last executing test programs: 1.799101839s ago: executing program 1 (id=2): bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002080)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000780)='./file0/../file0\x00', 0x0, 0xa06002, 0x0) 1.740464849s ago: executing program 3 (id=6): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x80, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, 0x80}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x40200, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'pimreg0\x00'}) 1.708467819s ago: executing program 1 (id=7): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) symlinkat(0x0, 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00') socket$qrtr(0x2a, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r2 = socket$inet6(0xa, 0x3, 0x3c) r3 = socket$rxrpc(0x21, 0x2, 0x2) getsockopt(r3, 0x110, 0x6, 0x0, 0x0) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000f00)=ANY=[@ANYBLOB="0002020100"], 0x18) 1.67851401s ago: executing program 0 (id=1): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000004000000000000008100d00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0xe, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private2}, &(0x7f00000001c0)=0x1c) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000200)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x16}) arch_prctl$ARCH_REQ_XCOMP_PERM(0x1023, 0x10) getxattr(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6ffeffff41ce11475203d56caa386a851c07d9423b57a626352dd41403f43346293cada1b54ce996806b73f85092e5c78533254b209a0d216140fe18b09dd595655e36ec328a7080d90b3db16c8b0729d227a669686d0a05a34859d1d8b3464408066da0000000"], 0x0, 0x0) 1.62063907s ago: executing program 3 (id=8): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc1fff}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="090000000300000008000000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000d80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4000000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x2014, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x44, 0x6, 0x410, 0x238, 0x238, 0x238, 0x98, 0x98, 0x378, 0x378, 0x378, 0x378, 0x378, 0x6, 0x0, {[{{@ip={@loopback, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00', {}, {}, 0x0, 0x0, 0x11}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'wg1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb8, 0x100, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x28, 0x0, 0x0, 0x0, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev={0xfe, 0x80, '\x00', 0x18}, 'veth0_virt_wifi\x00', {0x7}}}}, {{@ip={@rand_addr, @private, 0xffffffff, 0xff, 'syzkaller0\x00', 'veth1_to_team\x00', {}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0xff000000, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x4, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) r2 = syz_io_uring_setup(0x4b5, &(0x7f0000010400)={0x0, 0x86e1, 0x1, 0x8}, &(0x7f0000010080), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r2, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) 1.61701012s ago: executing program 0 (id=9): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) r0 = syz_io_uring_setup(0x837, &(0x7f0000000180)={0x0, 0x679a, 0x10, 0x4, 0xf}, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) (async) r3 = socket$key(0xf, 0x3, 0x2) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70200000000f400850000008600000095"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='kmem_cache_free\x00', r6, 0x0, 0xfffffffffffffffc}, 0x18) (async) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) sendmsg$key(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="020900000700000000000000000000000500", @ANYRES64], 0x38}}, 0x20000004) (async) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) (async, rerun: 32) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_FADVISE={0x18, 0x48, 0x0, @fd_index=0x5, 0x712, 0x0, 0x100, 0x2}) (async, rerun: 32) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000380)=[{0x200000000006, 0x0, 0x0, 0x7ffc0005}, {0x6, 0x40, 0x0, 0x1}]}) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge0\x00'}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010005000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) (async) timer_create(0x3, 0x0, &(0x7f00000002c0)=0x0) timer_delete(r9) (async) io_uring_enter(r0, 0x3516, 0x0, 0x0, 0x0, 0x0) 1.534459s ago: executing program 0 (id=10): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc1fff}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="090000000300000008000000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000d80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4000000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x2014, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x44, 0x6, 0x410, 0x238, 0x238, 0x238, 0x98, 0x98, 0x378, 0x378, 0x378, 0x378, 0x378, 0x6, 0x0, {[{{@ip={@loopback, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00', {}, {}, 0x0, 0x0, 0x11}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'wg1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb8, 0x100, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x28, 0x0, 0x0, 0x0, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@dev={0xfe, 0x80, '\x00', 0x18}, 'veth0_virt_wifi\x00', {0x7}}}}, {{@ip={@rand_addr, @private, 0xffffffff, 0xff, 'syzkaller0\x00', 'veth1_to_team\x00', {}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0xff000000, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x4, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) r2 = syz_io_uring_setup(0x4b5, &(0x7f0000010400)={0x0, 0x86e1, 0x1, 0x8}, &(0x7f0000010080), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r2, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) (fail_nth: 1) 1.457212521s ago: executing program 3 (id=11): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100202, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000003c0)='mm_page_alloc\x00', r2, 0x0, 0xffffffffffffffff}, 0x18) r3 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r3, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @dev}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b57000000860f5878c37ffe36e1165814d435be5b317c6c8189587d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988ab013f40afe403041323110f62055394412158e7a3adb148d641aa40d4ab077fe34232aa8b31851466d0998a61d7da0c86d70000001010"], 0x10b8}, 0xff4c) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x100000, 0x0, 0x0, 0x40f00, 0x14, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='rxrpc_local\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='fib_table_lookup\x00', r5, 0x0, 0x80000001}, 0x18) r8 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)=ANY=[], 0x10b8}, 0x4000000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) r10 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r10, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c00b7f793d6", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x4000804) 1.189552862s ago: executing program 2 (id=3): bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180), 0x10, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x8000}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') wait4(0x0, 0x0, 0x40000000, 0x0) r3 = syz_clone(0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r3, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000001, 0x31, 0xffffffffffffffff, 0xffffd000) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x1, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffc000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getpeername$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000280)=0x1c) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r4, 0x5) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x11}}}}}}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e23, 0xfffffffd, @remote, 0x4}}, 0x0, 0x0, 0x49, 0x0, "3d55e5b303c16416b8319775954a51de3f5b872365f1a136118b6dc89998096fd33e5e982be73805e971bd5e4f8bce1fe6aba4f3dcd68de27fd611d1a3601a5f7068f1cea2a63d2500598c29d506d098"}, 0xd8) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x4}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x4}}}}}}}, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) sendto$packet(r5, &(0x7f0000000080)="18", 0x10, 0x0, &(0x7f00000000c0)={0x11, 0xe, r6, 0x1, 0x0, 0x6, @multicast}, 0x14) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000002c0)={r6, @empty, @private=0xa010101}, 0xc) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) 1.145586663s ago: executing program 3 (id=12): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r0}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000580), 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r3) sendmsg$BATADV_CMD_GET_DAT_CACHE(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="05a300000000000000000d443300040003b334f1e5ee49a41b7684da2c776ec46d574d653491c4fa6e2b4987f626a36b7d1a2c31d635d7951df36713792b1029cafe98019072b562ff596295be4d1c32d03a129b441c669c830a215c5cb80f8fe1879bb124e26ed580eb7fd9757fecfcd88a7fa61e16f70853fb319ae40f5e6edb976a0e4cfec1f7497e548877e5143cb15c410dd3fef8bcf13ef8a29d84fd63f1f63bd193"], 0x1c}}, 0x8000) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="1cf5069033ddff", @ANYRES16=r4, @ANYBLOB="00082dbd7000fbdbdf250d0000000800390003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4805) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="400000001000390400"/20, @ANYRES32=r6, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r6], 0x40}, 0x1, 0x0, 0x0, 0x4014}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x44, 0x24, 0x5820a61ca228659, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0x9}, {0xffff, 0xffff}, {0x0, 0x7}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_USC={0x10, 0x3, {0x6, 0x2}}}}]}, 0x44}}, 0x800) sendmsg$nl_route_sched(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000b40)=@newtfilter={0x24, 0x29, 0xd27, 0x1004001, 0x0, {0x0, 0x0, 0x0, r8, {0x0, 0x9}, {}, {0x2, 0xb}}}, 0x24}, 0x1, 0x0, 0x0, 0x810}, 0x48c0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x818010, &(0x7f00000006c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x3}}, {@grpjquota}], [{@fsuuid={'fsuuid', 0x3d, {[0x3, 0x30, 0x35, 0x66, 0x31, 0x64, 0x65, 0x37], 0x2d, [0x32, 0x62, 0x33, 0x31], 0x2d, [0x65, 0x35, 0x63, 0x61], 0x2d, [0x34, 0x62, 0xf, 0x32], 0x2d, [0x34, 0x32, 0x37, 0x30, 0x39, 0x65, 0x4, 0x66]}}}]}, 0x3, 0x72c, &(0x7f00000014c0)="$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") 1.075756483s ago: executing program 0 (id=13): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmstat\x00', 0x0, 0x0) r1 = syz_io_uring_setup(0x49d, &(0x7f0000000080)={0x0, 0x79ae, 0x400, 0x7ff9, 0x32c}, &(0x7f00000004c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x6000, @fd=r0, 0x6, &(0x7f0000000580)=""/207, 0xcf, 0x2, 0x1}) io_uring_enter(r1, 0xfd0, 0x4c5, 0x8, 0x0, 0x20) 1.075467743s ago: executing program 4 (id=5): bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002080)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000780)='./file0/../file0\x00', 0x0, 0xa06002, 0x0) 1.062811683s ago: executing program 4 (id=14): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040)={[0xa8]}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="340100001c0000022bbd7000ffdbdf253308001f00020000000c000f00c5080000000000003c001700080000310029bd70002cbd700029bd70002cbd7000000200000300000001000100000100000900001f06000000ffffff7f09000000000000000c001c", @ANYRES32=r1, @ANYBLOB="02000000ba0003006c7a730000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090030000f337a2aa312f87b6149a7733991a4025c3bf2a69357e27797a7f61761417b2a1ddc210b4ead39f52c7b3abdc7b9ab52c704819025b8479ffa323cfc4e9358af60106ff39346ba480e40c012444b4025569afc08c6306a88b7995eac963df5cfe4a4e93473be27c30ffe1152627862f5794c8000005001900ff000000000000"], 0x134}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r2}, 0x18) stat(0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x4, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/cgroup.procs\x00', 0xe02, 0x1c0) memfd_create(&(0x7f0000000ac0)='v\xa6\xf5lj6,r\xaf\xe8\x10/\xecg\xed\xe3h\x80\xb8!y6w\xda\xdd\xb9\nR\xe8@\x99\xb9\x8a\x0fZ\t\x90\x8bp\x10\x84\x86t\x8a\xba\xc6\xfb\xd2\f\xef&\xad\xa8M\xe8\b\xb0#\xac)\x81\x1e\x8a\f\x11D\x90\xf5\xbb\x1c\xac\xc7\xad\xdc\\\x11\x95\xf8\xe6\xa7\xc3\xbc\x18+\x92\x92N\a\xa7\x7fN\x9bL\xf8\xebQs\x02\xf9\xadi\x8f\x0f\xff\x02n\x9d\x85\xea\x1a*\x1bC\xd8\x1c\xe8\x9bYSG,\xa4\x96=\xfc\xef_\rf\xc3\xe0\xb3\xc7\x87#\xd4\x16\x03|z\x8e\xe8\xb5\xa5\x83\x15\x0f\xed\xc4\xc4Eh~\x1b\xf5\x96\x9dL\xd6b\x81\xf3z\\^f\t\xabq\a\\7\xb1\r\x1f\xd4\xdcJ\x14\xfd>\xb3\x15/w\xfd\xf0a\xa5\xe4\x15\x89{0L\x0f+%/\x9c\xbf\x87\xa2\xa7\x8b\\\x97\xd2\xa6\x90\xc9\xe7\xc1\x82g,\xa5Z\x17\x95\x83\x17k\x19\x1e\x06,\xce\xfe\x9du\xc1l4\xa9\x1d\xa0\xed\xc7\a>8\xcf\xa0\x85L\xa2\xa73\x00\xbb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00OioO\xed\xd6\x1bj\t \xbe-%\xf7\xe4Gw\be\xa0ng\xca\f\x8c\xca\xd5\xa1}\tG&M\xed\xd4?\xe0At6&\xe5\xdeI\xdb\x1fXcz\n5i/\xf2x\xb0\x9c\x92\xa0T.i\x9e\"\xfa\xfe\xe82qt*^\xcb:y\f\xfa\xb9\xe1\xd8\xd8?\x1cz\xafUB\xa1\xa43\x7f6FmF\xa3\x1bN\x10\xfaO\xc7\x0e\xe2V\x98\xa3\x99(\xdb\t\x86\x185qm!\x00 /Sv\xbf\xac\xd9\x12\xe3|S\xb0\xf6\x92\x04\xf3\xe9s\xcf\xd2\x11\"2S\xd4l\x98P\x0f\xfd', 0x2) r6 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r6, r5, 0x0, 0x3a) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x3, 0x6, @random="5e1cf8b4c253"}, 0x10) munlock(&(0x7f0000626000/0x4000)=nil, 0x4000) 973.689343ms ago: executing program 3 (id=15): syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x248, &(0x7f00000002c0), 0xfd, 0x4a0, &(0x7f0000000e00)="$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") perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={0x0, 0x8}, 0x4010, 0x0, 0x0, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x2600, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x4008881, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @private2, 0x3}, 0x1c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400), r3) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000480)={r3}) ioctl$BTRFS_IOC_SPACE_INFO(r5, 0xc0109414, &(0x7f0000002a80)={0x39d, 0xe, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r4, 0x200, 0x70bd29, 0x25d7dbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7ff}]}, 0x1c}, 0x1, 0x0, 0x0, 0xf4e30d2ff217dbdf}, 0x20000000) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$incfs(r3, &(0x7f0000000500)='.log\x00', 0x688100, 0x8) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="6400000002070103000000000000000002000007240007800800024000000003080001"], 0x64}, 0x1, 0x0, 0x0, 0x440c0}, 0x4040804) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="02000000010004000000000004000500a9930000100000000000000020"], 0x24, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x511a01, 0x80) 648.167676ms ago: executing program 0 (id=16): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/vmstat\x00', 0x0, 0x0) r1 = syz_io_uring_setup(0x49d, &(0x7f0000000080)={0x0, 0x79ae, 0x400, 0x7ff9, 0x32c}, &(0x7f00000004c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x6000, @fd=r0, 0x6, &(0x7f0000000580)=""/207, 0xcf, 0x2, 0x1}) io_uring_enter(r1, 0xfd0, 0x4c5, 0x8, 0x0, 0x0) (fail_nth: 4) 224.277438ms ago: executing program 0 (id=17): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e000000000000000400"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x3, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r2 = eventfd2(0x8, 0x0) write$eventfd(r2, &(0x7f0000000140)=0xfffffffffffffffc, 0x8) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x12, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x800000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f00000001c0)='tlb_flush\x00', r4}, 0xfe2a) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='setgroups\x00') r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x482, 0x0) write$binfmt_aout(r6, &(0x7f0000000400)=ANY=[], 0xff2e) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x83, "00000000000000000000ffff00"}) r7 = syz_open_pts(r6, 0x0) dup3(r7, r6, 0x0) ioctl$TIOCGICOUNT(r6, 0x545d, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r1}, 0x10) r9 = socket$inet6(0x10, 0x3, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x8, 0x0, 0x0, 0x41000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRESOCT, @ANYRES64=r9, @ANYRESOCT=r8], &(0x7f0000000280)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) 0s ago: executing program 3 (id=18): r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x1000) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0xa4000061) read(r2, &(0x7f0000002040)=""/76, 0x4c) creat(&(0x7f0000000300)='./file0\x00', 0x28) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001280)=@delchain={0x24, 0x26, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xfff1}}}, 0x24}}, 0x0) recvmmsg(r4, &(0x7f00000018c0)=[{{0x0, 0x0, 0x0}, 0x80}, {{&(0x7f0000000280)=@isdn, 0x80, &(0x7f0000000380)=[{0x0}], 0x1}, 0x1}, {{0x0, 0x0, 0x0}, 0x2}, {{&(0x7f0000000540)=@xdp, 0x80, &(0x7f0000001140)=[{&(0x7f0000001b00)=""/212, 0xd4}], 0x1, &(0x7f0000000640)=""/101, 0x65}, 0xe9a8}, {{&(0x7f0000001d80)=@caif, 0x80, &(0x7f0000000000)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/233, 0xe9}], 0x3}, 0xea26}], 0x5, 0x2060, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c0000001000030400000006000000005dcc0300", @ANYRES32=r1, @ANYBLOB="71e79fd800000000140012800c0001006d616376746170001400028008000500", @ANYRES32=r3], 0x3c}}, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.154' (ED25519) to the list of known hosts. [ 32.754635][ T29] audit: type=1400 audit(1762249135.635:62): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 32.777679][ T29] audit: type=1400 audit(1762249135.665:63): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 32.778594][ T3302] cgroup: Unknown subsys name 'net' [ 32.805508][ T29] audit: type=1400 audit(1762249135.695:64): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 32.943576][ T3302] cgroup: Unknown subsys name 'cpuset' [ 32.950014][ T3302] cgroup: Unknown subsys name 'rlimit' [ 33.060868][ T29] audit: type=1400 audit(1762249135.935:65): avc: denied { setattr } for pid=3302 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.088761][ T29] audit: type=1400 audit(1762249135.935:66): avc: denied { create } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.109327][ T29] audit: type=1400 audit(1762249135.935:67): avc: denied { write } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.129936][ T29] audit: type=1400 audit(1762249135.935:68): avc: denied { read } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.139434][ T3306] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 33.150242][ T29] audit: type=1400 audit(1762249135.935:69): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 33.183587][ T29] audit: type=1400 audit(1762249135.935:70): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 33.206915][ T29] audit: type=1400 audit(1762249136.045:71): avc: denied { relabelto } for pid=3306 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 33.234438][ T3302] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 35.405631][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 35.419174][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 35.436975][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 35.469856][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 35.531652][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.538836][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.546129][ T3312] bridge_slave_0: entered allmulticast mode [ 35.552604][ T3312] bridge_slave_0: entered promiscuous mode [ 35.575712][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 35.584549][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.591659][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.598819][ T3312] bridge_slave_1: entered allmulticast mode [ 35.605153][ T3312] bridge_slave_1: entered promiscuous mode [ 35.618918][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.626116][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.633379][ T3316] bridge_slave_0: entered allmulticast mode [ 35.639678][ T3316] bridge_slave_0: entered promiscuous mode [ 35.660891][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.668005][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.675192][ T3316] bridge_slave_1: entered allmulticast mode [ 35.681547][ T3316] bridge_slave_1: entered promiscuous mode [ 35.702959][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.710148][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.717329][ T3313] bridge_slave_0: entered allmulticast mode [ 35.723915][ T3313] bridge_slave_0: entered promiscuous mode [ 35.740953][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.751111][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.770377][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.777480][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.784698][ T3313] bridge_slave_1: entered allmulticast mode [ 35.791048][ T3313] bridge_slave_1: entered promiscuous mode [ 35.800041][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.810152][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.824194][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.831291][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.838458][ T3319] bridge_slave_0: entered allmulticast mode [ 35.844880][ T3319] bridge_slave_0: entered promiscuous mode [ 35.868757][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.875950][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.883170][ T3319] bridge_slave_1: entered allmulticast mode [ 35.889666][ T3319] bridge_slave_1: entered promiscuous mode [ 35.908874][ T3316] team0: Port device team_slave_0 added [ 35.919980][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.929880][ T3316] team0: Port device team_slave_1 added [ 35.946712][ T3312] team0: Port device team_slave_0 added [ 35.958466][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.972484][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.979664][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.988312][ T3320] bridge_slave_0: entered allmulticast mode [ 35.994603][ T3320] bridge_slave_0: entered promiscuous mode [ 36.001737][ T3312] team0: Port device team_slave_1 added [ 36.013912][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.037060][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.044287][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.051423][ T3320] bridge_slave_1: entered allmulticast mode [ 36.057890][ T3320] bridge_slave_1: entered promiscuous mode [ 36.065026][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.079829][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.086798][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.113153][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.129029][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.136035][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.162108][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.182908][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.189962][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.216023][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.227448][ T3313] team0: Port device team_slave_0 added [ 36.233557][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.240562][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.266462][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.283534][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.296179][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.306109][ T3313] team0: Port device team_slave_1 added [ 36.314285][ T3319] team0: Port device team_slave_0 added [ 36.342295][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.349448][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.375395][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.386807][ T3319] team0: Port device team_slave_1 added [ 36.393419][ T3320] team0: Port device team_slave_0 added [ 36.400440][ T3320] team0: Port device team_slave_1 added [ 36.413891][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.420833][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.446843][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.500424][ T3316] hsr_slave_0: entered promiscuous mode [ 36.506574][ T3316] hsr_slave_1: entered promiscuous mode [ 36.512775][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.519718][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.545630][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.556908][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.564073][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.589983][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.602875][ T3312] hsr_slave_0: entered promiscuous mode [ 36.608874][ T3312] hsr_slave_1: entered promiscuous mode [ 36.614783][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 36.620528][ T3312] Cannot create hsr debugfs directory [ 36.626401][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.633426][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.659385][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.670609][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.677679][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.703648][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.733383][ T3313] hsr_slave_0: entered promiscuous mode [ 36.739371][ T3313] hsr_slave_1: entered promiscuous mode [ 36.745381][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 36.751113][ T3313] Cannot create hsr debugfs directory [ 36.804871][ T3319] hsr_slave_0: entered promiscuous mode [ 36.810976][ T3319] hsr_slave_1: entered promiscuous mode [ 36.816896][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 36.822621][ T3319] Cannot create hsr debugfs directory [ 36.835247][ T3320] hsr_slave_0: entered promiscuous mode [ 36.841302][ T3320] hsr_slave_1: entered promiscuous mode [ 36.847185][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 36.852939][ T3320] Cannot create hsr debugfs directory [ 37.034319][ T3312] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 37.043084][ T3312] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 37.056026][ T3312] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 37.067180][ T3312] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 37.091572][ T3316] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 37.102387][ T3316] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 37.111896][ T3316] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 37.120758][ T3316] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 37.152075][ T3313] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 37.161970][ T3313] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 37.175855][ T3313] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 37.185078][ T3313] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 37.223616][ T3320] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.243807][ T3320] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.260797][ T3320] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.270999][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.281634][ T3320] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.303731][ T3319] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 37.312667][ T3319] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 37.324931][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.332967][ T3319] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 37.341809][ T3319] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 37.358688][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.374389][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.381441][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.396461][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.403569][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.414796][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.441477][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.448615][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.464274][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.471438][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.485820][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.516988][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.537755][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.549365][ T3316] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.559896][ T3316] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.578869][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.585990][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.595393][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.612891][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.620075][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.632255][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.646624][ T2115] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.653888][ T2115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.673298][ T2115] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.680483][ T2115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.699019][ T3313] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.709477][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.732123][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.747084][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.762292][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.775231][ T3320] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.785770][ T3320] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.807966][ T2115] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.815182][ T2115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.844852][ T2115] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.851966][ T2115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.868538][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.928334][ T3312] veth0_vlan: entered promiscuous mode [ 37.936241][ T3319] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.956761][ T3312] veth1_vlan: entered promiscuous mode [ 37.991227][ T3316] veth0_vlan: entered promiscuous mode [ 38.005851][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.014834][ T3312] veth0_macvtap: entered promiscuous mode [ 38.022348][ T3312] veth1_macvtap: entered promiscuous mode [ 38.039586][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.047399][ T3316] veth1_vlan: entered promiscuous mode [ 38.061867][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.082095][ T3316] veth0_macvtap: entered promiscuous mode [ 38.091068][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.100328][ T3316] veth1_macvtap: entered promiscuous mode [ 38.126104][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.133900][ T299] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.151550][ T3313] veth0_vlan: entered promiscuous mode [ 38.157814][ T299] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.166850][ T299] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.185361][ T299] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.195614][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.219124][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.228613][ T3313] veth1_vlan: entered promiscuous mode [ 38.246784][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.264300][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 38.264312][ T29] audit: type=1400 audit(1762249141.145:81): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.GC4ps4/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 38.297673][ T29] audit: type=1400 audit(1762249141.145:82): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 38.319734][ T29] audit: type=1400 audit(1762249141.145:83): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.GC4ps4/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 38.344901][ T29] audit: type=1400 audit(1762249141.145:84): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 38.366678][ T29] audit: type=1400 audit(1762249141.145:85): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.GC4ps4/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 38.393234][ T29] audit: type=1400 audit(1762249141.145:86): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/root/syzkaller.GC4ps4/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3885 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 38.420601][ T29] audit: type=1400 audit(1762249141.145:87): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 38.444136][ T3320] veth0_vlan: entered promiscuous mode [ 38.446165][ T29] audit: type=1400 audit(1762249141.185:88): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 38.472448][ T29] audit: type=1400 audit(1762249141.185:89): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="gadgetfs" ino=3896 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 38.475214][ T3320] veth1_vlan: entered promiscuous mode [ 38.501710][ T3312] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 38.518831][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.540865][ T3313] veth0_macvtap: entered promiscuous mode [ 38.555610][ T3313] veth1_macvtap: entered promiscuous mode [ 38.562346][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.566085][ T29] audit: type=1400 audit(1762249141.445:90): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 38.578721][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.610666][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.627230][ T3320] veth0_macvtap: entered promiscuous mode [ 38.637125][ T37] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.650824][ T3320] veth1_macvtap: entered promiscuous mode [ 38.677818][ T37] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.698766][ T37] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.739017][ T37] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.760952][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.780399][ T3319] veth0_vlan: entered promiscuous mode [ 38.804487][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.814780][ T3319] veth1_vlan: entered promiscuous mode [ 38.829528][ T3319] veth0_macvtap: entered promiscuous mode [ 38.849382][ T12] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.864438][ T3319] veth1_macvtap: entered promiscuous mode [ 38.885025][ T12] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.908833][ T12] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.937875][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.950604][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.974173][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.005375][ T3499] FAULT_INJECTION: forcing a failure. [ 39.005375][ T3499] name failslab, interval 1, probability 0, space 0, times 1 [ 39.018296][ T3499] CPU: 0 UID: 0 PID: 3499 Comm: syz.0.10 Not tainted syzkaller #0 PREEMPT(voluntary) [ 39.018324][ T3499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 39.018339][ T3499] Call Trace: [ 39.018346][ T3499] [ 39.018409][ T3499] __dump_stack+0x1d/0x30 [ 39.018474][ T3499] dump_stack_lvl+0xe8/0x140 [ 39.018498][ T3499] dump_stack+0x15/0x1b [ 39.018516][ T3499] should_fail_ex+0x265/0x280 [ 39.018538][ T3499] should_failslab+0x8c/0xb0 [ 39.018569][ T3499] kmem_cache_alloc_noprof+0x50/0x480 [ 39.018655][ T3499] ? audit_log_start+0x342/0x720 [ 39.018698][ T3499] audit_log_start+0x342/0x720 [ 39.018725][ T3499] ? kstrtouint+0x76/0xc0 [ 39.018756][ T3499] audit_seccomp+0x48/0x100 [ 39.018796][ T3499] ? __seccomp_filter+0x82d/0x1250 [ 39.018953][ T3499] __seccomp_filter+0x83e/0x1250 [ 39.018990][ T3499] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 39.019029][ T3499] ? vfs_write+0x7e8/0x960 [ 39.019136][ T3499] __secure_computing+0x82/0x150 [ 39.019167][ T3499] syscall_trace_enter+0xcf/0x1e0 [ 39.019255][ T3499] do_syscall_64+0xac/0x200 [ 39.019273][ T3499] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 39.019303][ T3499] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 39.019340][ T3499] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.019418][ T3499] RIP: 0033:0x7f4475f2f6c9 [ 39.019454][ T3499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.019556][ T3499] RSP: 002b:00007f447498f038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab [ 39.019585][ T3499] RAX: ffffffffffffffda RBX: 00007f4476185fa0 RCX: 00007f4475f2f6c9 [ 39.019598][ T3499] RDX: 0000200000000600 RSI: 0000000000000010 RDI: ffffffffffffffff [ 39.019609][ T3499] RBP: 00007f447498f090 R08: 0000000000000000 R09: 0000000000000000 [ 39.019621][ T3499] R10: 0000000000000020 R11: 0000000000000246 R12: 0000000000000001 [ 39.019632][ T3499] R13: 00007f4476186038 R14: 00007f4476185fa0 R15: 00007ffc8ed321a8 [ 39.019699][ T3499] [ 39.020545][ T123] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.240129][ T123] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.270187][ T123] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.294242][ T123] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.362671][ T3508] netlink: 8 bytes leftover after parsing attributes in process `syz.3.12'. [ 39.430720][ T3508] loop3: detected capacity change from 0 to 2048 [ 39.438263][ T3509] mmap: syz.2.3 (3509) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 39.452633][ T3508] ext4: Unknown parameter 'fsuuid' [ 39.518034][ T3517] loop3: detected capacity change from 0 to 512 [ 39.543367][ T3517] ======================================================= [ 39.543367][ T3517] WARNING: The mand mount option has been deprecated and [ 39.543367][ T3517] and is ignored by this kernel. Remove the mand [ 39.543367][ T3517] option from the mount to silence this warning. [ 39.543367][ T3517] ======================================================= [ 39.673742][ T3517] EXT4-fs error (device loop3): ext4_expand_extra_isize_ea:2803: inode #11: comm syz.3.15: corrupted xattr block 95: invalid header [ 39.697971][ T3517] EXT4-fs warning (device loop3): ext4_expand_extra_isize_ea:2853: Unable to expand inode 11. Delete some EAs or run e2fsck. [ 39.711324][ T3517] EXT4-fs error (device loop3): ext4_validate_block_bitmap:432: comm syz.3.15: bg 0: block 7: invalid block bitmap [ 39.733304][ T3517] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6667: Corrupt filesystem [ 39.752784][ T3517] EXT4-fs error (device loop3): ext4_xattr_delete_inode:2967: inode #11: comm syz.3.15: corrupted xattr block 95: invalid header [ 39.772893][ T3517] EXT4-fs warning (device loop3): ext4_evict_inode:274: xattr delete (err -117) [ 39.792910][ T3517] EXT4-fs (loop3): 1 orphan inode deleted [ 39.799106][ T3517] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.820221][ T3521] FAULT_INJECTION: forcing a failure. [ 39.820221][ T3521] name failslab, interval 1, probability 0, space 0, times 0 [ 39.833112][ T3521] CPU: 1 UID: 0 PID: 3521 Comm: syz.0.16 Not tainted syzkaller #0 PREEMPT(voluntary) [ 39.833136][ T3521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 39.833147][ T3521] Call Trace: [ 39.833152][ T3521] [ 39.833158][ T3521] __dump_stack+0x1d/0x30 [ 39.833231][ T3521] dump_stack_lvl+0xe8/0x140 [ 39.833257][ T3521] dump_stack+0x15/0x1b [ 39.833278][ T3521] should_fail_ex+0x265/0x280 [ 39.833342][ T3521] ? vmstat_start+0x8d/0x480 [ 39.833371][ T3521] should_failslab+0x8c/0xb0 [ 39.833405][ T3521] __kmalloc_cache_noprof+0x4c/0x4a0 [ 39.833435][ T3521] vmstat_start+0x8d/0x480 [ 39.833521][ T3521] traverse+0xf4/0x3a0 [ 39.833614][ T3521] seq_read_iter+0x85f/0x950 [ 39.833639][ T3521] ? selinux_file_permission+0x1e4/0x320 [ 39.833699][ T3521] proc_reg_read_iter+0x110/0x180 [ 39.833724][ T3521] ? __pfx_proc_reg_read_iter+0x10/0x10 [ 39.833749][ T3521] __io_read+0x442/0xc30 [ 39.833780][ T3521] ? obj_cgroup_charge_account+0xba/0x1a0 [ 39.833882][ T3521] ? __rcu_read_unlock+0x4f/0x70 [ 39.833908][ T3521] io_read+0x4a/0x190 [ 39.833960][ T3521] __io_issue_sqe+0xfe/0x2e0 [ 39.834015][ T3521] ? io_assign_file+0x1b6/0x200 [ 39.834073][ T3521] io_issue_sqe+0x56/0xa80 [ 39.834114][ T3521] ? io_prep_read+0xab/0xe0 [ 39.834144][ T3521] io_submit_sqes+0x675/0x1060 [ 39.834234][ T3521] __se_sys_io_uring_enter+0x1c1/0x1b70 [ 39.834268][ T3521] ? 0xffffffff81000000 [ 39.834284][ T3521] ? __rcu_read_unlock+0x4f/0x70 [ 39.834318][ T3521] ? get_pid_task+0x96/0xd0 [ 39.834357][ T3521] ? proc_fail_nth_write+0x13b/0x160 [ 39.834423][ T3521] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 39.834525][ T3521] ? vfs_write+0x7e8/0x960 [ 39.834557][ T3521] ? __rcu_read_unlock+0x4f/0x70 [ 39.834611][ T3521] ? __fget_files+0x184/0x1c0 [ 39.834744][ T3521] ? fput+0x8f/0xc0 [ 39.834769][ T3521] __x64_sys_io_uring_enter+0x78/0x90 [ 39.834902][ T3521] x64_sys_call+0x2df0/0x3000 [ 39.835062][ T3521] do_syscall_64+0xd2/0x200 [ 39.835154][ T3521] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 39.835266][ T3521] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 39.835310][ T3521] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.835417][ T3521] RIP: 0033:0x7f4475f2f6c9 [ 39.835431][ T3521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.835504][ T3521] RSP: 002b:00007f447498f038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 39.835523][ T3521] RAX: ffffffffffffffda RBX: 00007f4476185fa0 RCX: 00007f4475f2f6c9 [ 39.835606][ T3521] RDX: 00000000000004c5 RSI: 0000000000000fd0 RDI: 0000000000000004 [ 39.835622][ T3521] RBP: 00007f447498f090 R08: 0000000000000000 R09: 0000000000000000 [ 39.835688][ T3521] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 39.835704][ T3521] R13: 00007f4476186038 R14: 00007f4476185fa0 R15: 00007ffc8ed321a8 [ 39.835727][ T3521] [ 40.248035][ T3523] netlink: 44 bytes leftover after parsing attributes in process `syz.3.15'. [ 40.257228][ T3523] netlink: 16 bytes leftover after parsing attributes in process `syz.3.15'. [ 40.451687][ T3312] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.532911][ T2115] ================================================================== [ 40.541030][ T2115] BUG: KCSAN: data-race in kick_pool / wq_worker_running [ 40.548062][ T2115] [ 40.550378][ T2115] read-write to 0xffff888237d29de4 of 4 bytes by task 3395 on cpu 1: [ 40.558437][ T2115] wq_worker_running+0x95/0x120 [ 40.563284][ T2115] schedule_timeout+0xb7/0x170 [ 40.568044][ T2115] msleep+0x50/0x90 [ 40.571853][ T2115] nsim_fib_event_work+0x42e6/0x4790 [ 40.577132][ T2115] process_scheduled_works+0x4ce/0x9d0 [ 40.582592][ T2115] worker_thread+0x582/0x770 [ 40.587177][ T2115] kthread+0x489/0x510 [ 40.591251][ T2115] ret_from_fork+0x122/0x1b0 [ 40.595837][ T2115] ret_from_fork_asm+0x1a/0x30 [ 40.600595][ T2115] [ 40.602908][ T2115] read to 0xffff888237d29de4 of 4 bytes by task 2115 on cpu 0: [ 40.610532][ T2115] kick_pool+0x49/0x2d0 [ 40.614693][ T2115] __queue_work+0x8cb/0xb50 [ 40.619215][ T2115] queue_work_on+0xd1/0x160 [ 40.623713][ T2115] nsim_fib_event_nb+0xb5a/0xcb0 [ 40.628646][ T2115] atomic_notifier_call_chain+0x76/0x1c0 [ 40.634272][ T2115] call_fib_notifiers+0x65/0xa0 [ 40.639120][ T2115] call_fib6_notifiers+0x30/0x40 [ 40.644067][ T2115] fib6_add_rt2node+0xa39/0x1760 [ 40.649036][ T2115] fib6_add+0x5b9/0xe00 [ 40.653209][ T2115] ip6_ins_rt+0x73/0xb0 [ 40.657387][ T2115] __ipv6_ifa_notify+0x332/0x880 [ 40.662331][ T2115] addrconf_dad_completed+0xdb/0x890 [ 40.667621][ T2115] addrconf_dad_work+0x8ac/0xbf0 [ 40.672555][ T2115] process_scheduled_works+0x4ce/0x9d0 [ 40.678020][ T2115] worker_thread+0x582/0x770 [ 40.682604][ T2115] kthread+0x489/0x510 [ 40.686669][ T2115] ret_from_fork+0x122/0x1b0 [ 40.691255][ T2115] ret_from_fork_asm+0x1a/0x30 [ 40.696030][ T2115] [ 40.698340][ T2115] value changed: 0x00000000 -> 0x00000001 [ 40.704045][ T2115] [ 40.706363][ T2115] Reported by Kernel Concurrency Sanitizer on: [ 40.712510][ T2115] CPU: 0 UID: 0 PID: 2115 Comm: kworker/u8:6 Not tainted syzkaller #0 PREEMPT(voluntary) [ 40.722396][ T2115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 40.732446][ T2115] Workqueue: ipv6_addrconf addrconf_dad_work [ 40.738433][ T2115] ================================================================== [ 40.915757][ T3531] netlink: 4 bytes leftover after parsing attributes in process `syz.3.18'.