 0x8, 0xfffffffc, 0x8, 0x0, 0x8, 0x0, 0xd406, 0x2, 0x7fff, 0x4, 0x4, 0x3, 0x1, 0x7, 0x4, 0xffff, 0x1, 0x3448575b, 0xca, 0x3, 0x10001, 0x7, 0x9, 0x1, 0x5, 0x200, 0x800, 0x5, 0x4, 0x4, 0x40, 0x1, 0x8, 0xe, 0x1, 0x7fffffff, 0x1, 0x0, 0x10000, 0xfd, 0x5, 0xa5, 0xffffff20, 0xc79, 0x1459, 0x4, 0xff, 0x0, 0x3, 0x4, 0xe, 0x4, 0x9, 0x0, 0xe3d, 0x4, 0x0, 0xf2, 0xc, 0x80000001, 0x4, 0x7, 0x9, 0x3, 0x5, 0x7, 0x68, 0x7c, 0x8, 0xc, 0x7ff, 0x5, 0x7, 0x4, 0x2, 0x3, 0xffff, 0x8001, 0x8, 0x57, 0x4, 0x7fffffff, 0x3ff, 0x1, 0x7, 0x800, 0x8, 0x0, 0x89, 0x80, 0x3, 0x1, 0xffffffff, 0x4d, 0x0, 0xfff, 0x7, 0x0, 0x1, 0x4, 0x8670, 0x7, 0x40, 0x6, 0x3, 0x3d1f9312, 0x16, 0x499, 0x101, 0x5, 0x1, 0x9, 0x400, 0x4, 0x1ff, 0x1, 0x7, 0xa, 0x21e, 0xb8, 0x800c, 0x240000, 0x5, 0x9, 0x0, 0x857e, 0x200, 0xfffffff7, 0x4, 0x7, 0x7, 0xfffffff9, 0x7, 0x3, 0x1000, 0x8, 0xffff, 0x8, 0xffffffff, 0x800000, 0x2, 0xc, 0x9, 0xd, 0x0, 0x101, 0x1000, 0x40, 0x6c, 0x5, 0x9, 0x9, 0x28478204, 0x6, 0x1284c4f0, 0x5, 0x2, 0x3f, 0x1, 0x0, 0x3, 0x2000, 0x8, 0xfffffffb, 0x8de4, 0x116d80, 0x1, 0x5, 0x8, 0x8, 0x6, 0x1, 0xa, 0x9, 0x1, 0x5, 0x10001, 0x7033, 0xe, 0xec, 0x0, 0x1, 0xf0, 0x2, 0x82b, 0x6, 0x5, 0x7fff, 0x8, 0xe, 0x1000, 0x2, 0xfffffc00, 0x4, 0x0, 0xcfd, 0x0, 0x4, 0x1a]}, @TCA_TBF_RATE64={0xc, 0x4, 0xb78fea3163f663ab}, @TCA_TBF_PARMS={0x28, 0x1, {{0x8, 0x0, 0xfffa, 0x9, 0x9, 0x4}, {0x71, 0x2, 0x4, 0x8, 0x7, 0x101}, 0x0, 0x7, 0x1aa2}}, @TCA_TBF_PRATE64={0xc, 0x5, 0xf0cda79ea301acfa}, @TCA_TBF_PBURST={0x8, 0x7, 0x597}]}}]}, 0x484}, 0x1, 0x0, 0x0, 0x30008084}, 0xc010) socket$l2tp6(0xa, 0x2, 0x73) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000010000507000000000000000016000000", @ANYRES32=r5, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}}, 0x24}}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x80082, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r7) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000140)=0x18, 0x4) r8 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x1fc, 0x3}, 0x102802, 0x2e, 0x0, 0x3, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x5b, 0x4, 0x10000, 0x4, 0xffffffff}, 0x1c) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x34) sendmsg$kcm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="350400002f000511d25a80648c63940d0224fc60040006400c0003000200002037153e370c040180060410004500", 0x2e}, {&(0x7f0000000600)="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", 0x407}], 0x2}, 0x4000014) getsockname$packet(r7, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x3c, 0x2c, 0xf31, 0x0, 0x2000, {0x0, 0x0, 0x0, r9, {}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x1, 0xe9f0ad8ee409064d}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008844}, 0x4010) r10 = socket$can_bcm(0x1d, 0x2, 0x2) r11 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r11, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="0212000a"], 0x78}, 0x1, 0x7}, 0x8080) close_range(r10, 0xffffffffffffffff, 0x0) write$binfmt_aout(r7, &(0x7f0000000a40)={{0x108, 0xff, 0x2, 0x26f, 0xaa, 0x5, 0x241, 0xffffffff}, "a427094f1c9c6fd052e1d5331367a8f0782a3818732c2175a96bbcd555363cc374063c61146ff642098f07b4f38035e9d3f1513aef5178949bfbd390303d640c93387618a0fb8125e3621f479c5b38368fde0d68f85bebfee90d847524088ff75a9a4c48b8af79668fb9d4fb88dabecb6cfdc8c92ae9e4507cf98352197b9148e5600d10722152793f7078089b02bca071a69d05275b2c93feb520eca4", ['\x00', '\x00']}, 0x2bd) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYRES32], &(0x7f0000001f40)=""/4103, 0x3e, 0xff9, 0xa, 0xfffffffa}, 0x28) 3m38.886608415s ago: executing program 0 (id=743): r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/arp\x00') r2 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000580)=0x14) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030003110000002cbd7000fcdbdd2503000900800000001cdc0dca1d9f68846960e56de42944af05000600002000000a000000000000000000000000000000000000000000000102000000000000000200010000000000000007160000000005000500000000000a"], 0x88}, 0x1, 0x7}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="640000001000370429bd7000fcdbdf2500000000", @ANYRES32=r3, @ANYBLOB="890c020000000000440012800b00010069703667726500003400028008000100", @ANYRES32=r3, @ANYBLOB="140007000002"], 0x64}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000001100)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELSETELEM={0x20, 0xe, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x48}, 0x1, 0x0, 0x0, 0x24048050}, 0x40) r7 = syz_clone(0xa8200780, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r8) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000004, 0x3b071, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) syz_open_procfs(r7, &(0x7f0000000180)='smaps\x00') mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r9 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000740)=@pppol2tpv3={0x18, 0x1, {0x3, r9, {0x2, 0x4e24, @broadcast}, 0x2, 0x0, 0x4}}, 0x2e) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x30, r11, 0x801, 0x70bd29, 0x0, {0x7}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}, @L2TP_ATTR_IFNAME={0x14}]}, 0x30}}, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000003c0)={0x50, 0x0, 0x1, 0x0, 0x1, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x64}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}]}]}, 0x50}}, 0x80) r13 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004880}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) dup3(r1, r1, 0x0) 3m38.723742501s ago: executing program 0 (id=744): preadv(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x1, 0xfffffffb) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./mnt\x00', 0x2000c10, &(0x7f00000000c0)={[{@i_version}, {@abort}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mount(&(0x7f0000000440)=@loop={'/dev/loop', 0x0}, &(0x7f0000000200)='./bus\x00', 0x0, 0x1000, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7ffffffffffffffb, 0x3, 0x0, 0x0, 0x17, 0x0, "ef35af413bb901527fe4d0ce5d29c3ee5e5c3676345a41499db7aac63a01000000000000004faa2ae2c084a0ea0000000000007700000c00002000", "036c47c67808200400000000000000335263bdbcef549ba197fce47ddfdd753abd950100002a00ffffffffffffffff00000000e8f20000000200", "b7326736181c208220fffff2ff00000000000000000e00", [0x4]}) fallocate(r0, 0x0, 0x4000, 0x1001f0) io_submit(0x0, 0x0, &(0x7f0000000540)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x275a, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet_udp(0x2, 0x2, 0x0) 3m38.16294837s ago: executing program 0 (id=761): socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x111, 0x6}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940), 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r2, 0x4236}], 0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x2, 0x4}}, 0x20) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@empty, @loopback, 0x0, 0xa, [@loopback, @loopback, @local, @empty, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @dev={0xac, 0x14, 0x14, 0x99}, @broadcast, @broadcast]}, 0x38) 3m36.600446663s ago: executing program 0 (id=780): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x2}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_QOS_MAP={0x2a, 0xc7, {[{0x2}, {0x2}, {0xb, 0x7}, {0x8}, {0x7, 0x4}, {0x5, 0x3}, {0x2, 0x4}, {0x0, 0x3}, {0x9, 0x6}, {0x8, 0x3}, {0x2, 0x3}, {0x4, 0x1}, {0x9d, 0x2}, {0x9, 0x2}, {0xa, 0x6}], "32c16dd847d257eb"}}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) socket$can_j1939(0x1d, 0x2, 0x7) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, 0x0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4000000) r5 = getpid() r6 = syz_pidfd_open(r5, 0x0) setns(r6, 0x24020000) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x2a05404, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x2b5b093, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) umount2(&(0x7f0000000040)='.\x00', 0x2) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000001080)=@mangle={'mangle\x00', 0x2, 0x6, 0x6e0, 0x0, 0x540, 0x540, 0x610, 0x0, 0x610, 0x610, 0x610, 0x610, 0x610, 0x6, 0x0, {[{{@ipv6={@mcast1, @private1, [], [0xffffffff, 0xff000000], 'pimreg0\x00', 'macvtap0\x00', {}, {}, 0x21}, 0x0, 0x188, 0x1d0, 0x0, {0x7a00000010000000}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, [0x0, 0xffffff00]}}, @common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x4e23, 0x80], [0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private=0xa000000, @ipv4=@empty, 0x40, 0x30, 0x1}}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @loopback}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [0x0, 0x0, 0x0, 0xffffff00], [], '\x00', 'bond_slave_0\x00', {}, {}, 0x2f, 0x9}, 0x0, 0x168, 0x1a0, 0x48000000, {}, [@common=@ah={{0x30}, {[0x4d2, 0x4d3], 0xa000000, 0x4, 0x3}}, @common=@srh1={{0x90}, {0xc, 0x2, 0x4, 0x8, 0x8, @ipv4={'\x00', '\xff\xff', @loopback}, @private1, @private0, [0xff, 0xff000000, 0x0, 0xff000000], [0xffffffff, 0xffffff00, 0x0, 0xff], [0xff000000, 0x0, 0x0, 0x80], 0x804}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x0, 0x6, 0x5}, {0xffffffffffffffff, 0x6, 0x1}, {0x0, 0x4, 0x2}, 0xfffffffe}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x0, 0xfe}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x740) 3m36.568147544s ago: executing program 32 (id=780): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x2}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_QOS_MAP={0x2a, 0xc7, {[{0x2}, {0x2}, {0xb, 0x7}, {0x8}, {0x7, 0x4}, {0x5, 0x3}, {0x2, 0x4}, {0x0, 0x3}, {0x9, 0x6}, {0x8, 0x3}, {0x2, 0x3}, {0x4, 0x1}, {0x9d, 0x2}, {0x9, 0x2}, {0xa, 0x6}], "32c16dd847d257eb"}}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) socket$can_j1939(0x1d, 0x2, 0x7) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, 0x0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4000000) r5 = getpid() r6 = syz_pidfd_open(r5, 0x0) setns(r6, 0x24020000) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x2a05404, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x2b5b093, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) umount2(&(0x7f0000000040)='.\x00', 0x2) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000001080)=@mangle={'mangle\x00', 0x2, 0x6, 0x6e0, 0x0, 0x540, 0x540, 0x610, 0x0, 0x610, 0x610, 0x610, 0x610, 0x610, 0x6, 0x0, {[{{@ipv6={@mcast1, @private1, [], [0xffffffff, 0xff000000], 'pimreg0\x00', 'macvtap0\x00', {}, {}, 0x21}, 0x0, 0x188, 0x1d0, 0x0, {0x7a00000010000000}, [@common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, [0x0, 0xffffff00]}}, @common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x4e23, 0x80], [0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private=0xa000000, @ipv4=@empty, 0x40, 0x30, 0x1}}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @loopback}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [0x0, 0x0, 0x0, 0xffffff00], [], '\x00', 'bond_slave_0\x00', {}, {}, 0x2f, 0x9}, 0x0, 0x168, 0x1a0, 0x48000000, {}, [@common=@ah={{0x30}, {[0x4d2, 0x4d3], 0xa000000, 0x4, 0x3}}, @common=@srh1={{0x90}, {0xc, 0x2, 0x4, 0x8, 0x8, @ipv4={'\x00', '\xff\xff', @loopback}, @private1, @private0, [0xff, 0xff000000, 0x0, 0xff000000], [0xffffffff, 0xffffff00, 0x0, 0xff], [0xff000000, 0x0, 0x0, 0x80], 0x804}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x0, 0x6, 0x5}, {0xffffffffffffffff, 0x6, 0x1}, {0x0, 0x4, 0x2}, 0xfffffffe}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x0, 0xfe}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x740) 3m9.615335773s ago: executing program 5 (id=1122): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1511, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x106200, 0x10004, 0x20da, 0x0, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0x10, 0xffffffffffffffff, 0xb) r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_create(r0, &(0x7f0000000100)=@access={'system_u:object_r:chfn_exec_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x4}, 0x54) r1 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) unshare(0x22020600) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000019080)=@file={0x0, './file1\x00'}, 0x6e) listen(r2, 0x0) listen(r2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r3) sendmmsg$inet(r1, &(0x7f0000000c40)=[{{&(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x23, 0x0}}], 0x1e1730a30afb6559, 0x8014) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f0000000980)={[{@noblock_validity}, {@journal_dev={'journal_dev', 0x3d, 0x7}}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x6}}, {@noinit_itable}, {@nogrpid}, {@nodiscard}, {@jqfmt_vfsv0}, {@noinit_itable}, {@mb_optimize_scan}, {@usrquota}, {@dioread_nolock}]}, 0x1, 0x5a3, &(0x7f00000002c0)="$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") r4 = open(&(0x7f00000000c0)='./file1\x00', 0x66842, 0x21) mkdirat(0xffffffffffffff9c, 0x0, 0x0) pwritev2(r4, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x2000, 0x0, 0x3) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffc, @ipv4={'\x00', '\xff\xff', @private=0xa010101}}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4ea4, 0x3, @private2, 0x8}, 0x1c) r5 = socket$kcm(0x29, 0x7, 0x0) write$cgroup_pressure(r5, &(0x7f0000000140)={'full'}, 0xfffffdef) ioctl$int_in(r5, 0x5452, 0x0) sendmsg$kcm(r5, 0x0, 0x20004899) sendmsg$NFT_BATCH(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0xcc000) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) 3m9.409490021s ago: executing program 5 (id=1125): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10008, 0x209a, 0x5, 0xd, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x10, 0x701, 0x0, 0xffffffff, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str='\x14\x00'}]}, 0x1c}}, 0x20008080) 3m9.365966502s ago: executing program 5 (id=1126): sendmsg$NFT_MSG_GETSETELEM(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="440000000d0a050000000000000000000200000709e4010073797a32000000000900020073797a31000000000c000200"/58], 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0xc0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'hsr0\x00'}) openat$tun(0xffffffffffffff9c, 0x0, 0x40241, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000070000000200000007"], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) syz_clone3(&(0x7f0000002440)={0x40800, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)=0x0, {0x5}, &(0x7f0000001340)=""/4096, 0x1000, &(0x7f0000002340)=""/184, &(0x7f0000002400), 0x0, {r0}}, 0x58) prctl$PR_SET_PTRACER(0x59616d61, r8) close(0x3) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x3, 0x3800, 0x7, 0x11}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), &(0x7f00000002c0), 0x10000, r9, 0x0, 0x1c000000007400}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000300000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) 3m6.043982425s ago: executing program 5 (id=1138): sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000000209010300000000000000000100000608000640000000000900000000000016280002000c00028005000100210000000c000280050001"], 0x5c}}, 0x8000) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') lseek(r0, 0x3, 0x0) getdents(r0, 0x0, 0x51) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x8000000b, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd06, 0x4}, 0x6057, 0x6, 0x0, 0x1, 0xb, 0x20005, 0xfff9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0x2, r0, 0x2) socket$kcm(0x29, 0x2, 0x0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000800)='./file0\x00', 0x800, &(0x7f00000009c0)=ANY=[@ANYBLOB="757466382c68696465009e2d2ba14c07726a241ce3757466382c6f76657272696465726f636b7065726d2c6d61703d6f66662c6d6170303030303030303030013030303033372c756e686964652c756e686964652c6f76657272696465726f636b7005000000000000006f66662c6d61703d6e6f726d00"/133, @ANYRES64=0x0, @ANYBLOB="d2060d55107769588bebfb7ad0a30755959f01793e1a5d4bcfa6efe55403df51d73b494928d0ee3f91532f54843e20493c9c59c7c629e588f0eb34b250f874ec42a4c2f9e3243f83b0dcef5a670a8357262f84a029f52ee1cd1df7950e34d813", @ANYBLOB="e96330702da41540a56b6cf44a48a9f2a629075eafe9bc2974330ed6ab1ab5dfc791d364d8ff446cc6dbde65c2e92e95cf7087467b3a5d3073cbc5e7fd49f3054d49ed6a778c890f"], 0x3, 0x6c5, &(0x7f0000000f00)="$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") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000700)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230000) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$peeksig(0x4209, r3, &(0x7f0000000000)={0x2, 0x1}, 0x0) r4 = creat(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x26}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x9, 0xff, 0x7, 0x0, 0x62, 0xd37d1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffffffff, 0x4, @perf_config_ext={0xffffffffffff15ed, 0x7}, 0x5100, 0x0, 0x5, 0x0, 0x200000000081, 0x8002, 0x7fff, 0x0, 0x2cb, 0x0, 0xae}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f0, &(0x7f0000000080)) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x880) write$P9_RXATTRWALK(r6, &(0x7f0000000040)={0xf, 0x1f, 0x1, 0x6}, 0xf) r7 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x80042, 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0xfffffffffffffffd, 0x0) ioctl$MON_IOCG_STATS(r4, 0xc0109207, &(0x7f0000000380)) ioctl$PTP_PEROUT_REQUEST2(r7, 0x40383d0c, &(0x7f00000000c0)={{0x0, 0xa}, {0xfffffffffffffffe, 0x4ccd}, 0xfffffe28, 0x6}) 3m5.810645024s ago: executing program 5 (id=1142): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f000012d000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f00005a4000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)={0x9, 0x50, 0x8, 0x2, 0x8, 0x7}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000b80)={'macvtap0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0x1, 0x6, 0x6, 0x4, 0xd, 0x2, 0x2, 0x0, 0x40}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) io_uring_enter(0xffffffffffffffff, 0x12a, 0x14, 0x17, 0x0, 0x0) 3m4.954501462s ago: executing program 5 (id=1149): sendmsg$NFT_MSG_GETSETELEM(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="440000000d0a050000000000000000000200000709e4010073797a32000000000900020073797a31000000000c000200"/58], 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0xc0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'hsr0\x00'}) openat$tun(0xffffffffffffff9c, 0x0, 0x40241, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000070000000200000007"], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) syz_clone3(&(0x7f0000002440)={0x40800, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)=0x0, {0x5}, &(0x7f0000001340)=""/4096, 0x1000, &(0x7f0000002340)=""/184, &(0x7f0000002400), 0x0, {r0}}, 0x58) prctl$PR_SET_PTRACER(0x59616d61, r8) close(0x3) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x3, 0x3800, 0x7, 0x11}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), &(0x7f00000002c0), 0x10000, r9, 0x0, 0x1c000000007400}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000300000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) 3m4.903342314s ago: executing program 33 (id=1149): sendmsg$NFT_MSG_GETSETELEM(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="440000000d0a050000000000000000000200000709e4010073797a32000000000900020073797a31000000000c000200"/58], 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0xc0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'hsr0\x00'}) openat$tun(0xffffffffffffff9c, 0x0, 0x40241, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000070000000200000007"], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) syz_clone3(&(0x7f0000002440)={0x40800, &(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)=0x0, {0x5}, &(0x7f0000001340)=""/4096, 0x1000, &(0x7f0000002340)=""/184, &(0x7f0000002400), 0x0, {r0}}, 0x58) prctl$PR_SET_PTRACER(0x59616d61, r8) close(0x3) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x3, 0x3800, 0x7, 0x11}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), &(0x7f00000002c0), 0x10000, r9, 0x0, 0x1c000000007400}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000300000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) 1m47.893372841s ago: executing program 6 (id=1799): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x5, 0x950, &(0x7f0000000000)="5bf68d5d87b922b1d072adc750f9686bd1facd150d2237d456501fa0e16013edc0cd82d77a3177eb5ade5b8bd6b818e961666eac5e8193d9c63a98e88a2694ff8441bb487a96920312ebbd2a0ff6e8614ac519404a17d464d31733f4707202fe717df0828b3df941556ebedb46d1d602148754b4fcdedd92fda6ab3cc81ff33bb6e912b0b092bc00a4388391b859670b7fb51dbe95e5911296477205978d72dab405d05d8cef4f6a66240c", 0xab) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x5, 0x9fd, 0x85, 0x41, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x180}, 0x50) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x3, 0x0}, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8a10ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x1c, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0xa}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xca7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='GPL\x00', 0x9, 0x60, &(0x7f0000000200)=""/96, 0x40f00, 0x1, '\x00', r2, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, r3, r5, 0x7, &(0x7f0000000400)=[r1, r1, r1], &(0x7f0000000440)=[{0x3, 0x3, 0xa, 0xc}, {0x5, 0x1, 0xf, 0xc}, {0x0, 0x3, 0x0, 0x1}, {0x4, 0x1, 0x9, 0x1}, {0x2, 0x4, 0x2}, {0x5, 0x5, 0x5, 0xb}, {0x5, 0x4, 0x5, 0xb}], 0x10, 0xfffffffb}, 0x94) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x150, 0x168, 0x9, 0x0, 0xb, 0x380, 0x250, 0x250, 0x380, 0x250, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth0_to_bridge\x00', 'sit0\x00', {}, {}, 0x6c}, 0x6000000, 0x108, 0x150, 0x0, {0x0, 0x28e}, [@common=@inet=@ipcomp={{0x30}}, @common=@inet=@ipcomp={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast2, 'dvmrp0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{}, {0x2}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 1m47.671963938s ago: executing program 6 (id=1801): syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./file0\x00', 0x180c8, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1, 0x242, &(0x7f0000000800)="$eJzs3bFqFFEUBuBjskmWNKYWiwEbq0WtbBeJIA4IK1No5UC0SUSYNKPVPIbP4CP5GKnSjZhZsklcbczm7s58Hyz3wM/Cuc3eLc6d+fDw8/HRl9NP7c/vMR5nMYpo2jbiILZiOzr35uvWRb0bVzUBAGya2aycpu6B1aqqabkTEXt/JMWPJA0BAAAAAAAAAADw35bN/8e5+X8A6DPz//1XVdNyf/7/7Trz/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEA65217v/3HJ3V/AMDtc/4DwPA4/wFgeJz/ADA8b9+9fz3N88NZlo0jzpq6qItu7fKXr/LDJ9mFg8W3zuq62L7Mn3Z5dj3fif15/mxpvhuPH3X57+zFm/xGvhdHq98+AAAAAAAAAAAAAAAAAAAArIVJdmnp/f7J5G95V115PsCN+/ujeDC6s20AAAAAAAAAAAAAAAAAAADARjv9+u24PDn5WCl6U8TztWjjrouItWijL0XqXyYAAAAAAAAAAAAAAAAAABiexaXf1J0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQDqL9/+vroiIpu2k3i4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADQY78CAAD//139ms4=") r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x4c142, 0x12) truncate(&(0x7f0000000940)='./file1\x00', 0x2fffffd) sendfile(r0, r0, 0x0, 0x7e4000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x1004, &(0x7f0000000440)={[{@max_batch_time={'max_batch_time', 0x3d, 0x2004}}, {@max_batch_time={'max_batch_time', 0x3d, 0x2}}, {@debug}, {@block_validity}, {@errors_remount}, {@debug}]}, 0x1, 0x44f, &(0x7f0000000ac0)="$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") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000000)=""/49, 0x0, 0x31, 0x1, 0x8000}, 0x28) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="58000000020601010000000000000000010000040c000300686173683a697000050001000700000005000500020000000900020073797a300000000005000400000000001400078008000840000000d3050014"], 0x58}, 0x1, 0x0, 0x0, 0x2002c0c4}, 0x8004) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x740, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder-control\x00', 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000180)={{0x1, 0x1, 0x18, r4}, './file2\x00'}) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f00000004c0)=0xffffffff00002001) unshare(0x6a040000) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r6) keyctl$chown(0x4, r6, 0xee01, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x1, 0x2, 0x7fff7ffc}]}) sigaltstack(0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0xfc, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="700000001000810500"/20, @ANYRES32=0x0, @ANYBLOB="0580040000000000500012800b00010067656e657665000040000280050008000000002005000d000100000005000d000200000008000b4000001e82060005004e210000140007"], 0x70}}, 0x0) linkat(r3, &(0x7f00000000c0)='./file1\x00', r1, &(0x7f0000000100)='./file1\x00', 0x1400) 1m46.876490215s ago: executing program 6 (id=1803): r0 = perf_event_open(&(0x7f0000000a00)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x650b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0xe}, 0x8, 0x32, 0x43a1bd76, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x3, 0x4, 0x10000, 0x4}, 0x1c) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x34) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000b240)=ANY=[@ANYBLOB="140000002e00f10326bd7000fdffffff06"], 0x14}}, 0x4044080) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = dup3(r3, r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r5, &(0x7f0000004340)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000015051a0000002000000040080000002825ed8a84195f57c1b505e87c739d341addee6670cc794ea8444a3b966596491ad4220b6a666753ea09b9c474358a2033bbc22d893fefa2e619dcd93662393cdd1a3bce5ef2ef57afebfa754f2a84f741a29ba0289aec5aaf2dfc9bb00378e0e7641fbc7ef4c09e19acf0d27eb71ef82014fde338a4b18102d478b4fd"], 0x14}, 0x1, 0x0, 0x0, 0x400400c}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r6, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xd1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4008080}, 0x80) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r8, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000005480), 0xffffffffffffffff, r8}}, 0x18) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'dummy0\x00', 0x0}) r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=ANY=[@ANYBLOB="540000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="15020000fe0f00001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r9, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r11], 0x54}, 0x1, 0xba01, 0x0, 0x4010}, 0x0) 1m46.74410114s ago: executing program 6 (id=1806): syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x10000, &(0x7f0000000640), 0x1, 0x5c5, &(0x7f0000001a00)="$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") r0 = syz_clone(0xc008000, 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x13) ptrace(0x10, r0) ptrace$setsig(0x4203, r0, 0x560, &(0x7f0000000080)={0x1b, 0x3, 0x3ff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x28, 0x140b, 0x400, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x20000010) syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000280)='./bus\x00', 0x3c9c9b, 0x0, 0x0, 0x0, &(0x7f0000000140)) write$UHID_INPUT(r1, &(0x7f0000010140)={0x8, {"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", 0x1000}}, 0x1006) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 1m46.568802456s ago: executing program 6 (id=1808): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x4, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@call={0x85, 0x0, 0x0, 0xbf}]}, &(0x7f0000000400)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680), 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0xff, 0x5, 0x7fc00002}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)) unshare(0x6a040000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newnexthop={0x1c, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0x8, 0x1, 0x8, 0x20005, 0xc, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x82, &(0x7f0000000000)=""/4102, &(0x7f0000001040)=0x1006) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=@newnexthop={0x24, 0x68, 0x1, 0x2, 0x7ffffffc, {}, [@NHA_GROUP={0xc, 0x2, [{0x1, 0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x24008000}, 0x4000) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@ipv4_newroute={0x24, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x25dfdbfd, {0x2, 0x0, 0x10, 0x0, 0x0, 0x4, 0x0, 0x1, 0x20000000}, [@RTA_NH_ID={0x8, 0x1e, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4a044}, 0x4090) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv6_newnexthop={0x24, 0x68, 0x309, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}, @NHA_ID={0x8, 0x1, 0x1}]}, 0x24}}, 0x0) 1m46.092087582s ago: executing program 6 (id=1812): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x5, 0x950, &(0x7f0000000000)="5bf68d5d87b922b1d072adc750f9686bd1facd150d2237d456501fa0e16013edc0cd82d77a3177eb5ade5b8bd6b818e961666eac5e8193d9c63a98e88a2694ff8441bb487a96920312ebbd2a0ff6e8614ac519404a17d464d31733f4707202fe717df0828b3df941556ebedb46d1d602148754b4fcdedd92fda6ab3cc81ff33bb6e912b0b092bc00a4388391b859670b7fb51dbe95e5911296477205978d72dab405d05d8cef4f6a66240c", 0xab) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x5, 0x9fd, 0x85, 0x41, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x180}, 0x50) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x3, 0x0}, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8a10ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x1e, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0xa}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0x10}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xca7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x9, 0x60, &(0x7f0000000200)=""/96, 0x40f00, 0x1, '\x00', r2, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, r3, r5, 0x7, &(0x7f0000000400)=[r1, r1, r1], &(0x7f0000000440)=[{0x3, 0x3, 0xa, 0xc}, {0x5, 0x1, 0xf, 0xc}, {0x0, 0x3, 0x0, 0x1}, {0x4, 0x1, 0x9, 0x1}, {0x2, 0x4, 0x2}, {0x5, 0x5, 0x5, 0xb}, {0x5, 0x4, 0x5, 0xb}], 0x10, 0xfffffffb}, 0x94) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x150, 0x168, 0x9, 0x0, 0xb, 0x380, 0x250, 0x250, 0x380, 0x250, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth0_to_bridge\x00', 'sit0\x00', {}, {}, 0x6c}, 0x6000000, 0x108, 0x150, 0x0, {0x0, 0x28e}, [@common=@inet=@ipcomp={{0x30}}, @common=@inet=@ipcomp={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast2, 'dvmrp0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{}, {0x2}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 1m46.091700422s ago: executing program 34 (id=1812): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x5, 0x950, &(0x7f0000000000)="5bf68d5d87b922b1d072adc750f9686bd1facd150d2237d456501fa0e16013edc0cd82d77a3177eb5ade5b8bd6b818e961666eac5e8193d9c63a98e88a2694ff8441bb487a96920312ebbd2a0ff6e8614ac519404a17d464d31733f4707202fe717df0828b3df941556ebedb46d1d602148754b4fcdedd92fda6ab3cc81ff33bb6e912b0b092bc00a4388391b859670b7fb51dbe95e5911296477205978d72dab405d05d8cef4f6a66240c", 0xab) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x5, 0x9fd, 0x85, 0x41, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x180}, 0x50) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x3, 0x0}, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8a10ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x1e, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0xa}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0x10}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xca7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x9, 0x60, &(0x7f0000000200)=""/96, 0x40f00, 0x1, '\x00', r2, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, r3, r5, 0x7, &(0x7f0000000400)=[r1, r1, r1], &(0x7f0000000440)=[{0x3, 0x3, 0xa, 0xc}, {0x5, 0x1, 0xf, 0xc}, {0x0, 0x3, 0x0, 0x1}, {0x4, 0x1, 0x9, 0x1}, {0x2, 0x4, 0x2}, {0x5, 0x5, 0x5, 0xb}, {0x5, 0x4, 0x5, 0xb}], 0x10, 0xfffffffb}, 0x94) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x150, 0x168, 0x9, 0x0, 0xb, 0x380, 0x250, 0x250, 0x380, 0x250, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth0_to_bridge\x00', 'sit0\x00', {}, {}, 0x6c}, 0x6000000, 0x108, 0x150, 0x0, {0x0, 0x28e}, [@common=@inet=@ipcomp={{0x30}}, @common=@inet=@ipcomp={{0x30}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast2, 'dvmrp0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{}, {0x2}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 4.170511428s ago: executing program 1 (id=2994): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000180)={r0, 0xffffffffffffffff, 0x26, 0x2000000, @val=@uprobe_multi={0x0, 0x0, 0x0, 0x401, 0x0, 0x1}}, 0x40) r1 = memfd_create(&(0x7f00000008c0)='\x00', 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() fcntl$setownex(r2, 0xf, &(0x7f0000000100)={0x0, r3}) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) fcntl$lock(r0, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x6d6, 0x0, 0xffffffffffffffff}) fsetxattr$security_selinux(r1, &(0x7f0000000900), &(0x7f0000000940)='system_u:object_r:klogd_var_run_t:s0\x00', 0x25, 0x3) openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x800, 0x0) 4.064472562s ago: executing program 1 (id=2996): openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/devices.allow\x00', 0x2, 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$inet(0xa, 0x801, 0x84) socket$inet(0xa, 0x801, 0x84) r1 = socket$inet(0xa, 0x801, 0x84) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) listen(r2, 0xfff) listen(r1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x4) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) listen(r4, 0x3) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r5, 0x0, 0x0, 0x4004012, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r3) writev(r3, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x6, 0x80000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="38000000560001000000", @ANYRES32=r6, @ANYBLOB="200001"], 0x38}, 0x1, 0x0, 0x0, 0x4044081}, 0x40004010) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="020100020e0000003cbd7040fcdb0000000a004e210000100000000000000000000000000000000000040000000000000005000500f20000020a004e2300000007ff010000000000000000000000000001ff03000000000000020013000200000029bd70000635000000000000000000ac2a624d679fbf40917e9f64ed4180e641a6272ad0328d7c86750e92374a8042c1a6ac1c3e7f8ce24ca1302887d273e114f5c9580e73979d2fec8d6e5fdac1bac2e924939c9ce587ee97c5947eb98d08ffb52c14327d81605af9197ed34c77a1a92bfce437e5d95e5fdf331ab5504871ee06c55f342d3d2146bf9cde809d361bf8c1f7bd0162eecf64a5dd117b59c8e9155a8a19d2cdc450f16176367bcbcc665f6f2da3fcc962a485886b1db2698262635def5391ca"], 0x70}, 0x1, 0x7}, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') pipe(&(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) 3.995137104s ago: executing program 1 (id=2998): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x7, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$pppl2tp(0x18, 0x1, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x2, 0x3, 0x3, 0x1, 0x0, 0xfffffffffffffff4}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0xf}, 0x94) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x0, 0x4}}, 0x2e) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x1000000000000b0, 0x42758, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0xd07, 0x4}, 0x2000, 0x8, 0x0, 0x0, 0xb, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000300)={{0x1, 0x1, 0x18, r5}, './file1\x00'}) write$selinux_attr(r6, &(0x7f0000000340)='system_u:object_r:selinux_config_t:s0\x00', 0x26) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000e40), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000700)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000000fedbdf25030000005800018044000400200001000a000000000000040000000040000000000000000000000104800000200002000a0000000000000000000000000000000000000000000000010000000d0001007564703a73797a30000000004603a3d0cdde3359b6211746e8"], 0x6c}}, 0x0) r9 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000b80)={'batadv_slave_1\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b00000000000000000000000915000000000000", @ANYRES32=r6, @ANYRES16, @ANYRES32=r8, @ANYRESOCT=r4, @ANYBLOB="00000000050000000500"/28, @ANYRESDEC=r8, @ANYRES32=r5], 0x50) sendmsg$nl_route(r9, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="280000006800010025bd7000000000000200030004000000080006000100000008000500", @ANYRES32=r10, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x20004011}, 0x40000) 3.670348735s ago: executing program 1 (id=3000): openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x63) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f0000000240)='.\x00', 0x60000526) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x63b5, &(0x7f0000006680)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0xf1, @empty, 0x19f49a9}], 0x1c) listen(r2, 0x100) r3 = dup(r2) sendmsg$inet_sctp(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@in={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="d9", 0x1}], 0x1, &(0x7f0000000280)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x37}}], 0x18}, 0x8050) inotify_add_watch(r3, &(0x7f0000000480)='./file0\x00', 0x4200000c) r4 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) r5 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x121602, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0xf) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCVHANGUP(r5, 0x5437, 0x2) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, 0x0) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r7, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000f40)={0x38, r6, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVKEY={0x1c, 0x2f, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}]}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0102}}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4010}, 0x2000c040) r8 = syz_clone(0x0, &(0x7f0000000180)="2890d0e2807b769cbc9a024d6d50d31837938815fa0d109667d279986926ab3e8ec547c7a03ffc8a3041d9c3a330e670e29435a7abb082a355c5bf99cae8e304ffa00a94bf6b15b15682f0d124bdd12cec172e1d86a65ad79f307d8b09", 0x5d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)="6dfd2110954b9701875d56c8c44658235d24996b3f82f7ff171d1aa3c2d5ba0f7a989e1c085a0a8579422dd42ec863ba1f31d87925a97fcda7496001c6f4e6") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x54, r4, 0x8, 0x70bd28, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8, 0x1c, r8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r9}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x1) rseq(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x6}, 0x20, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x18000, 0xbe) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 3.186233101s ago: executing program 7 (id=3003): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x40080c0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e) prctl$PR_MCE_KILL(0x35, 0x0, 0x8) prctl$PR_MCE_KILL(0x35, 0x0, 0x10) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xfff, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000440)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000800)="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", 0x2ac}, {&(0x7f0000000bc0)="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", 0x192}, {&(0x7f0000000140)}], 0x3, 0x0, 0x0, 0x900}}], 0x1, 0x0) r5 = memfd_create(&(0x7f0000000ec0)='\x103q}2[\xe0\x9a\xee\xaf\x03\x97\x9et\v\"|Ma\x86\xe7\xc0\x14\x9f\xb9h\xb1\x96\xe7=I\x860S6\xb5\xa8\xc2\x95Je%\xfeG\'e\xe5\x8f\xf8\xd2\x1c\xc0\xfb\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94k\xcd\t\x00\x90k\xd6\x05\xb6\x03\x00\x00\x00A\xc5\x9c_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2Oc\xc0c\x03gB!\xb0\xb8n\x01\x9bT\x95\x10\x86\xe8$\x7f\r[\xf9\x0e1v\xb1\n\x88\v\x95uy\xb5:`\x8b\nC\x18A;\xaa%\xaf\xc7\xa3\xac\xa2D\xb5\xe2\xe1\xdc(\xfd\x05\x9fB\x84O\xfe@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\xa0\x17\xe3\xac\xe9\xc9\xa7\x8a\x1b\x03\"&\xac\xcap>\xccZ\x01\xbc\x18\xc1\xb9\xe9\v\x8b\x9c\xb4Q\xd4\x96EV<>\x99\xca\xb3\xe0\xc4tL\xed\xf5W\xbd#\xcf\x8a\x84\xed\x9f/\xd4\xbb\xea;-Dp\xf8\xd0F\x90\xf8\x92Ip6\xf4\x16\xe8\x14\xe0\x92!\x92-F\xe2\x14D\x91\xa8b\x04\xdd\x1d\a\xdc\xe0\x18\x85{\x80Q\xf6k\x96\xfaQ\x9fW\vO\xf0\xe4O\\\xceS\xf2\xde\x049d\x06#\x88\xc3\xdf\x85O\x1c\xc3\xad?r\xd7\x0e\x00\xd7\x83\xb0\x88\x9c\xf6Y-F\x98\xdd\x9c~\xfd\x95\xc3\xb6lC\xaa\"Y\xa2K\xecz\x84:*\xf5Y\xd1\x9b1\x91\x9b\x15\xd4\xec\x02o\x01&\xaa\x90w\xc4\xc7yn\xb5\x1ag\xab&?\xbe\xcb\xe8v\xa8\xe0\xa4\x81sW\xacf\x149\xd2}\xefCGa\x9a$4\x8c\xa5!p\x83\x05\x96%\x02%\xabj\n\b\xc8NC\x91}&y\xd3\xe1\xeep\'\xc5\xab\x19GsX5\x8c\n\x9fh\xee;4\xb1%V\xe0\xa9\x8e\xf30:\xd8\x18N~G\x139\xcas\xf4D\xd4\xd0s\r3\xcb\x9a&\xdf+(\xc9S\x9eL5\x84\xb1\x90pN\xe7/\r\b\x9a\xf13Q\xf9\xdf\x7fX\xa0\xafK\xefh\xbfOv\x9bh\xb3\xc0\xf5\x80\xba\"@\'\x02\xafi\xeaE\xa6a6F\xde\xd4\xfa\x84\xe4+A\xb7\xa2\x8f\xc9\xee|xxn\xefw\x93]%\xd0\x19\x132\x86\xabn\xfe\x91\xb6Cl\xcf\x04\x1cq\xc1\x1d~\x8d\x01\x83\x93_\x83\x8a`v\xb0K,|S\xe4\xba\xb1\f\xc8`\xa6s\xad\x11\xd4wG\x80u\x87u\xff\x87\xee', 0x2) ioctl$FS_IOC_RESVSP(r5, 0x40305828, 0x0) fcntl$addseals(r5, 0x409, 0xb) r6 = socket(0x10, 0x803, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000640)=@newlink={0x40, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4048b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @rand_addr=0xc0586300}, @IFLA_IPTUN_FLAGS={0x6, 0x8, 0x3}]}}}]}, 0x40}}, 0x0) sendto(r6, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x14c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x188}, {&(0x7f00000007c0)=""/154, 0x8}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) getpid() r8 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r8) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x41000004, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x8, &(0x7f0000000100)) 3.185484772s ago: executing program 1 (id=3004): r0 = perf_event_open(&(0x7f0000000a00)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x650b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0xe}, 0x8, 0x32, 0x43a1bd76, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x3, 0x4, 0x10000, 0x4}, 0x1c) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x34) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000b240)=ANY=[@ANYBLOB], 0x14}}, 0x4044080) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = dup3(r3, r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r5, &(0x7f0000004340)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000015051a0000002000000040080000002825ed8a84195f57c1b505e87c739d341addee6670cc794ea8444a3b966596491ad4220b6a666753ea09b9c474358a2033bbc22d893fefa2e619dcd93662393cdd1a3bce5ef2ef57afebfa754f2a84f741a29ba0289aec5aaf2dfc9bb00378e0e7641fbc7ef4c09e19acf0d27eb71ef82014fde338a4b18102d478b4fd"], 0x14}, 0x1, 0x0, 0x0, 0x400400c}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r6, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xd1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4008080}, 0x80) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r8, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000005480), r9, r8}}, 0x18) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'dummy0\x00', 0x0}) r11 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=ANY=[@ANYBLOB="540000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="15020000fe0f00001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r10, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r12], 0x54}, 0x1, 0xba01, 0x0, 0x4010}, 0x0) 1.635034415s ago: executing program 7 (id=3010): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x30da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) open(&(0x7f00000001c0)='./file0\x00', 0x80ff, 0x88) epoll_create1(0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x100007, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x1000, 0x20da, 0x6, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0x1, 0xffffffffffffffff, 0xb) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x800000003, &(0x7f0000000200), 0x111, 0x6}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940), 0x2, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r3, 0x4236}], 0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x2, 0x4}}, 0x20) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffa}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="600000000206010300000000000000000000000005000400010000000900020073797a31000000000500010007000000050005000a000000140007800800114000000000050015000c00000013000300686173683a6e65742c6966616365"], 0x60}}, 0x44040880) ioctl$BTRFS_IOC_SUBVOL_SYNC_WAIT(r0, 0x40109441, &(0x7f0000000180)={0x6, 0x4, 0x47ca1859}) creat(&(0x7f00000003c0)='./bus\x00', 0xea) close(r0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 1.594408986s ago: executing program 4 (id=3011): openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x63) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f0000000240)='.\x00', 0x60000526) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x63b5, &(0x7f0000006680)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0xf1, @empty, 0x19f49a9}], 0x1c) listen(r2, 0x100) r3 = dup(r2) sendmsg$inet_sctp(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@in={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="d9", 0x1}], 0x1, &(0x7f0000000280)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x37}}], 0x18}, 0x8050) inotify_add_watch(r3, &(0x7f0000000480)='./file0\x00', 0x4200000c) r4 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) r5 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x121602, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0xf) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TIOCVHANGUP(r5, 0x5437, 0x2) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, 0x0) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r6, 0x0, 0x2000c040) r7 = syz_clone(0x0, &(0x7f0000000180)="2890d0e2807b769cbc9a024d6d50d31837938815fa0d109667d279986926ab3e8ec547c7a03ffc8a3041d9c3a330e670e29435a7abb082a355c5bf99cae8e304ffa00a94bf6b15b15682f0d124bdd12cec172e1d86a65ad79f307d8b09", 0x5d, &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)="6dfd2110954b9701875d56c8c44658235d24996b3f82f7ff171d1aa3c2d5ba0f7a989e1c085a0a8579422dd42ec863ba1f31d87925a97fcda7496001c6f4e6") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x54, r4, 0x8, 0x70bd28, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8, 0x1c, r7}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r8}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x1) rseq(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x6}, 0x20, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x18000, 0xbe) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 1.583685776s ago: executing program 1 (id=3012): r0 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000b80)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="280000006800010025bd7000000000000200030004000000080006000100000008000500", @ANYRES32=r1, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x20004011}, 0x40000) 1.46513502s ago: executing program 4 (id=3013): openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newnexthop={0x1c, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0x8, 0x1, 0x8, 0x20005, 0xc, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x80805, 0x0) getsockopt$bt_hci(r2, 0x84, 0x82, &(0x7f0000000000)=""/4102, &(0x7f0000001040)=0x1006) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=@newnexthop={0x24, 0x68, 0x1, 0x2, 0x7ffffffc, {}, [@NHA_GROUP={0xc, 0x2, [{0x1, 0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x24008000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@ipv4_newroute={0x24, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x25dfdbfd, {0x2, 0x0, 0x10, 0x0, 0x0, 0x4, 0x0, 0x1, 0x20000000}, [@RTA_NH_ID={0x8, 0x1e, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4a044}, 0x4090) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 1.278358107s ago: executing program 3 (id=3016): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001140)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021ec0700000c0a01030000000000000000070000090900020073797a31000000000900010073797a3000000000c0070380bc0700800800034000000002b0070b802c0001800a0001006c696d69740000001c0002800c00024000000000000000000c0001400000000000000003200001800a000100"], 0x870}}, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x80, 0x0) lseek(r1, 0x2000000000002, 0x0) getdents(r1, 0x0, 0x58) 1.213972859s ago: executing program 4 (id=3017): timer_create(0x0, &(0x7f0000000800)={0x0, 0x21, 0x0, @thr={0x0, &(0x7f0000000580)}}, &(0x7f00000003c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(0x0, 0x1, &(0x7f0000000040), 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap$usbmon(&(0x7f000000c000/0x3000)=nil, 0x3000, 0x1000000, 0x50, 0xffffffffffffffff, 0x3) sendmsg$nl_generic(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x1d0, 0x11, 0x300, 0x70bd2b, 0x8000, {0xd}, [@typed={0x14, 0x139, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @generic="73c0f2f331fcdecb1cf6eb0304d71f5bd20f4e65beaf02cbc037", @typed={0xbe, 0xbd, 0x0, 0x0, @binary="f8c6ef8732b72ac0402bea95a91e474f9e4292f454413584271ecf3165f6defb789dbc702f3bd27e0b6fbbcf9f866f9d4e95bca711f0b3c3530086cd4f247ee887d76b4d665704cbd07a85c74612ad9c5398faf8744566fdf4b966913d95ee79c1c02cc0cd0f1f1eca110a22c85561de0ca995569c8dd2f30c95634c190d92d4488a427a2dfd6d957a6de629b13cd0cb0cdb8a1c99c1536ca8097486cb936d91de14b447bcdd9190a929b08f1475fb93f2a7819d2cd5819a4750"}, @nested={0x20, 0x11d, 0x0, 0x1, [@nested={0x4, 0x77}, @typed={0x14, 0x13c, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00'}, @nested={0x4, 0x44}]}, @generic="91509063ecff1832cdd54c979ee86b48c3e151097a5c87be5ab4297fbeec713538554a9df80d7ed1d7a6373c5c1d94f34680aa5d937afbf4ae115f3c3452cf4664cfd09590f96bf65bc874aa0deb2565204c65846d7ec12278a7e17aca78dce8265c1c80036ff52f3f5cf9db90226063d7da1f2f061e9cb2f2630c4e86424ad4def5", @generic="bdad0bfe55cad06269b7c9dd97bc525e05b17a0d6ce4a2db8a070525d0ae89644321c176d7edcb0b6a"]}, 0x1d0}, 0x1, 0x0, 0x0, 0x24008081}, 0x8010) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x200400c0) 1.162703291s ago: executing program 2 (id=3018): socket(0x2b, 0x80801, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f000068c000/0xc000)=nil, &(0x7f0000817000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0x2bb}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 1.120957982s ago: executing program 2 (id=3019): openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/devices.allow\x00', 0x2, 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$inet(0xa, 0x801, 0x84) socket$inet(0xa, 0x801, 0x84) r1 = socket$inet(0xa, 0x801, 0x84) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) listen(r2, 0xfff) listen(r1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x4) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) listen(r4, 0x3) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r5, 0x0, 0x0, 0x4004012, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r3) writev(r3, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x6, 0x80000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="38000000560001000000", @ANYRES32=r6, @ANYBLOB="200001"], 0x38}, 0x1, 0x0, 0x0, 0x4044081}, 0x40004010) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x70}, 0x1, 0x7}, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') pipe(&(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) 1.065862344s ago: executing program 2 (id=3020): sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)='M', 0x1}], 0x1}, 0x1) r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) unshare(0x2c020400) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000040000000400000008"], 0x50) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f00000001c0)=0x3) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r1, &(0x7f00000001c0), &(0x7f0000000080)=""/52}, 0x20) socket$netlink(0x10, 0x3, 0x14) fcntl$getflags(r1, 0x401) ptrace$setregs(0xd, r0, 0x20000000002, &(0x7f0000000040)) ptrace$cont(0x21, r0, 0x80000001, 0x4) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0xfffffffe}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x10, 0x40, 0x8203, 0x3, 0x4, 0x6, 0x69, 0x25e, r3}, 0x20) r4 = socket$inet_smc(0x2b, 0x1, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40000000020800034000000014480000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c000380180000800c00018006000100d1030000050006407d00000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x2c, 0xd, 0xa, 0x301, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc000011}, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, 0x0, 0x0) 954.655638ms ago: executing program 7 (id=3021): syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./file0\x00', 0x180c8, &(0x7f00000006c0)=ANY=[@ANYBLOB="6e66732c646f74732c636865636b3d7374726963742c646f74732c6572726f72733d72656d6f756e742d726f2c00fc403bb14281bbfb9b8213bd6284536d64789a24dd73b98b3e33cb47fed8a736464bb62e9e891aa832722dfc28bfa4489b3a127a503e72326b737d0f67c97be6f37ef46154dec39ef8718946ffc8cd4d735a0b101c1722477bbe2f923577ea51f7116f17c3ddf5c497fba2d0bb3272d123b31e9461d4e2d65a42e1174fa269de92e463fc1ca202650fe2628e15341e45dce6c0de2367bdb50cc5b2b462e1d45fc3265f1a88561ab6afb1b73a3b340b5c73055fc6e601843a59f3cdeb36991cfa985453287d4c9d2d6e21adddc57a607369c682e821b20dc0efd51d12f386f3f8e53c05e696e50c7c3f79b1b0bd7e5cfaf3f63d8949c8dd2fd94aa0f259a4cb9412c30c45f9d4d63d267d2a43f03a47fa56b3"], 0x1, 0x242, &(0x7f0000000800)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x4c142, 0x12) truncate(&(0x7f0000000940)='./file1\x00', 0x2fffffd) sendfile(r0, r0, 0x0, 0x7e4000) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x1004, &(0x7f0000000440)={[{@max_batch_time={'max_batch_time', 0x3d, 0x2004}}, {@max_batch_time={'max_batch_time', 0x3d, 0x2}}, {@debug}, {@block_validity}, {@errors_remount}, {@debug}]}, 0x1, 0x44f, &(0x7f0000000ac0)="$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") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, 0x0, 0x8004) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x740, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r2) 934.697009ms ago: executing program 2 (id=3022): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x1, 0x6}, 0x4) close(r0) 897.95275ms ago: executing program 3 (id=3023): r0 = perf_event_open(&(0x7f0000000a00)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x650b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0xe}, 0x8, 0x32, 0x43a1bd76, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x3, 0x4, 0x10000, 0x4}, 0x1c) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x34) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f000000b240)=ANY=[@ANYBLOB], 0x14}}, 0x4044080) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = dup3(r3, r3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r5, &(0x7f0000004340)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="000015051a0000002000000040080000002825ed8a84195f57c1b505e87c739d341addee6670cc794ea8444a3b966596491ad4220b6a666753ea09b9c474358a2033bbc22d893fefa2e619dcd93662393cdd1a3bce5ef2ef57afebfa754f2a84f741a29ba0289aec5aaf2dfc9bb00378e0e7641fbc7ef4c09e19acf0d27eb71ef82014fde338a4b18102d478b4fd"], 0x14}, 0x1, 0x0, 0x0, 0x400400c}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, r6, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xd1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4008080}, 0x80) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r8, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000005480), r9, r8}}, 0x18) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'dummy0\x00', 0x0}) r11 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=ANY=[@ANYBLOB="540000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="15020000fe0f00001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r10, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r12], 0x54}, 0x1, 0xba01, 0x0, 0x4010}, 0x0) 873.220031ms ago: executing program 2 (id=3024): r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, 0x0, 0x40004010) 822.680642ms ago: executing program 4 (id=3025): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000540)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) sendmmsg$inet(r0, &(0x7f00000060c0)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000140)='@', 0x1}, {&(0x7f00000007c0)='y', 0x1}, {&(0x7f0000000340)="b9", 0x1}, {&(0x7f0000000940)="99", 0x1}, {&(0x7f00000008c0)='z', 0x1}, {&(0x7f00000009c0)='~', 0x1}, {&(0x7f0000000a00)='x', 0x1}, {&(0x7f0000000440)="06", 0x1}, {&(0x7f0000000580)='k', 0x1}, {&(0x7f00000006c0)="1d", 0x1}, {&(0x7f0000000800)='a', 0x1}, {&(0x7f0000000280)='$', 0x1}], 0xc}}, {{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000001040)="fc", 0x1}, {&(0x7f0000001080)="c9", 0x1}, {&(0x7f0000002180)='-', 0x1}, {0x0}, {&(0x7f00000033c0)="c4", 0x1}], 0x5}}], 0x2, 0x4000000) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000)=0x7fffffff, 0x4) 822.382762ms ago: executing program 2 (id=3026): r0 = socket$netlink(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={r1, 0xffffffffffffffff}, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x80002, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x10, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) readv(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001f80)={&(0x7f0000001d00)=@qipcrtr={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0x80, 0x0}, 0x0) recvmsg(r4, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x40002182) sendmsg(r4, &(0x7f0000000280)={&(0x7f0000000000)=@l2tp6={0x2a, 0x0, 0xc58, @private2, 0x8, 0x3}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x38}, 0x40) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='./file2\x00', 0x4200, 0x154) readlinkat(r5, &(0x7f0000000440)='./file2\x00', &(0x7f0000000480)=""/134, 0x86) ioctl$TIOCVHANGUP(r3, 0x5437, 0x2) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0xfff, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="120000000200000008000000ebd0000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000004"], 0x50) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x40443, 0x106) fallocate(r6, 0x8, 0x4000, 0x10000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="00000014004aedfe2396e0a1f50000000000b70500000800000085000000a500"], &(0x7f0000000240)='GPL\x00', 0x4, 0x4, &(0x7f0000002500)=""/4105, 0x0, 0x68}, 0x94) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x60, &(0x7f0000000300)={&(0x7f0000000900)=ANY=[@ANYBLOB="5c00000010001ffffcffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000340012800b0001006772657461700000240002800800070064010100060003001008000008001500700f0d0008000700ac1414bb08000a00", @ANYRES32], 0x5c}}, 0x40) 771.853874ms ago: executing program 4 (id=3027): openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newnexthop={0x1c, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0x8, 0x1, 0x8, 0x20005, 0xc, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x80805, 0x0) getsockopt$bt_hci(r2, 0x84, 0x82, &(0x7f0000000000)=""/4102, &(0x7f0000001040)=0x1006) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=@newnexthop={0x24, 0x68, 0x1, 0x2, 0x7ffffffc, {}, [@NHA_GROUP={0xc, 0x2, [{0x1, 0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x24008000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@ipv4_newroute={0x24, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x25dfdbfd, {0x2, 0x0, 0x10, 0x0, 0x0, 0x4, 0x0, 0x1, 0x20000000}, [@RTA_NH_ID={0x8, 0x1e, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4a044}, 0x4090) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 521.976893ms ago: executing program 7 (id=3028): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000540)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000060c0)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000140)='@', 0x1}, {&(0x7f00000007c0)='y', 0x1}, {&(0x7f0000000340)="b9", 0x1}, {&(0x7f0000000940)="99", 0x1}, {&(0x7f00000008c0)='z', 0x1}, {&(0x7f00000009c0)='~', 0x1}, {&(0x7f0000000a00)='x', 0x1}, {&(0x7f0000000440)="06", 0x1}, {&(0x7f0000000580)='k', 0xffffffc6}, {&(0x7f00000006c0)="1d", 0x1}, {&(0x7f0000000800)='a', 0x1}, {&(0x7f0000000280)='$', 0x1}], 0xc}}, {{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000001040)="fc"}, {&(0x7f0000001080)="c9", 0x1}, {&(0x7f0000002180)='-', 0x1}, {&(0x7f0000002240)='R', 0x1}, {&(0x7f00000033c0)="c4", 0x1}], 0x5}}], 0x2, 0x4000000) 521.523742ms ago: executing program 3 (id=3029): openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/devices.allow\x00', 0x2, 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$inet(0xa, 0x801, 0x84) socket$inet(0xa, 0x801, 0x84) r1 = socket$inet(0xa, 0x801, 0x84) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) listen(r2, 0xfff) listen(r1, 0x1) r3 = socket$netlink(0x10, 0x3, 0x4) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) listen(r4, 0x3) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r5, 0x0, 0x0, 0x4004012, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r3) writev(r3, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x6, 0x80000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="380000005600010000000000000000", @ANYRES32=r6, @ANYBLOB="200001"], 0x38}, 0x1, 0x0, 0x0, 0x4044081}, 0x40004010) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x70}, 0x1, 0x7}, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') pipe(&(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) 454.545254ms ago: executing program 7 (id=3030): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8000000, '\x00', 0x0, 0x0}, 0x50) r1 = socket(0x2, 0x80805, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000002e00)={r3, 0x5, 0x2}, &(0x7f0000002e40)=0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000140), &(0x7f0000000100)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x10, &(0x7f00000003c0)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x1005, &(0x7f00000014c0)=""/4101, 0x0, 0xc}, 0x94) 374.090878ms ago: executing program 3 (id=3031): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8000000, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000140), &(0x7f0000000100)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x10, &(0x7f00000003c0)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x1005, &(0x7f00000014c0)=""/4101, 0x0, 0xc}, 0x94) (fail_nth: 1) 351.078618ms ago: executing program 7 (id=3032): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) (async) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x17440000) (async, rerun: 64) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) connect$unix(r1, &(0x7f0000000500)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) (async, rerun: 32) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000740)=@mangle={'mangle\x00', 0x64, 0x6, 0x6d8, 0x128, 0x1f8, 0x490, 0x0, 0x128, 0x608, 0x608, 0x608, 0x608, 0x608, 0x6, 0x0, {[{{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@frag={{0x30}, {[0x5, 0x4], 0x5, 0x21, 0x2}}, @common=@inet=@length={{0x28}, {0x7, 0xb0, 0x81}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x108, 0x150, 0x0, {}, [@common=@unspec=@connmark={{0x30}}, @common=@ah={{0x30}, {[0x4d6, 0x4d4], 0xfffffff7, 0x5, 0x3}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv6=@private1, 0x2, 0x78}}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={{0x30}, {[0x2]}}, @common=@hbh={{0x48}, {0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}]}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0xcb, 0x9}}}, {{@uncond, 0x0, 0x138, 0x178, 0x0, {}, [@common=@dst={{0x48}, {0xfffffffc, 0x0, 0x0, [0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffe]}}, @common=@dst={{0x48}, {0x0, 0x4, 0x0, [0x6, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe], 0xff}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@loopback, 0x4e24}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x738) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000300)={@local, 0x0, r5}) (async, rerun: 32) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="cc", 0x1}], 0x1}, 0x0) (async) sendmsg$rds(0xffffffffffffffff, &(0x7f0000003a80)={&(0x7f0000000100)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10, &(0x7f0000000dc0)=[{&(0x7f0000000200)=""/41, 0x29}], 0x16, 0x0, 0x0, 0x8000}, 0x48004) set_mempolicy(0x6005, &(0x7f0000000000)=0xfffffffffffffffd, 0x4) (async) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@gettclass={0x24, 0x2a, 0x10, 0x870bd25, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0xfff2, 0xc}, {0xd, 0xa}, {0xffff, 0xb}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x48801}, 0x4004) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000340)='./file1\x00', 0x200000, &(0x7f00000000c0)={[{@block_validity}, {}, {@sysvgroups}, {@norecovery}, {@dioread_nolock}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@norecovery}]}, 0x3, 0x566, &(0x7f00000015c0)="$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") r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r9, &(0x7f0000000000), 0x208e24b) (async, rerun: 64) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), r9) (async, rerun: 64) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000e80)=ANY=[@ANYBLOB="24000000120001002cbd7000fedbdf2508001900b21d7ed8b2a24bb3834e97120c1d11ba26b17fd28134e0080f63affc932170d140280b8d337039198b11442eff0300006098dfc74c06191415b7a06877a69ef94cf00ab1e29a9b72e9586699ba48cefd8fb67ff3a41841c9d03b8c312c96f24ce64eee9a89294ca1408c4d9bb3e0aa633bf98b609b7720211a7d687420946c8da20f29d68c9f7f5c5d9dd706dc348173cc53f9a423af2456c7e6eeda1421fb06d44c2521", @ANYRES32=0x0, @ANYBLOB="0c005c800800bd8004003b80"], 0x24}], 0x1}, 0x0) 81.143348ms ago: executing program 4 (id=3033): syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./file0\x00', 0x180c8, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1, 0x242, &(0x7f0000000800)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x4c142, 0x12) truncate(&(0x7f0000000940)='./file1\x00', 0x2fffffd) sendfile(r0, r0, 0x0, 0x7e4000) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x1004, &(0x7f0000000440)={[{@max_batch_time={'max_batch_time', 0x3d, 0x2004}}, {@max_batch_time={'max_batch_time', 0x3d, 0x2}}, {@debug}, {@block_validity}, {@errors_remount}, {@debug}]}, 0x1, 0x44f, &(0x7f0000000ac0)="$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") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="58000000020601010000000000000000010000040c000300686173683a697000050001000700000005000500020000000900020073797a300000000005000400000000001400078008000840000000d3050014"], 0x58}, 0x1, 0x0, 0x0, 0x2002c0c4}, 0x8004) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x740, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r2) 80.481228ms ago: executing program 3 (id=3042): openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newnexthop={0x1c, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0x8, 0x1, 0x8, 0x20005, 0xc, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x80805, 0x0) getsockopt$bt_hci(r2, 0x84, 0x82, &(0x7f0000000000)=""/4102, &(0x7f0000001040)=0x1006) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=@newnexthop={0x24, 0x68, 0x1, 0x2, 0x7ffffffc, {}, [@NHA_GROUP={0xc, 0x2, [{0x1, 0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x24008000}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@ipv4_newroute={0x24, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x25dfdbfd, {0x2, 0x0, 0x10, 0x0, 0x0, 0x4, 0x0, 0x1, 0x20000000}, [@RTA_NH_ID={0x8, 0x1e, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4a044}, 0x4090) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 0s ago: executing program 3 (id=3034): syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./file0\x00', 0x180c8, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1, 0x242, &(0x7f0000000800)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x4c142, 0x12) truncate(&(0x7f0000000940)='./file1\x00', 0x2fffffd) sendfile(r0, r0, 0x0, 0x7e4000) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x1004, &(0x7f0000000440)={[{@max_batch_time={'max_batch_time', 0x3d, 0x2004}}, {@max_batch_time={'max_batch_time', 0x3d, 0x2}}, {@debug}, {@block_validity}, {@errors_remount}, {@debug}]}, 0x1, 0x44f, &(0x7f0000000ac0)="$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") bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYBLOB="58000000020601010000000000000000010000040c000300686173683a697000050001000700000005000500020000000900020073797a300000000005000400000000001400078008000840000000d3050014"], 0x58}, 0x1, 0x0, 0x0, 0x2002c0c4}, 0x8004) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x740, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r2) kernel console output (not intermixed with test programs): crtr_socket permissive=1 [ 235.057017][ T9136] loop6: detected capacity change from 0 to 512 [ 235.069010][ T9136] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 235.082207][ T28] audit: type=1400 audit(1776829214.079:3043): avc: denied { mount } for pid=9135 comm="syz.6.1663" name="/" dev="loop6" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 235.107705][ T9136] EXT4-fs warning (device loop6): dx_probe:837: inode #2: comm syz.6.1663: Unimplemented hash flags: 0x0001 [ 235.125334][ T9136] EXT4-fs warning (device loop6): dx_probe:934: inode #2: comm syz.6.1663: Corrupt directory, running e2fsck is recommended [ 235.145542][ T8442] udevd[8442]: inotify_add_watch(7, /dev/loop6p2, 10) failed: No such file or directory [ 235.268783][ T28] audit: type=1400 audit(1776829214.248:3044): avc: denied { create } for pid=9135 comm="syz.6.1663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 235.300428][ T9136] netlink: 'syz.6.1663': attribute type 4 has an invalid length. [ 235.312604][ T28] audit: type=1400 audit(1776829214.248:3045): avc: denied { write } for pid=9135 comm="syz.6.1663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 235.334024][ T28] audit: type=1400 audit(1776829214.248:3046): avc: denied { read } for pid=9135 comm="syz.6.1663" dev="nsfs" ino=4026533658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 235.528560][ T9136] netlink: 68 bytes leftover after parsing attributes in process `syz.6.1663'. [ 236.142562][ T9147] lo speed is unknown, defaulting to 1000 [ 236.312098][ T28] audit: type=1400 audit(1776829214.248:3047): avc: denied { open } for pid=9135 comm="syz.6.1663" path="net:[4026533658]" dev="nsfs" ino=4026533658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 236.410956][ T9157] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9157 comm=syz.4.1669 [ 236.428236][ T7378] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 236.538275][ T9163] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1671'. [ 236.742986][ T9183] loop6: detected capacity change from 0 to 512 [ 236.775820][ T9183] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 236.835706][ T9183] EXT4-fs (loop6): 1 truncate cleaned up [ 236.849910][ T9181] IPVS: sed: UDP 224.0.0.2:0 - no destination available [ 236.859819][ T9183] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 237.846141][ T9206] geneve3: entered allmulticast mode [ 237.916612][ T9211] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1682'. [ 238.461118][ T9231] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1689'. [ 238.657153][ T7378] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 238.683647][ T9240] lo speed is unknown, defaulting to 1000 [ 238.692244][ T9242] netlink: 32 bytes leftover after parsing attributes in process `syz.6.1695'. [ 238.765386][ T9248] [syz.1.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 239.070455][ T9244] serio: Serial port ttyS3 [ 239.094946][ T9262] netlink: 'syz.2.1703': attribute type 1 has an invalid length. [ 239.103064][ T9262] workqueue: Failed to create a rescuer kthread for wq "bond4": -EINTR [ 239.144647][ T9274] netlink: 'syz.2.1706': attribute type 1 has an invalid length. [ 239.209944][ T9274] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1706'. [ 239.382578][ T9292] loop6: detected capacity change from 0 to 8192 [ 239.432821][ T8442] loop6: p1 p2 [ 239.439195][ T8442] loop6: p1 start 51314688 is beyond EOD, truncated [ 239.444998][ T9296] lo speed is unknown, defaulting to 1000 [ 239.476435][ T9292] loop6: p1 p2 [ 239.488584][ T9292] loop6: p1 start 51314688 is beyond EOD, truncated [ 239.563248][ T9292] lo speed is unknown, defaulting to 1000 [ 239.588755][ T9309] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 239.597393][ T9309] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 239.639434][ T28] kauditd_printk_skb: 23 callbacks suppressed [ 239.639450][ T28] audit: type=1400 audit(1776829218.612:3071): avc: denied { setopt } for pid=9310 comm="syz.3.1719" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 239.682582][ T28] audit: type=1400 audit(1776829218.672:3072): avc: denied { mounton } for pid=9312 comm="syz.1.1720" path="/346/file0" dev="tmpfs" ino=1879 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 240.201209][ T8442] udevd[8442]: inotify_add_watch(7, /dev/loop6p2, 10) failed: No such file or directory [ 240.218216][ T28] audit: type=1400 audit(1776829219.200:3073): avc: denied { create } for pid=9326 comm="syz.6.1724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 240.274781][ T28] audit: type=1400 audit(1776829219.200:3074): avc: denied { setopt } for pid=9326 comm="syz.6.1724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 240.301477][ T9330] loop6: detected capacity change from 0 to 1024 [ 240.334449][ T9330] EXT4-fs (loop6): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: writeback. [ 240.353085][ T28] audit: type=1400 audit(1776829219.200:3075): avc: denied { bind } for pid=9326 comm="syz.6.1724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 240.362006][ T9325] lo speed is unknown, defaulting to 1000 [ 240.381990][ T9330] ext4 filesystem being mounted at /73/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 240.392859][ T28] audit: type=1400 audit(1776829219.200:3076): avc: denied { ioctl } for pid=9326 comm="syz.6.1724" path="socket:[24063]" dev="sockfs" ino=24063 ioctlcmd=0xf515 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 240.396809][ T9330] EXT4-fs error (device loop6): ext4_validate_block_bitmap:441: comm syz.6.1725: bg 0: block 112: padding at end of block bitmap is not set [ 240.417978][ T28] audit: type=1400 audit(1776829219.290:3077): avc: denied { create } for pid=9329 comm="syz.6.1725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 240.451768][ T28] audit: type=1400 audit(1776829219.380:3078): avc: denied { add_name } for pid=9329 comm="syz.6.1725" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 240.452766][ T9330] EXT4-fs error (device loop6): ext4_free_blocks:6724: comm syz.6.1725: Freeing blocks not in datazone - block = 0, count = 16 [ 240.472631][ T28] audit: type=1400 audit(1776829219.380:3079): avc: denied { create } for pid=9329 comm="syz.6.1725" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 240.506254][ T28] audit: type=1400 audit(1776829219.380:3080): avc: denied { read write } for pid=9329 comm="syz.6.1725" name="file1" dev="loop6" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 240.559295][ T9330] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 240.800872][ T9356] lo speed is unknown, defaulting to 1000 [ 240.858396][ T9353] serio: Serial port ttyS3 [ 241.117216][ T9368] xt_hashlimit: size too large, truncated to 1048576 [ 241.333309][ T9386] netlink: 'syz.6.1745': attribute type 8 has an invalid length. [ 241.357127][ T9391] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 241.483221][ T9397] loop6: detected capacity change from 0 to 1024 [ 241.508291][ T9397] EXT4-fs (loop6): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: writeback. [ 241.521109][ T9397] ext4 filesystem being mounted at /85/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 241.532803][ T9397] EXT4-fs error (device loop6): ext4_validate_block_bitmap:441: comm syz.6.1749: bg 0: block 112: padding at end of block bitmap is not set [ 241.547582][ T9397] EXT4-fs error (device loop6): ext4_free_blocks:6724: comm syz.6.1749: Freeing blocks not in datazone - block = 0, count = 16 [ 241.569446][ T9397] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 241.679181][ T9410] loop6: detected capacity change from 0 to 1024 [ 241.687065][ T9410] EXT4-fs: Ignoring removed bh option [ 241.708271][ T9410] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 241.750549][ T7378] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 241.814417][ T9416] netlink: 36 bytes leftover after parsing attributes in process `syz.4.1755'. [ 241.863045][ T9420] loop6: detected capacity change from 0 to 8192 [ 241.927635][ T8442] loop6: p1 p2 [ 241.931421][ T8442] loop6: p1 start 51314688 is beyond EOD, truncated [ 241.979421][ T9420] loop6: p1 p2 [ 241.983046][ T9420] loop6: p1 start 51314688 is beyond EOD, truncated [ 242.001888][ T9420] lo speed is unknown, defaulting to 1000 [ 242.107241][ T9426] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 242.123022][ T9426] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 242.148552][ T9427] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1758'. [ 242.265252][ T9429] netlink: 64 bytes leftover after parsing attributes in process `syz.2.1759'. [ 243.083049][ T9446] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1766'. [ 243.203137][ T9454] lo speed is unknown, defaulting to 1000 [ 243.382144][ T9459] vlan2 (unregistering): left promiscuous mode [ 243.394269][ T9459] dummy0 (unregistering): left promiscuous mode [ 243.401931][ T9459] bridge0: port 3(vlan2) entered disabled state [ 243.525597][ T9464] netlink: 'syz.6.1772': attribute type 1 has an invalid length. [ 243.537134][ T9464] netlink: 112865 bytes leftover after parsing attributes in process `syz.6.1772'. [ 243.550816][ T9464] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1772'. [ 243.768693][ T9476] [syz.2.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 244.861328][ T9492] IPv6: NLM_F_CREATE should be specified when creating new route [ 245.016869][ T9498] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1779'. [ 245.525943][ T9510] loop6: detected capacity change from 0 to 128 [ 245.684825][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 245.684839][ T28] audit: type=1400 audit(1776829224.652:3114): avc: denied { write } for pid=9522 comm="syz.6.1791" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 248.352285][ T28] audit: type=1326 audit(1776829227.313:3115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9529 comm="syz.2.1792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 248.435604][ T28] audit: type=1326 audit(1776829227.313:3116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9529 comm="syz.2.1792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 248.541032][ T28] audit: type=1326 audit(1776829227.313:3117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9529 comm="syz.2.1792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 248.582515][ T28] audit: type=1326 audit(1776829227.313:3118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9529 comm="syz.2.1792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 248.630307][ T9550] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1797'. [ 248.672987][ T28] audit: type=1326 audit(1776829227.313:3119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9529 comm="syz.2.1792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 248.730660][ T28] audit: type=1326 audit(1776829227.343:3120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9529 comm="syz.2.1792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=265 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 248.754731][ T28] audit: type=1326 audit(1776829227.343:3121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9529 comm="syz.2.1792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 248.779647][ T28] audit: type=1326 audit(1776829227.343:3122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9529 comm="syz.2.1792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 248.804296][ T28] audit: type=1326 audit(1776829227.343:3123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9529 comm="syz.2.1792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 249.030415][ T9561] loop6: detected capacity change from 0 to 512 [ 249.166290][ T9566] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1802'. [ 249.512237][ T9563] bridge_slave_0: left allmulticast mode [ 249.518999][ T9555] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -4 [ 249.528310][ T9555] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -4 [ 249.538465][ T9563] bridge_slave_0: left promiscuous mode [ 249.544483][ T9563] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.553190][ T9563] bond0: (slave bridge_slave_1): Releasing backup interface [ 249.561263][ T9563] bond0: (slave bond_slave_0): Releasing backup interface [ 249.569566][ T9563] bond0: (slave bond_slave_1): Releasing backup interface [ 249.578290][ T9563] team0: Port device team_slave_0 removed [ 249.585169][ T9563] team0: Port device team_slave_1 removed [ 249.591206][ T9563] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 249.599093][ T9563] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 249.608457][ T9563] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 249.631059][ T9564] team0: Mode changed to "loadbalance" [ 249.655425][ T9570] lo speed is unknown, defaulting to 1000 [ 249.846381][ T9572] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1803'. [ 249.930192][ T9582] loop6: detected capacity change from 0 to 512 [ 249.969567][ T9582] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 250.028046][ T9582] EXT4-fs error (device loop6): ext4_validate_block_bitmap:423: comm syz.6.1806: bg 0: bad block bitmap checksum [ 250.082516][ T7378] EXT4-fs error (device loop6): ext4_readdir:225: inode #12: comm syz-executor: path /108/file0/file0: directory fails checksum at offset 0 [ 250.111733][ T7378] EXT4-fs error (device loop6): ext4_empty_dir:3078: inode #12: comm syz-executor: Directory block failed checksum [ 250.137457][ T7378] EXT4-fs error (device loop6): ext4_readdir:225: inode #12: comm syz-executor: path /108/file0/file0: directory fails checksum at offset 0 [ 250.168689][ T7378] EXT4-fs error (device loop6): ext4_empty_dir:3078: inode #12: comm syz-executor: Directory block failed checksum [ 250.194452][ T7378] EXT4-fs error (device loop6): ext4_readdir:225: inode #12: comm syz-executor: path /108/file0/file0: directory fails checksum at offset 0 [ 250.222073][ T7378] EXT4-fs error (device loop6): ext4_empty_dir:3078: inode #12: comm syz-executor: Directory block failed checksum [ 250.250736][ T7378] EXT4-fs error (device loop6): ext4_readdir:225: inode #12: comm syz-executor: path /108/file0/file0: directory fails checksum at offset 0 [ 250.269542][ T7378] EXT4-fs error (device loop6): ext4_empty_dir:3078: inode #12: comm syz-executor: Directory block failed checksum [ 250.283491][ T7378] EXT4-fs error (device loop6): ext4_readdir:225: inode #12: comm syz-executor: path /108/file0/file0: directory fails checksum at offset 0 [ 250.484572][ T9597] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1811'. [ 250.496671][ T9587] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 250.516676][ T5433] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 250.562810][ T5433] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 250.641039][ T5433] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 250.693066][ T9603] lo speed is unknown, defaulting to 1000 [ 250.711300][ T5433] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 250.769518][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 250.769653][ T28] audit: type=1400 audit(1776829229.726:3135): avc: denied { read } for pid=3038 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 250.811894][ T28] audit: type=1400 audit(1776829229.766:3136): avc: denied { search } for pid=3038 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 250.819913][ T9603] chnl_net:caif_netlink_parms(): no params data found [ 250.848903][ T28] audit: type=1400 audit(1776829229.766:3137): avc: denied { search } for pid=3038 comm="dhcpcd" name="udev" dev="tmpfs" ino=9 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 250.852336][ T5433] bridge_slave_1: left allmulticast mode [ 250.876672][ T5433] bridge_slave_1: left promiscuous mode [ 250.882370][ T5433] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.891631][ T28] audit: type=1400 audit(1776829229.766:3138): avc: denied { search } for pid=3038 comm="dhcpcd" name="data" dev="tmpfs" ino=13 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 250.913898][ T5433] bridge_slave_0: left allmulticast mode [ 250.916537][ T28] audit: type=1400 audit(1776829229.766:3139): avc: denied { read } for pid=3038 comm="dhcpcd" name="n39" dev="tmpfs" ino=6497 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 250.926359][ T5433] bridge_slave_0: left promiscuous mode [ 250.945239][ T28] audit: type=1400 audit(1776829229.766:3140): avc: denied { open } for pid=3038 comm="dhcpcd" path="/run/udev/data/n39" dev="tmpfs" ino=6497 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 250.951770][ T9619] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1815'. [ 250.971732][ T28] audit: type=1400 audit(1776829229.766:3141): avc: denied { getattr } for pid=3038 comm="dhcpcd" path="/run/udev/data/n39" dev="tmpfs" ino=6497 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 250.980584][ T5433] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.006671][ T9619] netlink: 'syz.3.1815': attribute type 7 has an invalid length. [ 251.018692][ T9619] netlink: 'syz.3.1815': attribute type 8 has an invalid length. [ 251.027139][ T9619] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1815'. [ 251.072669][ T28] audit: type=1400 audit(1776829230.015:3142): avc: denied { checkpoint_restore } for pid=9618 comm="syz.3.1815" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 251.199050][ T5433] bond0 (unregistering): left promiscuous mode [ 251.205466][ T5433] bond_slave_0: left promiscuous mode [ 251.211069][ T5433] bond_slave_1: left promiscuous mode [ 251.219478][ T5433] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 251.231188][ T5433] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 251.241640][ T5433] bond0 (unregistering): Released all slaves [ 251.270043][ T9619] erspan0: entered promiscuous mode [ 251.276024][ T9619] gretap0: entered promiscuous mode [ 251.282082][ T9619] erspan0: left promiscuous mode [ 251.288041][ T9619] gretap0: left promiscuous mode [ 251.299055][ T5433] batadv0: left promiscuous mode [ 251.307026][ T5433] hsr_slave_0: left promiscuous mode [ 251.328120][ T5433] hsr_slave_1: left promiscuous mode [ 251.357758][ T5433] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 251.365178][ T5433] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 251.382366][ T28] audit: type=1400 audit(1776829230.334:3143): avc: denied { read open } for pid=9627 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 251.418373][ T5433] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 251.420673][ T28] audit: type=1400 audit(1776829230.334:3144): avc: denied { getattr } for pid=9627 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 251.434219][ T5433] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 251.546283][ T5433] veth1_macvtap: left promiscuous mode [ 251.553159][ T5433] veth0_macvtap: left promiscuous mode [ 251.562054][ T5433] veth1_vlan: left promiscuous mode [ 251.578158][ T5433] veth0_vlan: left promiscuous mode [ 251.600619][ T9635] netlink: 'syz.2.1818': attribute type 1 has an invalid length. [ 251.619110][ T9635] netlink: 112865 bytes leftover after parsing attributes in process `syz.2.1818'. [ 251.689274][ T5433] team0 (unregistering): Port device team_slave_1 removed [ 251.700016][ T5433] team0 (unregistering): Port device team_slave_0 removed [ 251.722311][ T9655] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1820'. [ 251.756468][ T9644] A link change request failed with some changes committed already. Interface bond0 may have been left with an inconsistent configuration, please check. [ 251.792727][ T9658] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1818'. [ 251.812789][ T9652] lo speed is unknown, defaulting to 1000 [ 251.831044][ T9603] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.839513][ T9603] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.846839][ T9603] bridge_slave_0: entered allmulticast mode [ 251.854256][ T9603] bridge_slave_0: entered promiscuous mode [ 251.866201][ T9603] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.879428][ T9603] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.887169][ T9603] bridge_slave_1: entered allmulticast mode [ 251.895912][ T9603] bridge_slave_1: entered promiscuous mode [ 251.965330][ T9603] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 251.994529][ T9603] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 252.061850][ T9603] team0: Port device team_slave_0 added [ 252.075288][ T9603] team0: Port device team_slave_1 added [ 252.084458][ T9673] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1825'. [ 252.120015][ T9603] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 252.133436][ T9603] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 252.160773][ T9603] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 252.178509][ T9603] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 252.185897][ T9603] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 252.213338][ T9603] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 252.241292][ T9603] hsr_slave_0: entered promiscuous mode [ 252.247540][ T9603] hsr_slave_1: entered promiscuous mode [ 252.253560][ T9603] debugfs: 'hsr0' already exists in 'hsr' [ 252.259454][ T9603] Cannot create hsr debugfs directory [ 252.322401][ T9691] [syz.3.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 252.364174][ T9685] lo speed is unknown, defaulting to 1000 [ 252.397704][ T9603] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 252.407270][ T9603] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 252.417171][ T9603] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 252.471287][ T9603] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 254.487725][ T9603] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.505642][ T9603] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.577577][ T7723] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.584723][ T7723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.622502][ T9603] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 254.672179][ T9603] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 254.709722][ T7723] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.717022][ T7723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.853911][ T9733] netlink: 'syz.3.1833': attribute type 1 has an invalid length. [ 254.861777][ T9733] __nla_validate_parse: 3 callbacks suppressed [ 254.861793][ T9733] netlink: 112865 bytes leftover after parsing attributes in process `syz.3.1833'. [ 254.878173][ T9734] netlink: 64 bytes leftover after parsing attributes in process `syz.4.1832'. [ 254.905038][ T9733] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1833'. [ 254.941492][ T9603] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 255.180856][ T9603] veth0_vlan: entered promiscuous mode [ 255.197457][ T9603] veth1_vlan: entered promiscuous mode [ 255.220921][ T9603] veth0_macvtap: entered promiscuous mode [ 255.238158][ T9603] veth1_macvtap: entered promiscuous mode [ 255.267577][ T9603] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 255.286881][ T9603] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 255.308114][ T47] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.327158][ T47] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.344362][ T47] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.359689][ T47] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.489509][ T9776] [syz.7.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 255.666866][ T9776] loop7: detected capacity change from 0 to 164 [ 255.713746][ T9776] rock: directory entry would overflow storage [ 255.720450][ T9776] rock: sig=0x66, size=4, remaining=3 [ 255.737637][ T9776] rock: directory entry would overflow storage [ 255.744628][ T9776] rock: sig=0x66, size=4, remaining=3 [ 255.751055][ T9776] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 255.759501][ T9776] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 255.804894][ T28] kauditd_printk_skb: 39 callbacks suppressed [ 255.804921][ T28] audit: type=1400 audit(1776829234.741:3184): avc: denied { create } for pid=9784 comm="syz.3.1838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 255.844844][ T9785] netlink: 'syz.3.1838': attribute type 3 has an invalid length. [ 255.860930][ T28] audit: type=1400 audit(1776829234.771:3185): avc: denied { setopt } for pid=9784 comm="syz.3.1838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 255.881054][ T28] audit: type=1400 audit(1776829234.791:3186): avc: denied { unmount } for pid=9603 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 255.891340][ T9785] netlink: 152 bytes leftover after parsing attributes in process `syz.3.1838'. [ 255.912044][ T28] audit: type=1400 audit(1776829234.801:3187): avc: denied { write } for pid=9786 comm="syz.2.1837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 255.931459][ T28] audit: type=1400 audit(1776829234.801:3188): avc: denied { create } for pid=9786 comm="syz.2.1837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 255.951167][ T28] audit: type=1400 audit(1776829234.821:3189): avc: denied { ioctl } for pid=9786 comm="syz.2.1837" path="socket:[26032]" dev="sockfs" ino=26032 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 255.991045][ T28] audit: type=1400 audit(1776829234.821:3190): avc: denied { module_request } for pid=9786 comm="syz.2.1837" kmod="netdev-vcan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 256.031382][ T28] audit: type=1400 audit(1776829234.890:3191): avc: denied { sys_module } for pid=9786 comm="syz.2.1837" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 256.091677][ T28] audit: type=1400 audit(1776829234.920:3192): avc: denied { bind } for pid=9786 comm="syz.2.1837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 256.140892][ T9793] loop7: detected capacity change from 0 to 8192 [ 256.157782][ T28] audit: type=1400 audit(1776829234.920:3193): avc: denied { create } for pid=9786 comm="syz.2.1837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 256.242274][ T8442] loop7: p1 p2 [ 256.245941][ T8442] loop7: p1 start 51314688 is beyond EOD, truncated [ 256.267231][ T9793] loop7: p1 p2 [ 256.271135][ T9793] loop7: p1 start 51314688 is beyond EOD, truncated [ 256.354249][ T9793] lo speed is unknown, defaulting to 1000 [ 256.366371][ T9798] lo speed is unknown, defaulting to 1000 [ 256.472015][ T9815] sctp: [Deprecated]: syz.3.1845 (pid 9815) Use of struct sctp_assoc_value in delayed_ack socket option. [ 256.472015][ T9815] Use struct sctp_sack_info instead [ 256.578507][ T9793] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 256.587336][ T9793] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 256.654972][ T9817] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1847'. [ 256.669440][ T9817] bond2: option ad_actor_system: mode dependency failed, not supported in mode balance-rr(0) [ 256.680842][ T9817] bond2 (unregistering): Released all slaves [ 257.440936][ T9849] sctp: [Deprecated]: syz.4.1858 (pid 9849) Use of struct sctp_assoc_value in delayed_ack socket option. [ 257.440936][ T9849] Use struct sctp_sack_info instead [ 257.975320][ T9854] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1860'. [ 258.166412][ T9860] lo speed is unknown, defaulting to 1000 [ 258.373527][ T9887] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1873'. [ 258.525552][ T9904] netlink: 'syz.4.1880': attribute type 1 has an invalid length. [ 258.540272][ T9904] 8021q: adding VLAN 0 to HW filter on device bond1 [ 258.553513][ T9904] bond1: (slave veth1_to_team): Enslaving as a backup interface with a down link [ 259.099515][ T9919] netlink: 'syz.7.1883': attribute type 2 has an invalid length. [ 259.373788][ T9927] loop7: detected capacity change from 0 to 512 [ 259.379344][ T9927] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 259.424461][ T9927] EXT4-fs (loop7): SIPHASH is not a valid default hash value [ 259.498691][ T9939] FAULT_INJECTION: forcing a failure. [ 259.498691][ T9939] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 259.501978][ T9938] ip6t_srh: unknown srh invflags 4000 [ 259.533656][ T9939] CPU: 1 UID: 0 PID: 9939 Comm: syz.7.1889 Not tainted syzkaller #0 PREEMPT(full) [ 259.533682][ T9939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 259.533699][ T9939] Call Trace: [ 259.533706][ T9939] [ 259.533713][ T9939] __dump_stack+0x1d/0x30 [ 259.533754][ T9939] dump_stack_lvl+0x95/0xd0 [ 259.533777][ T9939] dump_stack+0x15/0x1b [ 259.533800][ T9939] should_fail_ex+0x263/0x280 [ 259.533887][ T9939] should_fail+0xb/0x20 [ 259.533907][ T9939] should_fail_usercopy+0x1a/0x20 [ 259.533931][ T9939] _copy_from_iter+0xcf/0xea0 [ 259.533966][ T9939] ? __alloc_skb+0x4f6/0x690 [ 259.534144][ T9939] ? __alloc_skb+0x200/0x690 [ 259.534285][ T9939] netlink_sendmsg+0x4ae/0x6f0 [ 259.534309][ T9939] ? __pfx_netlink_sendmsg+0x10/0x10 [ 259.534330][ T9939] ____sys_sendmsg+0x563/0x5b0 [ 259.534360][ T9939] ___sys_sendmsg+0x195/0x1e0 [ 259.534402][ T9939] __x64_sys_sendmsg+0xd4/0x160 [ 259.534440][ T9939] x64_sys_call+0x194c/0x3020 [ 259.534534][ T9939] do_syscall_64+0x12c/0x370 [ 259.534557][ T9939] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 259.534580][ T9939] RIP: 0033:0x7f50678ec819 [ 259.534601][ T9939] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 259.534681][ T9939] RSP: 002b:00007f5066347028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 259.534700][ T9939] RAX: ffffffffffffffda RBX: 00007f5067b65fa0 RCX: 00007f50678ec819 [ 259.534713][ T9939] RDX: 0000000020048004 RSI: 0000200000000240 RDI: 0000000000000003 [ 259.534727][ T9939] RBP: 00007f5066347090 R08: 0000000000000000 R09: 0000000000000000 [ 259.534804][ T9939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 259.534818][ T9939] R13: 00007f5067b66038 R14: 00007f5067b65fa0 R15: 00007ffea4dea058 [ 259.534837][ T9939] [ 259.961332][ T9947] serio: Serial port ttyS3 [ 260.542135][ T9985] loop7: detected capacity change from 0 to 1024 [ 260.570598][ T9985] EXT4-fs (loop7): corrupt root inode, run e2fsck [ 260.584106][ T9985] EXT4-fs (loop7): mount failed [ 260.808807][ T9986] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 261.388284][ T28] kauditd_printk_skb: 81 callbacks suppressed [ 261.388297][ T28] audit: type=1326 audit(1776829240.315:3275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10024 comm="syz.2.1919" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f258a97c819 code=0x0 [ 261.443198][T10026] macsec1: entered promiscuous mode [ 261.605043][ T28] audit: type=1400 audit(1776829240.525:3276): avc: denied { nlmsg_write } for pid=10033 comm="syz.3.1922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 262.044936][ T28] audit: type=1400 audit(1776829240.964:3277): avc: denied { read write } for pid=10053 comm="syz.7.1920" name="ptp0" dev="devtmpfs" ino=246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 262.070452][ T28] audit: type=1400 audit(1776829240.994:3278): avc: denied { open } for pid=10053 comm="syz.7.1920" path="/dev/ptp0" dev="devtmpfs" ino=246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 262.097391][ T28] audit: type=1400 audit(1776829240.994:3279): avc: denied { ioctl } for pid=10053 comm="syz.7.1920" path="/dev/ptp0" dev="devtmpfs" ino=246 ioctlcmd=0x3d02 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 262.232563][T10059] Process accounting resumed [ 262.257824][ T28] audit: type=1400 audit(1776829241.173:3280): avc: denied { ioctl } for pid=10060 comm="syz.2.1931" path="socket:[27176]" dev="sockfs" ino=27176 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 262.499944][T10069] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 262.618594][T10080] Process accounting resumed [ 262.643920][ T28] audit: type=1400 audit(1776829241.562:3281): avc: denied { write } for pid=10083 comm="syz.3.1938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 262.676320][ T28] audit: type=1326 audit(1776829241.592:3282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10085 comm="syz.3.1939" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f0aafbbc819 code=0x0 [ 263.142764][ T28] audit: type=1400 audit(1776829242.061:3283): avc: denied { unmount } for pid=10095 comm="syz.7.1943" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 263.165732][ T28] audit: type=1400 audit(1776829242.081:3284): avc: denied { associate } for pid=10095 comm="syz.7.1943" name="3" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 263.201782][T10100] [syz.1.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 263.563996][T10119] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1952'. [ 263.623899][T10121] bridge0: port 5(syz_tun) entered blocking state [ 263.633971][T10121] bridge0: port 5(syz_tun) entered disabled state [ 263.649494][T10121] syz_tun: entered allmulticast mode [ 263.664438][T10121] syz_tun: entered promiscuous mode [ 263.677512][T10121] bridge0: port 5(syz_tun) entered blocking state [ 263.684158][T10121] bridge0: port 5(syz_tun) entered forwarding state [ 264.233105][T10129] netlink: 48 bytes leftover after parsing attributes in process `syz.7.1956'. [ 264.274092][T10129] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1956'. [ 264.309091][T10133] xt_hashlimit: size too large, truncated to 1048576 [ 264.337139][T10129] lo speed is unknown, defaulting to 1000 [ 265.499747][T10177] bond_slave_0: entered promiscuous mode [ 265.505474][T10177] bond_slave_1: entered promiscuous mode [ 266.450556][ T28] kauditd_printk_skb: 25 callbacks suppressed [ 266.450572][ T28] audit: type=1400 audit(1776829245.362:3310): avc: denied { remount } for pid=10217 comm="syz.7.1977" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 266.494866][ T28] audit: type=1400 audit(1776829245.362:3311): avc: denied { ioctl } for pid=10217 comm="syz.7.1977" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=27686 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 266.805048][T10228] Cannot find del_set index 2 as target [ 266.805135][T10229] netlink: 20 bytes leftover after parsing attributes in process `syz.7.1979'. [ 266.968277][T10235] xt_hashlimit: size too large, truncated to 1048576 [ 267.417682][ T28] audit: type=1400 audit(1776829245.492:3312): avc: denied { create } for pid=10214 comm="syz.3.1976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 267.438608][ T28] audit: type=1400 audit(1776829245.492:3313): avc: denied { setopt } for pid=10214 comm="syz.3.1976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 267.458587][ T28] audit: type=1326 audit(1776829245.522:3314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10214 comm="syz.3.1976" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f0aafbbc819 code=0x0 [ 267.483046][ T28] audit: type=1326 audit(1776829246.390:3315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10248 comm="syz.7.1987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 267.510253][ T28] audit: type=1326 audit(1776829246.390:3316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10248 comm="syz.7.1987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 267.560398][ T28] audit: type=1326 audit(1776829246.420:3317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10248 comm="syz.7.1987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=305 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 267.605660][ T28] audit: type=1326 audit(1777361726.426:3318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10248 comm="syz.7.1987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 267.648177][ T28] audit: type=1326 audit(1777361726.426:3319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10248 comm="syz.7.1987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 268.112060][T10293] [syz.7.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 268.264231][T10299] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1996'. [ 268.308921][T10303] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1997'. [ 268.315569][T10299] netlink: 'syz.1.1996': attribute type 18 has an invalid length. [ 268.363109][T10299] netlink: 'syz.1.1996': attribute type 18 has an invalid length. [ 268.383764][T10310] netlink: 68 bytes leftover after parsing attributes in process `syz.3.1999'. [ 268.392937][T10299] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1996'. [ 268.393390][T10310] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1999'. [ 268.433667][T10314] gre0: entered promiscuous mode [ 268.441774][T10314] A link change request failed with some changes committed already. Interface gre0 may have been left with an inconsistent configuration, please check. [ 268.934919][T10326] netlink: 'syz.3.2002': attribute type 3 has an invalid length. [ 269.144180][T10331] lo speed is unknown, defaulting to 1000 [ 269.373106][T10361] netlink: 20 bytes leftover after parsing attributes in process `syz.4.2020'. [ 270.650841][T10386] netlink: 32 bytes leftover after parsing attributes in process `syz.1.2029'. [ 270.702088][T10386] netlink: 'syz.1.2029': attribute type 10 has an invalid length. [ 270.722709][T10386] netlink: 'syz.1.2029': attribute type 10 has an invalid length. [ 271.120980][T10408] ipt_ECN: cannot use operation on non-tcp rule [ 271.128453][T10408] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=23123 sclass=netlink_audit_socket pid=10408 comm=syz.2.2037 [ 271.215946][T10412] netlink: 20 bytes leftover after parsing attributes in process `syz.2.2039'. [ 271.371584][T10417] netlink: 'syz.7.2041': attribute type 3 has an invalid length. [ 271.416769][T10424] ip6erspan0: entered allmulticast mode [ 271.494013][T10428] tmpfs: Bad value for 'mpol' [ 271.653623][T10439] [syz.7.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 271.699325][T10441] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2051'. [ 271.785052][T10448] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2054'. [ 271.802402][T10444] netlink: 20 bytes leftover after parsing attributes in process `syz.4.2053'. [ 271.868379][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 271.868402][ T28] audit: type=1400 audit(1777361730.745:3337): avc: denied { write } for pid=10447 comm="syz.1.2054" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 272.027094][T10457] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2056'. [ 272.658588][T10480] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2062'. [ 272.667756][T10480] netlink: 580 bytes leftover after parsing attributes in process `syz.1.2062'. [ 272.680189][ T28] audit: type=1400 audit(1777361731.548:3338): avc: denied { setopt } for pid=10479 comm="syz.1.2062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 273.249560][ T28] audit: type=1326 audit(1777361732.114:3339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10487 comm="syz.4.2064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72ca71c819 code=0x7ffc0000 [ 273.323839][ T28] audit: type=1326 audit(1777361732.114:3340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10487 comm="syz.4.2064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72ca71c819 code=0x7ffc0000 [ 273.347670][ T28] audit: type=1326 audit(1777361732.144:3341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10487 comm="syz.4.2064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=305 compat=0 ip=0x7f72ca71c819 code=0x7ffc0000 [ 273.371792][ T28] audit: type=1326 audit(1777894212.148:3342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10487 comm="syz.4.2064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72ca71c819 code=0x7ffc0000 [ 273.395484][ T28] audit: type=1326 audit(1777894212.148:3343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10487 comm="syz.4.2064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72ca71c819 code=0x7ffc0000 [ 273.474201][T10494] netlink: 32 bytes leftover after parsing attributes in process `syz.4.2068'. [ 273.759235][T10502] lo speed is unknown, defaulting to 1000 [ 273.769900][ T28] audit: type=1400 audit(1777894212.618:3344): avc: denied { getopt } for pid=10505 comm="syz.3.2073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 273.960803][ T28] audit: type=1400 audit(1777894212.818:3345): avc: denied { accept } for pid=10517 comm="syz.2.2076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 274.217517][ T28] audit: type=1400 audit(1777894213.087:3346): avc: denied { nlmsg_write } for pid=10520 comm="syz.2.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 274.241065][T10532] ipt_ECN: cannot use operation on non-tcp rule [ 274.266258][T10532] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=23123 sclass=netlink_audit_socket pid=10532 comm=syz.7.2082 [ 274.401524][ T3419] kernel write not supported for file bpf-prog (pid: 3419 comm: kworker/1:5) [ 274.528523][T10547] [syz.7.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 274.566169][T10548] SELinux: Context system_u:object_r:systemd_logger_exec_t:s0 is not valid (left unmapped). [ 274.828759][T10557] netlink: 72 bytes leftover after parsing attributes in process `syz.1.2091'. [ 274.846464][T10557] netlink: 72 bytes leftover after parsing attributes in process `syz.1.2091'. [ 275.027979][T10566] lo speed is unknown, defaulting to 1000 [ 275.219302][T10580] lo speed is unknown, defaulting to 1000 [ 276.100244][T10603] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2106'. [ 276.296665][T10605] lo speed is unknown, defaulting to 1000 [ 276.431687][T10618] netlink: 'syz.1.2111': attribute type 1 has an invalid length. [ 276.505483][T10620] netlink: 'syz.1.2111': attribute type 21 has an invalid length. [ 276.518609][T10620] netlink: 'syz.1.2111': attribute type 3 has an invalid length. [ 276.526710][T10620] netlink: 144 bytes leftover after parsing attributes in process `syz.1.2111'. [ 276.975195][T10631] lo speed is unknown, defaulting to 1000 [ 277.119677][T10636] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2117'. [ 277.219883][ T28] kauditd_printk_skb: 578 callbacks suppressed [ 277.219899][ T28] audit: type=1400 audit(1777894216.063:3925): avc: denied { read } for pid=10643 comm="syz.2.2121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 277.418610][ T28] audit: type=1400 audit(1777894216.251:3926): avc: denied { mount } for pid=10668 comm="syz.2.2127" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 277.467709][T10669] pimreg: entered allmulticast mode [ 277.474622][T10669] pimreg: left allmulticast mode [ 277.506040][ T28] audit: type=1400 audit(1777894216.340:3927): avc: denied { shutdown } for pid=10668 comm="syz.2.2127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 277.540971][T10676] [syz.1.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 277.867438][T10683] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2130'. [ 277.946269][T10686] xt_CT: No such helper "snmp_trap" [ 277.962535][T10685] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 278.041388][ T28] audit: type=1400 audit(1777894216.876:3928): avc: denied { unlink } for pid=3319 comm="syz-executor" name=131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 dev="tmpfs" ino=2501 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 278.198840][T10699] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2135'. [ 278.431254][ T28] audit: type=1326 audit(1777894217.263:3929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10703 comm="syz.3.2136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 278.496000][ T28] audit: type=1326 audit(1777894217.263:3930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10703 comm="syz.3.2136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f0aafb7d04e code=0x7ffc0000 [ 278.535760][ T28] audit: type=1326 audit(1777894217.263:3931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10703 comm="syz.3.2136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 278.560611][ T28] audit: type=1326 audit(1777894217.263:3932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10703 comm="syz.3.2136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 278.649608][ T28] audit: type=1326 audit(1777894217.263:3933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10703 comm="syz.3.2136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 278.826520][T10724] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2142'. [ 279.123729][ T28] audit: type=1326 audit(1777894217.263:3934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10703 comm="syz.3.2136" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 279.370205][T10741] lo speed is unknown, defaulting to 1000 [ 279.574225][T10758] netlink: 8 bytes leftover after parsing attributes in process `syz.7.2157'. [ 279.607591][T10758] vlan2: entered allmulticast mode [ 279.624208][T10758] dummy0: entered allmulticast mode [ 279.638446][T10758] bridge0: port 3(vlan2) entered blocking state [ 279.655425][T10758] bridge0: port 3(vlan2) entered disabled state [ 279.669110][T10758] vlan2: entered promiscuous mode [ 279.680100][T10758] dummy0: entered promiscuous mode [ 280.058947][T10772] lo speed is unknown, defaulting to 1000 [ 280.190130][T10789] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2169'. [ 280.484188][T10803] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=45 sclass=netlink_tcpdiag_socket pid=10803 comm=syz.1.2174 [ 280.771472][T10822] lo speed is unknown, defaulting to 1000 [ 280.937071][T10854] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2194'. [ 281.126388][T10860] lo speed is unknown, defaulting to 1000 [ 281.273369][T10882] netlink: 4 bytes leftover after parsing attributes in process `syz.7.2203'. [ 281.368181][T10886] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=10886 comm=syz.2.2207 [ 281.742394][T10890] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2208'. [ 281.810191][T10897] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2210'. [ 282.155757][T10925] netlink: 40 bytes leftover after parsing attributes in process `syz.7.2221'. [ 282.179024][T10918] lo speed is unknown, defaulting to 1000 [ 282.211359][T10928] pimreg: entered allmulticast mode [ 282.221411][T10928] pimreg: left allmulticast mode [ 282.312506][T10946] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2227'. [ 282.316272][T10945] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2229'. [ 282.477964][T10959] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2233'. [ 282.514730][T10965] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2235'. [ 282.572712][T10965] netlink: 'syz.1.2235': attribute type 10 has an invalid length. [ 282.609979][T10965] macvlan0: entered promiscuous mode [ 282.635244][T10965] batman_adv: batadv0: Adding interface: macvlan0 [ 282.674923][T10965] batman_adv: batadv0: The MTU of interface macvlan0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 282.874269][T10965] batman_adv: batadv0: Interface activated: macvlan0 [ 283.007009][T10976] lo speed is unknown, defaulting to 1000 [ 284.043339][T11011] [syz.4.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 284.558894][ T28] kauditd_printk_skb: 51 callbacks suppressed [ 284.558943][ T28] audit: type=1400 audit(1778426703.340:3986): avc: denied { connect } for pid=11020 comm="syz.1.2254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 284.593419][ T28] audit: type=1326 audit(1778426703.370:3987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11020 comm="syz.1.2254" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x0 [ 284.718594][T11019] netlink: 'syz.7.2253': attribute type 2 has an invalid length. [ 285.075878][T11044] lo speed is unknown, defaulting to 1000 [ 285.415550][ T28] audit: type=1400 audit(1778426704.194:3988): avc: denied { read } for pid=11048 comm="syz.2.2262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 286.170939][ T28] audit: type=1400 audit(1778426704.938:3989): avc: denied { bind } for pid=11133 comm="syz.7.2266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 286.226924][ T28] audit: type=1326 audit(1778426704.968:3990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11133 comm="syz.7.2266" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 286.282743][ T28] audit: type=1326 audit(1778426704.968:3991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11133 comm="syz.7.2266" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 286.344002][ T28] audit: type=1326 audit(1778426704.968:3992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11133 comm="syz.7.2266" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 286.397031][ T28] audit: type=1326 audit(1778426704.968:3993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11133 comm="syz.7.2266" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 286.482327][ T28] audit: type=1326 audit(1778426704.968:3994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11133 comm="syz.7.2266" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 286.538086][ T28] audit: type=1326 audit(1778426704.968:3995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11133 comm="syz.7.2266" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 286.868213][T11194] IPv6: sit1: Disabled Multicast RS [ 287.486294][T11219] __nla_validate_parse: 7 callbacks suppressed [ 287.486307][T11219] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2282'. [ 287.613806][T11224] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2285'. [ 287.637315][T11232] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2287'. [ 287.761808][T11239] lo speed is unknown, defaulting to 1000 [ 288.295909][T11252] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2294'. [ 289.062839][T11270] IPv6: NLM_F_CREATE should be specified when creating new route [ 289.070950][T11270] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2299'. [ 289.120570][T11272] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2300'. [ 289.292929][T11290] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2306'. [ 289.634828][ T28] kauditd_printk_skb: 103 callbacks suppressed [ 289.634895][ T28] audit: type=1326 audit(1778426708.382:4099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11291 comm="syz.2.2307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 289.766929][ T28] audit: type=1326 audit(1778426708.412:4100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11291 comm="syz.2.2307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 289.791113][ T28] audit: type=1326 audit(1778426708.422:4101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11291 comm="syz.2.2307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f258a93d04e code=0x7ffc0000 [ 289.816034][T11306] geneve2: entered promiscuous mode [ 289.822848][ T28] audit: type=1326 audit(1778426708.422:4102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11291 comm="syz.2.2307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 289.823427][ T7730] netdevsim netdevsim7 netdevsim0: set [1, 1] type 2 family 0 port 20000 - 0 [ 289.856940][ T28] audit: type=1326 audit(1778426708.422:4103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11291 comm="syz.2.2307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 289.859266][ T7730] netdevsim netdevsim7 netdevsim1: set [1, 1] type 2 family 0 port 20000 - 0 [ 289.904402][ T28] audit: type=1326 audit(1778426708.422:4104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11291 comm="syz.2.2307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 289.928607][ T28] audit: type=1326 audit(1778426708.442:4105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11291 comm="syz.2.2307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 289.930821][ T7730] netdevsim netdevsim7 netdevsim2: set [1, 1] type 2 family 0 port 20000 - 0 [ 289.957317][T11310] netlink: 8 bytes leftover after parsing attributes in process `syz.7.2313'. [ 289.972387][ T7730] netdevsim netdevsim7 netdevsim3: set [1, 1] type 2 family 0 port 20000 - 0 [ 289.995560][ T28] audit: type=1326 audit(1778426708.442:4106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11291 comm="syz.2.2307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 290.027562][ T28] audit: type=1326 audit(1778426708.442:4107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11291 comm="syz.2.2307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 290.051601][ T28] audit: type=1326 audit(1778426708.472:4108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11291 comm="syz.2.2307" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f258a97c819 code=0x7ffc0000 [ 290.776753][T11340] lo speed is unknown, defaulting to 1000 [ 290.801330][T11344] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2322'. [ 291.086608][T11368] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2333'. [ 291.101951][ T7731] netdevsim netdevsim4 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 291.114407][ T7731] netdevsim netdevsim4 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 291.123421][ T7731] netdevsim netdevsim4 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 291.132457][ T7731] netdevsim netdevsim4 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 292.581566][T11436] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11436 comm=syz.2.2359 [ 292.602777][T11451] __nla_validate_parse: 9 callbacks suppressed [ 292.602792][T11451] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2362'. [ 292.672981][T11455] [syz.3.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 293.272205][T11484] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11484 comm=syz.1.2372 [ 293.842898][T11502] netlink: 68 bytes leftover after parsing attributes in process `syz.4.2380'. [ 293.846238][ T3357] IPVS: starting estimator thread 0... [ 293.852313][T11501] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 293.942800][T11503] IPVS: using max 3792 ests per chain, 189600 per kthread [ 295.774377][T11543] netlink: 8 bytes leftover after parsing attributes in process `syz.7.2395'. [ 295.831277][T11548] lo speed is unknown, defaulting to 1000 [ 297.083126][T11609] lo speed is unknown, defaulting to 1000 [ 297.125794][ T28] kauditd_printk_skb: 85 callbacks suppressed [ 297.125812][ T28] audit: type=1400 audit(1778959195.827:4194): avc: denied { connect } for pid=11612 comm="syz.2.2422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 297.167059][ T28] audit: type=1400 audit(1778959195.827:4195): avc: denied { shutdown } for pid=11612 comm="syz.2.2422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 297.274312][T11593] lo speed is unknown, defaulting to 1000 [ 297.926513][T11630] [syz.4.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 298.124270][T11645] netlink: 'syz.2.2432': attribute type 2 has an invalid length. [ 298.136803][T11645] netlink: 'syz.2.2432': attribute type 1 has an invalid length. [ 299.166203][T11686] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2442'. [ 299.235780][T11700] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2448'. [ 299.363811][ T28] audit: type=1326 audit(1778959198.076:4196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11713 comm="syz.3.2454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 299.416658][ T28] audit: type=1326 audit(1778959198.076:4197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11713 comm="syz.3.2454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 299.484776][ T28] audit: type=1326 audit(1778959198.076:4198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11713 comm="syz.3.2454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 299.535077][ T28] audit: type=1326 audit(1778959198.156:4199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11713 comm="syz.3.2454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 299.595436][T11723] netlink: 8 bytes leftover after parsing attributes in process `syz.7.2457'. [ 299.688186][ T28] audit: type=1326 audit(1778959198.156:4200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11713 comm="syz.3.2454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 299.712249][ T28] audit: type=1400 audit(1778959198.276:4201): avc: denied { ioctl } for pid=11720 comm="syz.2.2456" path="socket:[31264]" dev="sockfs" ino=31264 ioctlcmd=0xf508 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 300.296529][ T28] audit: type=1400 audit(1778959199.016:4202): avc: denied { accept } for pid=11756 comm="syz.7.2469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 300.319428][T11757] batadv0: entered promiscuous mode [ 300.325206][T11757] batadv0: entered allmulticast mode [ 300.333928][T11757] netlink: 'syz.7.2469': attribute type 4 has an invalid length. [ 300.363681][ T28] audit: type=1326 audit(1778959199.076:4203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11759 comm="syz.7.2470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 300.560046][T11766] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2473'. [ 301.069743][T11789] netlink: 'syz.3.2485': attribute type 10 has an invalid length. [ 301.451693][T11800] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2487'. [ 301.650595][T11829] [syz.4.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 301.679586][T11831] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2500'. [ 301.772186][T11837] netlink: 'syz.3.2503': attribute type 1 has an invalid length. [ 301.811109][T11841] netlink: 'syz.3.2504': attribute type 10 has an invalid length. [ 301.819038][T11841] geneve1: entered promiscuous mode [ 301.824395][T11841] geneve1: left allmulticast mode [ 302.631186][T11877] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2514'. [ 303.044362][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 303.044377][ T28] audit: type=1326 audit(1778959201.754:4217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11883 comm="syz.1.2517" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 303.104370][ T28] audit: type=1326 audit(1778959201.794:4218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11883 comm="syz.1.2517" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 303.130530][ T28] audit: type=1326 audit(1778959201.844:4219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11883 comm="syz.1.2517" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 303.168771][ T28] audit: type=1326 audit(1778959201.844:4220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11883 comm="syz.1.2517" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 304.679301][ T28] audit: type=1326 audit(1778959203.393:4221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11930 comm="syz.3.2533" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 304.713518][ T28] audit: type=1326 audit(1778959203.393:4222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11930 comm="syz.3.2533" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 304.740290][ T28] audit: type=1326 audit(1778959203.423:4223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11930 comm="syz.3.2533" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 304.802305][ T28] audit: type=1326 audit(1778959203.423:4224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11930 comm="syz.3.2533" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 304.922293][ T28] audit: type=1400 audit(1778959203.633:4225): avc: denied { accept } for pid=11945 comm="syz.4.2539" path="socket:[33149]" dev="sockfs" ino=33149 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 304.974057][T11950] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2540'. [ 305.032512][ T28] audit: type=1400 audit(1778959203.743:4226): avc: denied { bind } for pid=11945 comm="syz.4.2539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 305.137486][T11964] [syz.4.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 306.042482][T12001] lo speed is unknown, defaulting to 1000 [ 306.156016][T12001] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2553'. [ 307.282856][T12061] lo speed is unknown, defaulting to 1000 [ 308.119639][T12091] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2588'. [ 308.201883][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 308.201897][ T28] audit: type=1326 audit(1778959206.912:4254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12097 comm="syz.1.2590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 308.262622][ T28] audit: type=1326 audit(1778959206.942:4255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12097 comm="syz.1.2590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 308.303677][ T28] audit: type=1326 audit(1778959206.972:4256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12097 comm="syz.1.2590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 308.327457][ T28] audit: type=1326 audit(1778959206.972:4257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12097 comm="syz.1.2590" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 308.545639][T12112] netlink: 8 bytes leftover after parsing attributes in process `syz.7.2595'. [ 308.941197][ T28] audit: type=1400 audit(1778959207.641:4258): avc: denied { create } for pid=12126 comm="syz.7.2599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 309.209936][ T28] audit: type=1400 audit(1778959207.901:4259): avc: denied { read } for pid=12140 comm="syz.7.2604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 309.232604][T12149] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2606'. [ 309.241891][T12149] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2606'. [ 309.254075][T12149] bridge2: entered promiscuous mode [ 309.259436][T12149] bridge2: entered allmulticast mode [ 309.269959][ T28] audit: type=1400 audit(1778959207.971:4260): avc: denied { create } for pid=12148 comm="syz.4.2606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 309.290422][ T28] audit: type=1400 audit(1778959207.971:4261): avc: denied { bind } for pid=12148 comm="syz.4.2606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 309.310183][ T28] audit: type=1400 audit(1778959207.971:4262): avc: denied { ioctl } for pid=12148 comm="syz.4.2606" path="socket:[34109]" dev="sockfs" ino=34109 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 309.615300][T12168] netlink: 'syz.3.2612': attribute type 3 has an invalid length. [ 311.045679][T12198] netlink: 120 bytes leftover after parsing attributes in process `syz.1.2621'. [ 311.057040][T12198] netlink: 10 bytes leftover after parsing attributes in process `syz.1.2621'. [ 311.418300][ T28] audit: type=1400 audit(1778959210.120:4263): avc: denied { ioctl } for pid=12226 comm="syz.3.2633" path="socket:[33493]" dev="sockfs" ino=33493 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 311.518137][T12240] netlink: 'syz.7.2637': attribute type 1 has an invalid length. [ 311.540133][T12240] 8021q: adding VLAN 0 to HW filter on device bond1 [ 313.080006][T12319] netlink: 32 bytes leftover after parsing attributes in process `syz.4.2666'. [ 313.152039][T12323] xt_hashlimit: size too large, truncated to 1048576 [ 313.169525][T12323] xt_hashlimit: max too large, truncated to 1048576 [ 313.434963][T12334] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2671'. [ 313.875293][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 313.875307][ T28] audit: type=1326 audit(1778959212.579:4283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12349 comm="syz.3.2676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 313.935368][T12346] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 313.949781][ T28] audit: type=1326 audit(1778959212.579:4284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12349 comm="syz.3.2676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 314.014027][ T28] audit: type=1326 audit(1778959212.579:4285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12349 comm="syz.3.2676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 314.082355][ T28] audit: type=1326 audit(1778959212.749:4286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12349 comm="syz.3.2676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 314.121030][ T28] audit: type=1326 audit(1778959212.749:4287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12349 comm="syz.3.2676" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0aafbbc819 code=0x7ffc0000 [ 314.916934][ T28] audit: type=1400 audit(1778959213.618:4288): avc: denied { read } for pid=12443 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 314.983141][ T28] audit: type=1400 audit(1778959213.618:4289): avc: denied { open } for pid=12443 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 314.990460][T12450] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2687'. [ 315.051773][ T28] audit: type=1400 audit(1778959213.618:4290): avc: denied { mounton } for pid=12443 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 315.087961][T12456] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2690'. [ 315.114828][T12456] bond5: entered promiscuous mode [ 315.123406][T12456] 8021q: adding VLAN 0 to HW filter on device bond5 [ 315.150268][T12456] bridge2: entered promiscuous mode [ 315.165885][T12456] bond5: (slave bridge2): Enslaving as an active interface with an up link [ 315.214214][ T28] audit: type=1400 audit(1778959213.918:4291): avc: denied { create } for pid=12455 comm="syz.2.2690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 315.237671][T12443] lo speed is unknown, defaulting to 1000 [ 315.339767][ T28] audit: type=1326 audit(1778959214.038:4292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12468 comm="syz.1.2692" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 315.373916][ T9869] bridge0: port 5(syz_tun) entered disabled state [ 315.383590][ T9869] syz_tun (unregistering): left allmulticast mode [ 315.390022][ T9869] syz_tun (unregistering): left promiscuous mode [ 315.406775][ T9869] bridge0: port 5(syz_tun) entered disabled state [ 315.428521][T12456] macvlan0: entered promiscuous mode [ 315.434114][T12456] macvlan0: entered allmulticast mode [ 315.440664][T12456] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 315.568402][T12443] chnl_net:caif_netlink_parms(): no params data found [ 315.611691][T12443] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.619023][T12443] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.627632][T12443] bridge_slave_0: entered allmulticast mode [ 315.634931][T12443] bridge_slave_0: entered promiscuous mode [ 315.641982][T12443] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.043983][T12500] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12500 comm=syz.2.2699 [ 316.136516][T12443] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.144299][T12443] bridge_slave_1: entered allmulticast mode [ 316.150750][T12443] bridge_slave_1: entered promiscuous mode [ 316.173066][T12443] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 316.184110][T12443] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 316.195464][T12504] [syz.2.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 316.205753][T12443] team0: Port device team_slave_0 added [ 316.212429][T12443] team0: Port device team_slave_1 added [ 316.254480][T12443] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 316.261526][T12443] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 316.288433][T12443] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 316.299899][T12443] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 316.309420][T12443] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 316.335921][T12443] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 316.369685][T12443] hsr_slave_0: entered promiscuous mode [ 316.383090][T12443] hsr_slave_1: entered promiscuous mode [ 316.390145][T12443] debugfs: 'hsr0' already exists in 'hsr' [ 316.396244][T12443] Cannot create hsr debugfs directory [ 316.530399][T12510] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2702'. [ 316.599164][T12443] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 20000 - 0 [ 316.675913][T12443] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 20000 - 0 [ 316.766696][T12443] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 20000 - 0 [ 316.826491][T12443] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 20000 - 0 [ 316.932647][T12443] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 316.962764][T12443] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 316.989264][T12443] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 317.012119][T12443] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 317.271403][T12443] 8021q: adding VLAN 0 to HW filter on device bond0 [ 317.299335][T12443] 8021q: adding VLAN 0 to HW filter on device team0 [ 317.320364][ T55] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.327666][ T55] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.359009][ T55] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.366087][ T55] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.427779][T12443] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 317.577196][T12443] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 317.753022][T12443] veth0_vlan: entered promiscuous mode [ 317.785637][T12443] veth1_vlan: entered promiscuous mode [ 317.831835][T12443] veth0_macvtap: entered promiscuous mode [ 317.859873][T12443] veth1_macvtap: entered promiscuous mode [ 317.898490][T12443] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 317.934887][T12443] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 317.962932][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 317.994536][ T12] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.039697][ T12] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.086543][ T12] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.400630][T12602] xt_policy: output policy not valid in PREROUTING and INPUT [ 319.521825][ T28] kauditd_printk_skb: 23 callbacks suppressed [ 319.521916][ T28] audit: type=1326 audit(1778959218.226:4316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12608 comm="syz.1.2731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 319.606605][ T28] audit: type=1326 audit(1778959218.256:4317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12608 comm="syz.1.2731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 319.718709][ T28] audit: type=1326 audit(1778959218.256:4318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12608 comm="syz.1.2731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 319.823876][ T28] audit: type=1326 audit(1778959218.376:4319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12608 comm="syz.1.2731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 319.885432][ T28] audit: type=1326 audit(1778959218.376:4320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12608 comm="syz.1.2731" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 320.102390][T12614] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 320.239318][T12602] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.246653][T12602] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.267825][T12602] bond_slave_0: left promiscuous mode [ 320.283729][T12602] bond_slave_1: left promiscuous mode [ 320.396656][T12602] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 320.435585][T12602] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 320.525937][ T28] audit: type=1400 audit(1778959219.225:4321): avc: denied { firmware_load } for pid=12615 comm="syz.2.2734" path="/lib/firmware/regulatory.db" dev="sda1" ino=448 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 320.551166][ T55] netdevsim netdevsim7 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 320.560267][ T55] netdevsim netdevsim7 netdevsim0: unset [1, 1] type 2 family 0 port 20000 - 0 [ 320.583829][ T55] netdevsim netdevsim7 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 320.630988][ T55] netdevsim netdevsim7 netdevsim1: unset [1, 1] type 2 family 0 port 20000 - 0 [ 320.649559][ T55] netdevsim netdevsim7 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 320.685664][ T55] netdevsim netdevsim7 netdevsim2: unset [1, 1] type 2 family 0 port 20000 - 0 [ 320.712585][ T55] netdevsim netdevsim7 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 320.737577][ T55] netdevsim netdevsim7 netdevsim3: unset [1, 1] type 2 family 0 port 20000 - 0 [ 321.166526][ T28] audit: type=1326 audit(1778959219.875:4322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12645 comm="syz.1.2743" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 321.303924][ T28] audit: type=1326 audit(1778959219.895:4323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12645 comm="syz.1.2743" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 321.339610][ T28] audit: type=1326 audit(1778959219.945:4324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12645 comm="syz.1.2743" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 321.374874][ T28] audit: type=1326 audit(1778959219.985:4325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12645 comm="syz.1.2743" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 322.217931][T12662] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12662 comm=syz.7.2748 [ 322.482394][T12673] bridge_slave_1: left allmulticast mode [ 322.515340][T12673] bridge_slave_1: left promiscuous mode [ 322.531447][T12673] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.601308][T12673] bridge_slave_1: entered promiscuous mode [ 322.622397][T12673] bond0: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 322.674595][T12663] lo speed is unknown, defaulting to 1000 [ 323.748541][T12728] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12728 comm=syz.1.2772 [ 323.762701][T12728] netlink: 20 bytes leftover after parsing attributes in process `syz.1.2772'. [ 325.214363][T12768] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2785'. [ 325.224372][T12768] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2785'. [ 325.233847][T12768] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2785'. [ 325.268828][T12769] netlink: 'syz.7.2784': attribute type 1 has an invalid length. [ 325.301153][T12768] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2785'. [ 325.305484][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 325.305498][ T28] audit: type=1400 audit(1778959223.963:4334): avc: denied { name_bind } for pid=12764 comm="syz.7.2784" src=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 325.338770][T12770] netlink: 4 bytes leftover after parsing attributes in process `syz.7.2784'. [ 325.358240][ T28] audit: type=1400 audit(1778959223.963:4335): avc: denied { name_connect } for pid=12764 comm="syz.7.2784" dest=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 325.380353][T12768] netlink: 'syz.3.2785': attribute type 6 has an invalid length. [ 325.573871][T12769] bond2: entered promiscuous mode [ 325.573898][T12769] bond2: entered allmulticast mode [ 325.574096][T12769] 8021q: adding VLAN 0 to HW filter on device bond2 [ 325.578719][T12770] bond2 (unregistering): Released all slaves [ 325.721787][ T28] audit: type=1400 audit(1778959224.423:4336): avc: denied { setopt } for pid=12775 comm="syz.1.2788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 325.891611][T12800] [syz.4.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 326.285197][T12796] serio: Serial port ttyS3 [ 328.101846][T12828] loop3: detected capacity change from 0 to 512 [ 328.138497][ T28] audit: type=1400 audit(1778959226.832:4337): avc: denied { mount } for pid=12827 comm="syz.3.2802" name="/" dev="loop3" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 328.211577][ T28] audit: type=1400 audit(1778959226.912:4338): avc: denied { unmount } for pid=12443 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 328.257100][ T28] audit: type=1326 audit(1778959226.952:4339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12839 comm="syz.3.2805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd98019c819 code=0x7ffc0000 [ 328.323071][ T28] audit: type=1326 audit(1778959226.982:4340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12839 comm="syz.3.2805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7fd98019c819 code=0x7ffc0000 [ 328.357479][ T28] audit: type=1326 audit(1778959227.052:4341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12839 comm="syz.3.2805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd98019c819 code=0x7ffc0000 [ 328.362829][T12845] netlink: 32 bytes leftover after parsing attributes in process `syz.4.2808'. [ 328.381997][ T28] audit: type=1326 audit(1778959227.052:4342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12839 comm="syz.3.2805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd98019c819 code=0x7ffc0000 [ 328.502006][T12857] team0: No ports can be present during mode change [ 328.719008][T12865] IPv6: sit1: Disabled Multicast RS [ 328.895093][T12870] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12870 comm=syz.7.2816 [ 329.142992][T12876] IPVS: Unknown mcast interface: wlan0 [ 329.203405][T12879] netlink: 32 bytes leftover after parsing attributes in process `syz.2.2819'. [ 329.225714][ T28] audit: type=1326 audit(1778959227.921:4343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12885 comm="syz.1.2822" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 329.326736][T12891] bridge_slave_1: left allmulticast mode [ 329.341488][T12895] [syz.2.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 329.360464][T12891] bridge_slave_1: left promiscuous mode [ 329.373916][T12891] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.479972][T12891] bond0: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 330.233897][T12917] netlink: 32 bytes leftover after parsing attributes in process `syz.3.2833'. [ 332.371084][T12928] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2837'. [ 332.406008][T12928] vlan2: entered allmulticast mode [ 332.418408][T12928] dummy0: entered allmulticast mode [ 332.427791][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 332.427806][ T28] audit: type=1400 audit(1778959231.119:4349): avc: denied { mount } for pid=12921 comm="syz.1.2835" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 332.456666][T12928] bridge0: port 3(vlan2) entered blocking state [ 332.463488][T12928] bridge0: port 3(vlan2) entered disabled state [ 332.470977][T12928] vlan2: entered promiscuous mode [ 332.476315][T12928] dummy0: entered promiscuous mode [ 332.483816][T12922] tipc: Enabling of bearer rejected, failed to enable media [ 333.232815][ T28] audit: type=1326 audit(1778959231.919:4350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12942 comm="syz.4.2841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72ca71c819 code=0x7ffc0000 [ 333.316595][ T28] audit: type=1326 audit(1778959231.919:4351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12942 comm="syz.4.2841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72ca71c819 code=0x7ffc0000 [ 333.349853][ T28] audit: type=1326 audit(1778959231.919:4352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12942 comm="syz.4.2841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7f72ca71c819 code=0x7ffc0000 [ 333.378672][ T28] audit: type=1326 audit(1778959232.039:4353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12942 comm="syz.4.2841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72ca71c819 code=0x7ffc0000 [ 333.402784][ T28] audit: type=1326 audit(1778959232.039:4354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12942 comm="syz.4.2841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72ca71c819 code=0x7ffc0000 [ 333.623433][T12945] netlink: 20 bytes leftover after parsing attributes in process `syz.2.2842'. [ 333.683519][T12945] lo speed is unknown, defaulting to 1000 [ 333.794151][T12955] netlink: 32 bytes leftover after parsing attributes in process `syz.1.2846'. [ 333.849611][T12964] netlink: 10 bytes leftover after parsing attributes in process `syz.2.2849'. [ 333.861108][T12966] [syz.1.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 333.913624][T12963] netem: invalid attributes len -24 [ 333.918975][T12963] netem: change failed [ 334.976060][T12984] netlink: 'syz.7.2855': attribute type 4 has an invalid length. [ 335.001840][T12984] netlink: 199836 bytes leftover after parsing attributes in process `syz.7.2855'. [ 335.138517][T12980] netlink: 56 bytes leftover after parsing attributes in process `syz.7.2855'. [ 335.297132][T12991] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2857'. [ 336.048226][ T28] audit: type=1326 audit(1778959234.738:4355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12996 comm="syz.1.2859" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 336.084626][ T28] audit: type=1326 audit(1778959234.738:4356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12996 comm="syz.1.2859" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 336.103269][T12999] netlink: 32 bytes leftover after parsing attributes in process `syz.2.2860'. [ 336.123199][ T28] audit: type=1326 audit(1778959234.738:4357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12996 comm="syz.1.2859" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 336.172106][ T28] audit: type=1326 audit(1778959234.848:4358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12996 comm="syz.1.2859" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe942a1c819 code=0x7ffc0000 [ 336.493407][T13023] [syz.1.] <== rxrpc_preparse_xdr_yfs_rxgk() = -EKEYREJECTED [d9c19884!=bc, 2c,d9c19820] [ 337.723238][T13014] loop3: detected capacity change from 0 to 1024 [ 337.889225][T13014] EXT4-fs: Ignoring removed bh option [ 337.942869][T13014] EXT4-fs (loop3): bad geometry: bigalloc file system with non-zero first_data_block [ 337.942869][T13014] [ 337.959855][T13043] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2874'. [ 338.637213][T13014] loop3: detected capacity change from 0 to 128 [ 338.666638][T13014] EXT4-fs (loop3): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 338.694192][T13014] ext4 filesystem being mounted at /22/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 338.708129][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 338.708185][ T28] audit: type=1400 audit(1778959237.386:4360): avc: denied { mount } for pid=13012 comm="syz.3.2865" name="/" dev="loop3" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 338.778403][T13014] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2865'. [ 338.792290][ T28] audit: type=1400 audit(1778959237.446:4361): avc: denied { add_name } for pid=13012 comm="syz.3.2865" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 338.836528][ T28] audit: type=1400 audit(1778959237.446:4362): avc: denied { create } for pid=13012 comm="syz.3.2865" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 338.904359][ T28] audit: type=1400 audit(1778959237.446:4363): avc: denied { read write open } for pid=13012 comm="syz.3.2865" path="/22/file1/file1" dev="loop3" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 338.970534][T13056] netlink: 'syz.1.2879': attribute type 1 has an invalid length. [ 339.015913][T12443] EXT4-fs (loop3): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 339.030196][T13061] netlink: 20 bytes leftover after parsing attributes in process `syz.7.2882'. [ 339.056414][T13061] netlink: 8 bytes leftover after parsing attributes in process `syz.7.2882'. [ 339.163640][T13074] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2887'. [ 339.200375][T13068] bond1: (slave lo): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 339.223012][ T28] audit: type=1326 audit(1778959237.916:4364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13077 comm="syz.7.2888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 339.259704][ T28] audit: type=1326 audit(1778959237.916:4365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13077 comm="syz.7.2888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 339.295201][ T28] audit: type=1326 audit(1778959237.916:4366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13077 comm="syz.7.2888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=290 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 339.416028][T13068] bond1: (slave lo): Enslaving as an active interface with an up link [ 339.424394][ T28] audit: type=1326 audit(1778959237.916:4367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13077 comm="syz.7.2888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 339.447142][T13068] A link change request failed with some changes committed already. Interface tunl0 may have been left with an inconsistent configuration, please check. [ 339.448404][ T28] audit: type=1326 audit(1778959237.916:4368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13077 comm="syz.7.2888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f50678ec819 code=0x7ffc0000 [ 339.491007][ T3392] lo speed is unknown, defaulting to 1000 [ 339.496975][ T3399] lo speed is unknown, defaulting to 1000 [ 339.497002][ T3419] lo speed is unknown, defaulting to 1000 [ 339.521957][ T28] audit: type=1326 audit(1778959237.916:4369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13077 comm="syz.7.2888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f50678ad04e code=0x7ffc0000 [ 341.368027][T13115] netlink: 8 bytes leftover after parsing attributes in process `syz.7.2900'. [ 341.606303][T13125] loop3: detected capacity change from 0 to 1764 [ 341.656568][T13125] ISOFS: root inode is unusable. Disabling Rock Ridge and switching to Joliet. [ 341.688075][T13125] isofs_fill_super: get root inode failed [ 341.807637][T13126] lo speed is unknown, defaulting to 1000 [ 341.863990][T13126] chnl_net:caif_netlink_parms(): no params data found [ 341.911856][T13126] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.926380][T13126] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.943975][T13126] bridge_slave_0: entered allmulticast mode [ 341.950722][T13126] bridge_slave_0: entered promiscuous mode [ 341.958183][T13126] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.966450][T13126] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.974412][T13126] bridge_slave_1: entered allmulticast mode [ 341.981326][T13126] bridge_slave_1: entered promiscuous mode [ 342.000790][T13126] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 342.012986][T13126] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 342.034091][T13126] team0: Port device team_slave_0 added [ 342.041009][T13126] team0: Port device team_slave_1 added [ 342.058687][T13126] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 342.065972][T13126] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 342.092299][T13126] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 342.103835][T13126] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 342.111223][T13126] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 342.137656][T13126] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 342.166303][T13126] hsr_slave_0: entered promiscuous mode [ 342.172733][T13126] hsr_slave_1: entered promiscuous mode [ 342.179098][T13126] debugfs: 'hsr0' already exists in 'hsr' [ 342.184880][T13126] Cannot create hsr debugfs directory [ 342.200228][T13147] loop3: detected capacity change from 0 to 32768 [ 342.227772][T12705] loop3: p1 p3 < > [ 342.239945][T13147] loop3: p1 p3 < > [ 342.565124][T13159] tipc: Started in network mode [ 342.571877][T13159] tipc: Node identity 00000000400000000000000000000001, cluster identity 4711 [ 342.591958][T13159] tipc: Enabling of bearer rejected, failed to enable media [ 342.751893][T13126] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 342.830730][T13126] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 342.924619][T13126] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 342.933810][T13126] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 343.022874][T13126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 343.031905][T13177] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2912'. [ 343.054915][T13126] 8021q: adding VLAN 0 to HW filter on device team0 [ 343.083830][ T869] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.091175][ T869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.102085][ T869] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.109463][ T869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.506966][T13126] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 343.795700][T13126] veth0_vlan: entered promiscuous mode [ 343.858886][T13126] veth1_vlan: entered promiscuous mode [ 343.935288][T13126] veth0_macvtap: entered promiscuous mode [ 343.965956][T13126] veth1_macvtap: entered promiscuous mode [ 344.016943][T13126] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 344.058507][T13126] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 344.113543][ T12] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.142827][ T12] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.176424][ T12] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.207644][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.347464][ T28] kauditd_printk_skb: 28 callbacks suppressed [ 344.347557][ T28] audit: type=1400 audit(1778959242.974:4398): avc: denied { create } for pid=13212 comm="syz.2.2902" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=key permissive=1 [ 344.648105][T13219] loop3: detected capacity change from 0 to 32768 [ 344.708654][T12705] loop3: p1 p3 < > [ 344.817221][T13219] loop3: p1 p3 < > [ 345.240651][T13250] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2930'. [ 345.482424][T13254] loop2: detected capacity change from 0 to 164 [ 345.504241][T13254] rock: directory entry would overflow storage [ 345.511091][T13254] rock: sig=0x66, size=4, remaining=3 [ 345.539971][T13254] rock: directory entry would overflow storage [ 345.546565][T13254] rock: sig=0x66, size=4, remaining=3 [ 345.558884][T13254] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 345.568371][T13254] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 345.613300][ T28] audit: type=1400 audit(1778959244.133:4399): avc: denied { prog_load } for pid=13245 comm="syz.2.2933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 345.850857][ T28] audit: type=1400 audit(1778959244.133:4400): avc: denied { bpf } for pid=13245 comm="syz.2.2933" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 346.121156][ T28] audit: type=1400 audit(1778959244.163:4401): avc: denied { read write } for pid=13245 comm="syz.2.2933" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 346.236242][ T28] audit: type=1400 audit(1778959244.163:4402): avc: denied { open } for pid=13245 comm="syz.2.2933" path="/dev/loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 346.331592][ T28] audit: type=1400 audit(1778959244.163:4403): avc: denied { ioctl } for pid=13245 comm="syz.2.2933" path="/dev/loop2" dev="devtmpfs" ino=102 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 346.473282][ T28] audit: type=1400 audit(1778959244.183:4404): avc: denied { mounton } for pid=13245 comm="syz.2.2933" path="/2/file0" dev="tmpfs" ino=28 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 346.596632][ T28] audit: type=1400 audit(1778959244.213:4405): avc: denied { mount } for pid=13245 comm="syz.2.2933" name="/" dev="loop2" ino=1792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 346.680867][ T28] audit: type=1400 audit(1778959244.223:4406): avc: denied { create } for pid=13245 comm="syz.2.2933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 346.768679][ T28] audit: type=1400 audit(1778959244.283:4407): avc: denied { kexec_image_load } for pid=13245 comm="syz.2.2933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 346.870289][T13269] loop3: detected capacity change from 0 to 32768 [ 346.895324][T13270] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2939'. [ 346.940354][T13275] loop2: detected capacity change from 0 to 256 [ 347.022648][T12705] loop3: p1 p3 < > [ 347.079521][T13269] loop3: p1 p3 < > [ 347.098008][T13275] FAT-fs (loop2): Directory bread(block 64) failed [ 347.123547][T13275] FAT-fs (loop2): Directory bread(block 65) failed [ 347.155935][T13275] FAT-fs (loop2): Directory bread(block 66) failed [ 347.168510][T13275] FAT-fs (loop2): Directory bread(block 67) failed [ 347.187507][T13275] FAT-fs (loop2): Directory bread(block 68) failed [ 347.226743][T13275] FAT-fs (loop2): Directory bread(block 69) failed [ 347.252852][T13275] FAT-fs (loop2): Directory bread(block 70) failed [ 347.282373][T13275] FAT-fs (loop2): Directory bread(block 71) failed [ 347.291257][T13288] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2947'. [ 347.308979][T13275] FAT-fs (loop2): Directory bread(block 72) failed [ 347.326715][T13275] FAT-fs (loop2): Directory bread(block 73) failed [ 347.341623][T12705] udevd[12705]: inotify_add_watch(7, /dev/loop3p1, 10) failed: No such file or directory [ 347.342232][T12683] udevd[12683]: inotify_add_watch(7, /dev/loop3p3, 10) failed: No such file or directory [ 347.407548][T12705] udevd[12705]: inotify_add_watch(7, /dev/loop3p1, 10) failed: No such file or directory [ 347.408501][T12683] udevd[12683]: inotify_add_watch(7, /dev/loop3p3, 10) failed: No such file or directory [ 347.446507][T13295] loop2: detected capacity change from 0 to 1024 [ 347.463088][T13295] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 347.491462][T13295] EXT4-fs error (device loop2): ext4_read_block_bitmap_nowait:483: comm syz.2.2951: Invalid block bitmap block 0 in block_group 0 [ 347.508920][T13295] loop2: lost filesystem error report for type 5 error -117 [ 347.509053][ C0] EXT4-fs (loop2): error count since last fsck: 1 [ 347.523169][ C0] EXT4-fs (loop2): initial error at time 1778959246: ext4_read_block_bitmap_nowait:483 [ 347.532831][ C0] EXT4-fs (loop2): last error at time 1778959246: ext4_read_block_bitmap_nowait:483 [ 347.542810][T13295] EXT4-fs error (device loop2): ext4_acquire_dquot:7026: comm syz.2.2951: Failed to acquire dquot type 0 [ 347.554144][T13295] loop2: lost filesystem error report for type 5 error -117 [ 347.565038][T13295] EXT4-fs error (device loop2): ext4_free_blocks:6724: comm syz.2.2951: Freeing blocks not in datazone - block = 0, count = 4096 [ 347.586108][T13295] loop2: lost filesystem error report for type 5 error -117 [ 347.586418][T13295] EXT4-fs error (device loop2): ext4_read_inode_bitmap:139: comm syz.2.2951: Invalid inode bitmap blk 0 in block_group 0 [ 347.609130][ T55] EXT4-fs error (device loop2): ext4_release_dquot:7062: comm kworker/u8:4: Failed to release dquot type 0 [ 347.626969][T13295] loop2: lost filesystem error report for type 5 error -117 [ 347.627143][T13295] EXT4-fs error (device loop2) in ext4_free_inode:361: Corrupt filesystem [ 347.648412][T13295] loop2: lost filesystem error report for type 5 error -117 [ 347.648447][ T55] loop2: lost filesystem error report for type 5 error -117 [ 347.656398][T13295] EXT4-fs (loop2): 1 orphan inode deleted [ 347.670372][T13295] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 347.704111][T13126] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 348.782079][T13326] lo speed is unknown, defaulting to 1000 [ 348.886490][T13323] serio: Serial port ttyS3 [ 349.328514][T13337] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2962'. [ 349.379007][T13345] loop2: detected capacity change from 0 to 1024 [ 349.395729][T13345] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 349.401799][ T28] kauditd_printk_skb: 67 callbacks suppressed [ 349.401813][ T28] audit: type=1400 audit(1778959248.091:4472): avc: denied { create } for pid=13340 comm="syz.7.2963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 349.434235][T13341] siw: device registration error -23 [ 349.436216][ T28] audit: type=1400 audit(1778959248.121:4473): avc: denied { write } for pid=13340 comm="syz.7.2963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 349.440597][T13345] EXT4-fs error (device loop2): ext4_read_block_bitmap_nowait:483: comm syz.2.2965: Invalid block bitmap block 0 in block_group 0 [ 349.464393][ T28] audit: type=1400 audit(1778959248.151:4474): avc: denied { write } for pid=13340 comm="syz.7.2963" lport=55710 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 349.494792][T13345] loop2: lost filesystem error report for type 5 error -117 [ 349.494966][T13345] Quota error (device loop2): write_blk: dquota write failed [ 349.502491][ C1] EXT4-fs (loop2): error count since last fsck: 1 [ 349.502510][ C1] EXT4-fs (loop2): initial error at time 1778959248: ext4_read_block_bitmap_nowait:483 [ 349.502543][ C1] EXT4-fs (loop2): last error at time 1778959248: ext4_read_block_bitmap_nowait:483 [ 349.535910][T13345] Quota error (device loop2): qtree_write_dquot: Error -117 occurred while creating quota [ 349.546530][T13345] EXT4-fs error (device loop2): ext4_acquire_dquot:7026: comm syz.2.2965: Failed to acquire dquot type 0 [ 349.558034][T13345] loop2: lost filesystem error report for type 5 error -117 [ 349.558242][T13345] EXT4-fs error (device loop2): ext4_free_blocks:6724: comm syz.2.2965: Freeing blocks not in datazone - block = 0, count = 4096 [ 349.579249][T13345] loop2: lost filesystem error report for type 5 error -117 [ 349.579498][T13345] EXT4-fs error (device loop2): ext4_read_inode_bitmap:139: comm syz.2.2965: Invalid inode bitmap blk 0 in block_group 0 [ 349.601049][ T7730] Quota error (device loop2): do_check_range: Getting block 0 out of range 1-7 [ 349.623673][ T7730] EXT4-fs error (device loop2): ext4_release_dquot:7062: comm kworker/u8:19: Failed to release dquot type 0 [ 349.644268][T13345] loop2: lost filesystem error report for type 5 error -117 [ 349.644385][T13345] EXT4-fs error (device loop2) in ext4_free_inode:361: Corrupt filesystem [ 349.646974][T13353] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 349.659579][T13345] EXT4-fs (loop2): 1 orphan inode deleted [ 349.675239][T13353] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 349.679568][T13345] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 349.729031][T13126] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 349.876707][ T28] audit: type=1400 audit(1778959248.531:4475): avc: denied { create } for pid=13364 comm="syz.7.2970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 349.906898][ T28] audit: type=1400 audit(1778959248.531:4476): avc: denied { setopt } for pid=13364 comm="syz.7.2970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 349.927232][ T28] audit: type=1400 audit(1778959248.531:4477): avc: denied { execute } for pid=13364 comm="syz.7.2970" name="file0" dev="tmpfs" ino=1403 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 349.971659][ T28] audit: type=1400 audit(1778959248.531:4478): avc: denied { execute_no_trans } for pid=13364 comm="syz.7.2970" path="/259/file0" dev="tmpfs" ino=1403 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 350.179949][T13377] loop2: detected capacity change from 0 to 164 [ 350.199799][T13377] rock: directory entry would overflow storage [ 350.206733][T13377] rock: sig=0x66, size=4, remaining=3 [ 350.237112][T13377] rock: directory entry would overflow storage [ 350.244568][T13377] rock: sig=0x66, size=4, remaining=3 [ 350.253507][T13377] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 350.263159][T13377] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 351.804716][T13408] tipc: Started in network mode [ 351.809953][T13408] tipc: Node identity 00000000400000000000000000000001, cluster identity 4711 [ 351.820504][T13408] tipc: Enabling of bearer rejected, failed to enable media [ 351.926819][T13403] loop2: detected capacity change from 0 to 1024 [ 351.948158][T13403] EXT4-fs: Ignoring removed bh option [ 351.954216][T13403] EXT4-fs (loop2): bad geometry: bigalloc file system with non-zero first_data_block [ 351.954216][T13403] [ 351.979024][T13403] loop2: detected capacity change from 0 to 128 [ 351.995952][T13403] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 352.013098][T13417] loop3: detected capacity change from 0 to 512 [ 352.062081][T13403] ext4 filesystem being mounted at /11/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 352.144103][T13409] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2982'. [ 352.249468][T13126] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 352.500470][T13437] SELinux: Context system_u:object_r:klogd_var_run_t:s0 is not valid (left unmapped). [ 352.634955][T13435] loop2: detected capacity change from 0 to 32768 [ 352.774884][T13455] loop3: detected capacity change from 0 to 164 [ 352.796621][T13450] tipc: Started in network mode [ 352.801944][T13450] tipc: Node identity 00000000400000000000000000000001, cluster identity 4711 [ 352.813930][T13450] tipc: Enabling of bearer rejected, failed to enable media [ 352.823051][T13455] rock: directory entry would overflow storage [ 352.829216][T13455] rock: sig=0x66, size=4, remaining=3 [ 352.838409][T13455] rock: directory entry would overflow storage [ 352.844647][T13455] rock: sig=0x66, size=4, remaining=3 [ 352.850718][T13455] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 352.858530][T13455] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 352.878501][T13448] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2999'. [ 352.982582][T12705] loop2: p1 p3 < > [ 353.608351][T13435] loop2: p1 p3 < > [ 354.338136][T13485] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3004'. [ 354.435616][T13487] loop2: detected capacity change from 0 to 1024 [ 354.584691][ T28] kauditd_printk_skb: 97 callbacks suppressed [ 354.584706][ T28] audit: type=1400 audit(1778959253.268:4576): avc: denied { create } for pid=13474 comm="syz.1.3004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 354.626308][T13487] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 354.662728][T12784] udevd[12784]: inotify_add_watch(7, /dev/loop2p3, 10) failed: No such file or directory [ 354.677419][T12705] udevd[12705]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 354.682718][ T28] audit: type=1400 audit(1778959253.298:4577): avc: denied { mounton } for pid=13484 comm="syz.2.3005" path="/13/file0" dev="tmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 354.710685][T13487] EXT4-fs error (device loop2): ext4_read_block_bitmap_nowait:483: comm syz.2.3005: Invalid block bitmap block 0 in block_group 0 [ 354.735166][ T28] audit: type=1400 audit(1778959253.308:4578): avc: denied { listen } for pid=13488 comm="syz.4.3008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 354.754930][ T28] audit: type=1400 audit(1778959253.308:4579): avc: denied { write } for pid=13488 comm="syz.4.3008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 354.755123][T13487] fserror_report: 2 callbacks suppressed [ 354.755155][T13487] loop2: lost filesystem error report for type 5 error -117 [ 354.792716][ T28] audit: type=1400 audit(1778959253.308:4580): avc: denied { create } for pid=13488 comm="syz.4.3008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 354.818268][T12683] udevd[12683]: inotify_add_watch(7, /dev/loop2p3, 10) failed: No such file or directory [ 354.834451][T12705] udevd[12705]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 354.846945][T13487] Quota error (device loop2): write_blk: dquota write failed [ 354.854419][ C1] EXT4-fs (loop2): error count since last fsck: 1 [ 354.854437][ C1] EXT4-fs (loop2): initial error at time 1778959253: ext4_read_block_bitmap_nowait:483 [ 354.854461][ C1] EXT4-fs (loop2): last error at time 1778959253: ext4_read_block_bitmap_nowait:483 [ 354.940971][ T28] audit: type=1400 audit(1778959253.358:4581): avc: denied { create } for pid=13488 comm="syz.4.3008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 354.991198][T13487] Quota error (device loop2): qtree_write_dquot: Error -117 occurred while creating quota [ 355.012854][ T28] audit: type=1400 audit(1778959253.358:4582): avc: denied { write } for pid=13488 comm="syz.4.3008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 355.041767][T13487] EXT4-fs error (device loop2): ext4_acquire_dquot:7026: comm syz.2.3005: Failed to acquire dquot type 0 [ 355.072903][ T28] audit: type=1400 audit(1778959253.478:4583): avc: denied { ioctl } for pid=13493 comm="syz.3.3007" path="socket:[37854]" dev="sockfs" ino=37854 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 355.102913][T13487] loop2: lost filesystem error report for type 5 error -117 [ 355.103169][T13487] EXT4-fs error (device loop2): ext4_free_blocks:6724: comm syz.2.3005: Freeing blocks not in datazone - block = 0, count = 4096 [ 355.172882][T13487] loop2: lost filesystem error report for type 5 error -117 [ 355.174582][T13487] EXT4-fs error (device loop2): ext4_read_inode_bitmap:139: comm syz.2.3005: Invalid inode bitmap blk 0 in block_group 0 [ 355.196302][ T7725] EXT4-fs error (device loop2): ext4_release_dquot:7062: comm kworker/u8:14: Failed to release dquot type 0 [ 355.202980][T13487] loop2: lost filesystem error report for type 5 error -117 [ 355.213203][T13487] EXT4-fs error (device loop2) in ext4_free_inode:361: Corrupt filesystem [ 355.219066][ T7725] loop2: lost filesystem error report for type 5 error -117 [ 355.223131][T13487] loop2: lost filesystem error report for type 5 error -117 [ 355.267916][T13487] EXT4-fs (loop2): 1 orphan inode deleted [ 355.325863][T13487] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 355.364571][T13515] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3016'. [ 355.389333][T13515] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3016'. [ 355.410292][T13515] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3016'. [ 355.434140][T13126] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 355.466060][T13515] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3016'. [ 355.475182][T13515] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3016'. [ 355.523644][ T7730] netdevsim netdevsim1 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 355.542020][ T7730] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 355.563180][T13515] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3016'. [ 355.668691][ T7730] netdevsim netdevsim1 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 355.682272][T13515] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3016'. [ 355.713208][ T7730] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 355.775740][T13512] lo speed is unknown, defaulting to 1000 [ 355.964823][ T7730] netdevsim netdevsim1 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 355.985781][ T7730] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 356.243281][ T7730] netdevsim netdevsim1 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 356.254021][ T7730] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 356.268584][T13563] FAULT_INJECTION: forcing a failure. [ 356.268584][T13563] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 356.294970][T13563] CPU: 1 UID: 0 PID: 13563 Comm: syz.3.3031 Not tainted syzkaller #0 PREEMPT(full) [ 356.294995][T13563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 356.295008][T13563] Call Trace: [ 356.295014][T13563] [ 356.295060][T13563] __dump_stack+0x1d/0x30 [ 356.295130][T13563] dump_stack_lvl+0x95/0xd0 [ 356.295151][T13563] dump_stack+0x15/0x1b [ 356.295202][T13563] should_fail_ex+0x263/0x280 [ 356.295230][T13563] should_fail+0xb/0x20 [ 356.295253][T13563] should_fail_usercopy+0x1a/0x20 [ 356.295278][T13563] _copy_from_user+0x1c/0xb0 [ 356.295378][T13563] __sys_bpf+0x183/0x7e0 [ 356.295403][T13563] __x64_sys_bpf+0x41/0x50 [ 356.295419][T13563] x64_sys_call+0x10cb/0x3020 [ 356.295445][T13563] do_syscall_64+0x12c/0x370 [ 356.295470][T13563] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 356.295571][T13563] RIP: 0033:0x7fd98019c819 [ 356.295586][T13563] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 356.295601][T13563] RSP: 002b:00007fd97ebf7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 356.295661][T13563] RAX: ffffffffffffffda RBX: 00007fd980415fa0 RCX: 00007fd98019c819 [ 356.295673][T13563] RDX: 0000000000000094 RSI: 0000200000000500 RDI: 0000000000000005 [ 356.295685][T13563] RBP: 00007fd97ebf7090 R08: 0000000000000000 R09: 0000000000000000 [ 356.295696][T13563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 356.295708][T13563] R13: 00007fd980416038 R14: 00007fd980415fa0 R15: 00007ffd9deb3a38 [ 356.295727][T13563] [ 356.529763][T13512] chnl_net:caif_netlink_parms(): no params data found [ 356.644412][T13579] loop3: detected capacity change from 0 to 512 [ 356.657346][ T7730] batman_adv: batadv0: Interface deactivated: gretap1 [ 356.743764][ T3419] ================================================================== [ 356.751870][ T3419] BUG: KCSAN: data-race in kick_pool / wq_worker_running [ 356.758899][ T3419] [ 356.761230][ T3419] read-write to 0xffff888237c2a8a4 of 4 bytes by task 3357 on cpu 0: [ 356.769453][ T3419] wq_worker_running+0x9b/0x120 [ 356.774300][ T3419] schedule_timeout+0xca/0x180 [ 356.779049][ T3419] msleep+0x4f/0x90 [ 356.782837][ T3419] nsim_fib_event+0x3e32/0x4d70 [ 356.787763][ T3419] nsim_fib_event_work+0x13d/0x210 [ 356.792958][ T3419] process_scheduled_works+0x513/0xa10 [ 356.798516][ T3419] worker_thread+0x58a/0x780 [ 356.803091][ T3419] kthread+0x22a/0x280 [ 356.807233][ T3419] ret_from_fork+0x150/0x360 [ 356.811832][ T3419] ret_from_fork_asm+0x1a/0x30 [ 356.816673][ T3419] [ 356.819070][ T3419] read to 0xffff888237c2a8a4 of 4 bytes by task 3419 on cpu 1: [ 356.826601][ T3419] kick_pool+0x49/0x2d0 [ 356.830846][ T3419] __queue_work+0x896/0xaf0 [ 356.835348][ T3419] queue_work_on+0xa9/0x140 [ 356.839839][ T3419] process_srcu+0xa56/0xdc0 [ 356.844694][ T3419] process_scheduled_works+0x513/0xa10 [ 356.850210][ T3419] worker_thread+0x58a/0x780 [ 356.854786][ T3419] kthread+0x22a/0x280 [ 356.858833][ T3419] ret_from_fork+0x150/0x360 [ 356.863407][ T3419] ret_from_fork_asm+0x1a/0x30 [ 356.868359][ T3419] [ 356.871198][ T3419] value changed: 0x00000000 -> 0x00000001 [ 356.876901][ T3419] [ 356.879200][ T3419] Reported by Kernel Concurrency Sanitizer on: [ 356.885411][ T3419] CPU: 1 UID: 0 PID: 3419 Comm: kworker/1:5 Not tainted syzkaller #0 PREEMPT(full) [ 356.894763][ T3419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 356.904973][ T3419] Workqueue: rcu_gp process_srcu [ 356.909900][ T3419] ================================================================== [ 357.216477][ T7730] batman_adv: batadv0: Removing interface: gretap1 [ 357.495843][ T7730] bond0 (unregistering): Released all slaves [ 357.504210][ T7730] bond1 (unregistering): (slave lo): Releasing backup interface [ 357.512190][ T7730] bond1 (unregistering): (slave lo): last VLAN challenged slave left bond - VLAN blocking is removed [ 357.526511][ T7730] bond1 (unregistering): Released all slaves [ 357.554758][ T3419] lo speed is unknown, defaulting to 1000 [ 357.560560][ T35] lo speed is unknown, defaulting to 1000 [ 357.566549][ T35] syz2: Port: 1 Link DOWN [ 357.583158][T13512] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.593000][T13512] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.604263][T13512] bridge_slave_0: entered allmulticast mode [ 357.614635][T13512] bridge_slave_0: entered promiscuous mode [ 357.621348][ T7730] tipc: Left network mode [ 357.621644][T13512] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.633047][T13512] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.661088][T13512] bridge_slave_1: entered allmulticast mode [ 357.667863][T13512] bridge_slave_1: entered promiscuous mode [ 357.677724][ T7730] hsr_slave_0: left promiscuous mode [ 357.686470][ T7730] hsr_slave_1: left promiscuous mode [ 357.693327][ T7730] batman_adv: batadv0: Interface deactivated: macvlan0 [ 357.714256][ T7730] batman_adv: batadv0: Removing interface: macvlan0 [ 357.724021][ T7730] veth1_macvtap: left promiscuous mode [ 357.729887][ T7730] veth0_macvtap: left promiscuous mode [ 357.735646][ T7730] veth1_vlan: left promiscuous mode [ 357.740977][ T7730] veth0_vlan: left promiscuous mode [ 357.886881][T13512] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 357.905709][T13512] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 357.936428][T13512] team0: Port device team_slave_0 added [ 357.946328][T13512] team0: Port device team_slave_1 added [ 357.964323][T13512] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 357.971373][T13512] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 357.999808][T13512] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 358.011275][T13512] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 358.024579][T13512] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 358.052306][T13512] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 358.088928][T13512] hsr_slave_0: entered promiscuous mode [ 358.099820][T13512] hsr_slave_1: entered promiscuous mode [ 358.119326][ T7730] IPVS: stop unused estimator thread 0... [ 358.384378][T13512] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 358.398685][T13512] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 358.407693][T13512] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 358.418003][T13512] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 358.444778][T13512] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.452045][T13512] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.459928][T13512] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.467090][T13512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.518315][T13512] 8021q: adding VLAN 0 to HW filter on device bond0 [ 358.534926][ T7730] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.543703][ T7730] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.561195][T13512] 8021q: adding VLAN 0 to HW filter on device team0 [ 358.575269][ T7730] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.582357][ T7730] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.592950][ T7725] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.600063][ T7725] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.703857][T13512] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 358.793329][T13512] veth0_vlan: entered promiscuous mode [ 358.803518][T13512] veth1_vlan: entered promiscuous mode [ 358.820618][T13512] veth0_macvtap: entered promiscuous mode [ 358.828508][T13512] veth1_macvtap: entered promiscuous mode [ 358.840706][T13512] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 358.853372][T13512] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 358.864280][ T7725] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.873624][ T7725] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.885281][ T7725] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.894212][ T7725] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0