last executing test programs: 2.597298205s ago: executing program 0 (id=441): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) openat$vcsu(0xffffffffffffff9c, 0x0, 0x10002, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = syz_open_dev$evdev(&(0x7f0000000940), 0x0, 0x100) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r2, 0x80004506, 0x0) quotactl_fd$Q_GETNEXTQUOTA(r0, 0xffffffff80000902, 0xffffffffffffffff, &(0x7f00000003c0)) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) socket$nl_route(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='kfree\x00', r4}, 0x18) r5 = syz_open_dev$loop(&(0x7f0000000100), 0x8, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$LOOP_CONFIGURE(r5, 0x4c0a, &(0x7f00000002c0)={r6, 0x0, {0x2a00, 0x80010000, 0x0, 0x800, 0x0, 0x0, 0x0, 0xb, 0x1c, "fee8a2ab78fc979fd1e00d96072000001ea89de2b7fb0000e60080b8785d96000100", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "f4bd000000801900", [0x0, 0x2000000000001]}}) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r6) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000c80)={'lo\x00'}) move_pages(0x0, 0x1efe, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4010}, 0x4000004) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d000000140000001100"], 0xa8}}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000000140)={'wg2\x00', @local}) 2.552762759s ago: executing program 0 (id=443): r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r0, 0x28, 0x6, &(0x7f0000000cc0)={0x0, 0x2710}, 0x10) 2.505818414s ago: executing program 0 (id=445): r0 = memfd_create(0x0, 0x7) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2000002, 0x10012, r0, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x1}}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000180)={0x42, 0x2, 0x1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x0, 0x7ffc0005}]}) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x121c02, 0x0) ioctl$PPPIOCNEWUNIT(r7, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSACTIVE(r7, 0x40107446, &(0x7f00000003c0)={0x2, &(0x7f0000000080)=[{0x50, 0x1, 0x2, 0x6}, {0x6, 0x0, 0x3, 0x365}]}) write$ppp(r7, &(0x7f0000000400)="01fd0bd33caad4bc7fe612ad66a8916a8d5dae46e7ccb72f3c7064ec08682b6404000d5f1d9f19c0a7d55bc1b03bc6e7f1e8961db6c7c5a89e478dcbaf2ae88d20071a9c371525fff7d7601f056ac1b8e2babd75637c4072c9109322499a51ad546d592a4f2a14802e05c3aa984110b9f2d594f4414fe21f04183bf920ae981ae347c075c48f0332a2dc7d8a7b340000000000000000311f262233d16cffc8eb4d13702c9174e8ad15f857c4d2d4ef7f66850a58547880c5c15f74544aa8f754af9e1e42c654727e784966c807ca717925750dd8de2754c6", 0xd8) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x0, 0x7ffc0005}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x18, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x9, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r10, 0x0, 0xfffffffffffffffc}, 0x18) r11 = memfd_create(&(0x7f0000000000)='\xfb\"a&\x8fe\x11\x8c\xd64\xf9 \x00\x00\x00\x00\x00\x12\x1a\'<\xf5\xbeV\x12\xaal\xfa\xf0o\xd8\xb1,\xbd>M\xe3\x98?\xd9\x96\xab\xc7\x06F\x9b\xab\xc8\x1e\x89]\x13bZ\x8d /#k\x95\x9eLV(\x8a\x0e\x93\x93Vc]mP\xbativ\xce\xa4K\xfb\xf2\xe0\xbf\x9d\xa1\xa2\xcd\xb39\xb4\x17a9\x1c\x82\x1aLT\xd0\xb9\x1a\xafB\x95\xb4\xcf\x91X\x8c\x87\xc2\xa1\x1b\xfe\xe7\xbc\xf7\xeb\xdeL\x1d\x98Zq\xcc%\x98\xb0Yc\xec\xb7\xb5m(9\xde\xd3\xefB\xd4\xee\xb5\xee\xe0\xaa\xdd\x00\xb1jOB\xdas\xe3\xb47}%)\xb9\xbf{\xce\x94^\xec\xdf\xbcW\xe0I\x0e\xa4\x1e}\x06\vK\xed\x11\x880\x0e\x9c\xaeVU\x88\xb0\x842kgA]\x1e\x88\xecif\xee\xba\x8b\xc6\"\xcej\x84\x06\x8a\x99\x80\xd7\xcf\x96\xed\x89\x1e6\x93+\xec#\x1d2\xb8\x80Z\xf7\x06\xbe\xc9[L\xc5\xc9\xb5\xd6{\xee\xce\x17\x89\xa6r\xc5j\xec\x1b\xaa\x996\x14e\xcf\x8axQ\x8fXeT\'0.\x85\xa2\xc8\xb3c\t\xe8\x1a\x89\xecL\xcf\xd8\xb5\xfb\xbc\tX\x88\xbe\xf4@[\xb2\xd5\x8c\xb9\x0e\x17\x8b\xce\xd09\xd2\xfb\x9e\xef\xabR\x88\x17\x9et\xf7\x9c\x01\x91\xacH\xdb\xf9\xcb\x7fh\x83>\x8e\xe1=\xedR\xc9\xe68h\x19\xafLD\x94\x93\xebT\x15\x817\x9d#\xea\xd2\xa8\xfb^\x8c\x87#\x10', 0x7) ftruncate(r11, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r9, 0x0, 0x7}, 0x18) 2.435615801s ago: executing program 0 (id=449): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) syz_clone(0x41aa1000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c000000150a01"], 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 1.572984145s ago: executing program 2 (id=455): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000e7ef90030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x76}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000001f) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3, 0x0, 0x4}, 0x18) getitimer(0x1, 0x0) r4 = open(&(0x7f0000000000)='.\x00', 0x0, 0x4) fcntl$notify(r4, 0x402, 0x8000003d) close_range(r2, r4, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x2, 0x3, 0x0, 0x3, 0x2, 0x0, 0x70bd2c, 0x25dfdbfc}, 0x10}, 0x1, 0x7}, 0x0) pipe2$9p(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.269159975s ago: executing program 0 (id=459): syz_mount_image$ext4(&(0x7f0000000680)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x21881e, &(0x7f00000000c0)={[{@mb_optimize_scan}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@stripe={'stripe', 0x3d, 0x4}}]}, 0x5, 0x50f, &(0x7f00000006c0)="$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") (async) syz_mount_image$ext4(&(0x7f0000000680)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x21881e, &(0x7f00000000c0)={[{@mb_optimize_scan}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@stripe={'stripe', 0x3d, 0x4}}]}, 0x5, 0x50f, &(0x7f00000006c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='freezer.self_freezing\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) write$nci(r0, &(0x7f0000000040)=@NCI_OP_CORE_INIT_RSP_V2={0x0, 0x0, 0x2, 0x1, 0x6, {0x0, 0xef, 0xd, 0x9912, 0x0, 0x9, 0xee, 0x4}}, 0x11) write$binfmt_script(r0, &(0x7f0000000100), 0x208e24b) (async) write$binfmt_script(r0, &(0x7f0000000100), 0x208e24b) 1.243482168s ago: executing program 2 (id=460): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)=@newsa={0x15c, 0x10, 0x713, 0x70bd27, 0x4, {{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x4e24, 0x0, 0x0, 0x0, 0x0, 0x2f}, {@in=@multicast1, 0x1, 0x33}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {0x0, 0x0, 0x1, 0x3, 0x0, 0x2, 0x8727e}, {0x0, 0xffffdffff7fffffb, 0x6, 0x5}, {0x1, 0x9, 0x8}, 0x80000000, 0x3506, 0xa, 0x4, 0x0, 0x21}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}, 0x0, 0x80}}, @replay_esn_val={0x20, 0x17, {0x1, 0x70bd29, 0x70bd2a, 0x70bd2b, 0x70bd2d, 0x9, [0x100]}}]}, 0x15c}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r7}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = socket$inet(0x2, 0x2, 0x1) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000007000000000000000000850000000700000045000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r10}, 0x10) sendmsg$inet(r9, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000200)='\b\x00', 0x2}, {&(0x7f0000000180)="2d0000008058", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000830b040a0101027f00000100000000001c000000000000000000000008000000"], 0x40}, 0x20000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x18) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000840)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r12, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r12}, &(0x7f00000001c0), &(0x7f0000000200)=r11}, 0x20) r13 = openat$incfs(0xffffffffffffffff, &(0x7f0000000500)='.pending_reads\x00', 0x200, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x12, &(0x7f0000000c00)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffff9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}], &(0x7f0000000080)='GPL\x00', 0x2250744e, 0xb2, &(0x7f0000000440)=""/178, 0x41000, 0x41, '\x00', 0x0, 0x25, r13, 0x8, &(0x7f0000000540)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000580)=[r5, r5, r5, r5, r5], &(0x7f0000000740)=[{0x4, 0x1, 0x6, 0xa}, {0x2, 0x2, 0xd, 0xc}, {0x1, 0x5, 0x1, 0x5}], 0x10, 0x5}, 0x94) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000035c0)="5c00000013006bcd9e3fe3dc4e48aa31086b8703340000001f00000000000000040014000d000a00140000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x240000c0) quotactl_fd$Q_QUOTAOFF(0xffffffffffffffff, 0xffffffff80000302, 0x0, 0x0) 1.106956472s ago: executing program 1 (id=463): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x3}, 0x100002, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3f, 0x0, 0x0, 0x0, 0xb}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000a00), 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x2c, 0x2}, 0x10) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000040016000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c0003800800014000000000080002400000000010000380140001007465616d3000000000000000000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c00038014"], 0xfc}}, 0x0) 953.204986ms ago: executing program 1 (id=464): r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000100100000b"], 0x18}, 0xfc00) r2 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000001bc0)=ANY=[@ANYRES32, @ANYBLOB="db3bed"], 0x9) 942.834307ms ago: executing program 1 (id=465): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r0, r1, 0x5, 0x0, @void}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc094, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x10000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000001}, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r3}, 0x0, 0x0}, 0x20) socket$key(0xf, 0x3, 0x2) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, 0x0, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r2, 0x4) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) 879.549424ms ago: executing program 1 (id=466): r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0xa4, 0x24, 0xd0b, 0x70bd2b, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}, {0x2, 0x300}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x74, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x0, [0x5, 0x4, 0x2, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x8, 0x0, 0x0, 0x2, 0x0, 0x200, 0x0, 0xfffd]}}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x18, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x5}, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8, 0x3, 0x80000001}]}]}]}}]}, 0xa4}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) 605.472591ms ago: executing program 1 (id=467): r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_INIT(r0, 0x29, 0xc8, &(0x7f0000000340), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1}, 0xc) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000080)=0x6, 0x4) 537.197797ms ago: executing program 1 (id=469): mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0xffffffff) open(&(0x7f00000003c0)='./file0\x00', 0x8060, 0x2c) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r1 = syz_io_uring_setup(0xbda, &(0x7f0000000100)={0x0, 0xec25, 0x8, 0x10000001, 0x40000333}, &(0x7f0000000dc0)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000900000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r8, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r7}, &(0x7f00000006c0), &(0x7f0000000700)=r6}, 0x20) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) ioprio_set$uid(0x3, 0x0, 0x0) io_setup(0x800, &(0x7f0000000440)=0x0) eventfd(0x0) io_submit(r9, 0x0, &(0x7f0000000940)) sendmsg$inet(r5, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) io_uring_enter(r1, 0x847ba, 0x0, 0xe, 0x0, 0x0) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x6) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xa, 0x4, 0x4, 0x5, 0x2}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r10, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) pipe(&(0x7f0000002480)={0xffffffffffffffff}) read(r12, &(0x7f0000032440)=""/102364, 0x18fdc) setsockopt$SO_BINDTODEVICE_wg(r12, 0x1, 0x19, &(0x7f00000000c0)='wg1\x00', 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r13}, 0x10) 536.845977ms ago: executing program 4 (id=470): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0xb, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x6}, 0x18) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000240)='./file0\x00', 0x1050c1, 0x170) write$P9_RWALK(r1, &(0x7f0000000600)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x1, 0x2}, {0x2, 0x3, 0x1}, {0x8, 0x1, 0x3}, {0x1, 0x0, 0x5}, {0x40, 0x4, 0x5}, {0x8, 0x3, 0x6}]}}, 0x57) recvmsg$can_j1939(r0, &(0x7f00000001c0)={&(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000480)=""/223, 0xdf}], 0x1, &(0x7f0000000580)=""/76, 0x4c}, 0x10060) syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8052, &(0x7f0000000000), 0x7, 0x4d2, &(0x7f0000000d00)="$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") setsockopt$MRT_TABLE(r2, 0x0, 0xcf, &(0x7f0000000380)=0xfd, 0x4) 517.336729ms ago: executing program 3 (id=471): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) add_key$keyring(&(0x7f0000000000), &(0x7f0000000840)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = socket(0x10, 0x3, 0x6) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kfree\x00', r3, 0x0, 0x40}, 0x18) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x88, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [], 0x0, [0x4, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c4, 0x0, 0x0, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}]}, 0x88}}, 0x20000000) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffe00}}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) r7 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r7, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10, 0x0}, 0x300060c1) 504.070131ms ago: executing program 2 (id=472): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0xe}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000ec000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000500)='kfree\x00', r4}, 0x18) socket(0x1e, 0x4, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000500)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa802, 0x0) close(r6) socket$netlink(0x10, 0x3, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x0, 0xfffffffd, {0x0, 0x0, 0x0, r8, {0xb, 0xd}, {}, {0x8, 0xfff1}}}, 0x24}}, 0x40004) recvmmsg(r11, &(0x7f0000001480)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000040)=""/55, 0x37}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000000940)=""/74, 0x4a}], 0x4}, 0x5d}], 0x1b00, 0x10022, 0x0) 413.43205ms ago: executing program 3 (id=473): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0100000004000000080000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000d00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0xc0802, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"/552], 0x228}, 0x1, 0x0, 0x0, 0x47d691102e113f77}, 0x40884) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f00000000c0)=0xffffffff) socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r3}, 0x10) r4 = socket$kcm(0x10, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f0000000040)={0x6, 'veth1_to_team\x00', {}, 0x9}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r4, 0x8983, &(0x7f0000000080)={0x0, 'batadv0\x00', {0x3}, 0x1}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r3, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000600)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0], 0x0, 0xd4, &(0x7f00000009c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0xe0, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYRES32=r4], &(0x7f0000000000)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x5, 0xb, &(0x7f0000000c40)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095", @ANYRES64], 0x0, 0x0, 0xffffffffffffffa7, 0x0, 0x0, 0x58, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffb}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="070000000400006e000100000040cb2fbf298343b4b6d465d3ebc2a12f995096"], 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x18) time(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r10 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r10, &(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0)=@chain) add_key$keyring(&(0x7f0000000040), &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, r10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x18) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r11) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r11, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r12, @ANYBLOB="796100000000000000007e000000668d58645215d82efc456b9ba418233acaa0ae8c1cd3081daa0ab14f02730c72ccffae268118b9d5810d93ebb3df0d8849b142b31d50b63e73a78e408bfcef31b17e946275cfcac5472e139ac7d34ccee3cddce29fa7fcf6a8b549ea41dc2b05bf59a4d54271be2f3445a8570f080dcd2cca3f877190e3bfe16720953cedbb253b6f4bab57bbfcaf4a2fa60d915663e777122b32e7548ede36dc1e31aa4c162cb5d521ad85c9b12a34a0c5e679fcc978ace2b237d0077d67c0901f53130e912d535136fd41ac"], 0x14}}, 0x4000054) r13 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000040)={'lo\x00'}) 413.11927ms ago: executing program 4 (id=474): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0xe}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000ec000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000500)='kfree\x00'}, 0x18) socket(0x1e, 0x4, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000500)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa802, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), &(0x7f00000001c0)=r6}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x0, 0xfffffffd, {0x0, 0x0, 0x0, r5, {0xb, 0xd}, {}, {0x8, 0xfff1}}}, 0x24}}, 0x40004) recvmmsg(r9, &(0x7f0000001480)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000040)=""/55, 0x37}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000000940)=""/74, 0x4a}], 0x4}, 0x5d}], 0x1b00, 0x10022, 0x0) 412.733599ms ago: executing program 2 (id=475): socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x1000000000000f, &(0x7f0000000180)=0x6, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x33, &(0x7f00000a2000)={0x0, 0x0}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x2000000b, 0x80, 0x0, 0x0, 0x6, 0x7d, 0x0, 0x1, 0x101, 0x0}) socket$inet6_sctp(0xa, 0x1, 0x84) syz_emit_ethernet(0x66, &(0x7f0000000700)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000210", 0x30, 0x3a, 0x0, @private0, @mcast2, {[], @param_prob={0x4, 0x1, 0x0, 0x0, {0x0, 0x6, "8bb91d", 0x0, 0x11, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}}}}}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, &(0x7f00000003c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="2e00000011008b88040f80ee59acbc04130800480f0000005e2900421803001825800006000000000280000c0012", 0x2e}], 0x1}, 0x0) 349.157686ms ago: executing program 3 (id=476): ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa802, 0x0) close(r1) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x0, 0xfffffffd, {0x0, 0x0, 0x0, r3, {0xb, 0xd}, {}, {0x8, 0xfff1}}}, 0x24}}, 0x40004) 348.785056ms ago: executing program 0 (id=477): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) syz_io_uring_setup(0x427b, &(0x7f0000000340)={0x0, 0x3f0c, 0x200, 0x1}, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000880), 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000940), &(0x7f0000000980)='%-010d \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000b80)=ANY=[@ANYBLOB="18120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000053fccbfd669d0e"], &(0x7f0000000840)='GPL\x00', 0xc59, 0x1000, &(0x7f0000001ac0)=""/4096, 0x41000, 0x43, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000008c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x1, 0x2, 0x2, 0x8}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000a00)=[r0, 0xffffffffffffffff, r5, r0], &(0x7f0000000a40)=[{0x5, 0x2, 0x10, 0x2}, {0x2, 0x4, 0x9, 0xb}, {0x5, 0x2, 0x2, 0x7}, {0x3, 0x3, 0x7, 0x1}, {0x0, 0x1, 0xd, 0x7}, {0x5, 0x5, 0x8, 0x5}, {0x3, 0x3, 0x4, 0x7}, {0x0, 0x4, 0xe}], 0x10, 0x101}, 0x94) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000080)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r6, @ANYRES64=r2], 0x44}, 0x1, 0x0, 0x0, 0x20004080}, 0x48c0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000001580)=ANY=[@ANYBLOB="c4030000", @ANYRES16=r6, @ANYBLOB="00022dbd7000fbdbdf250a000000e8000280e00003800c00018008000100050000003400018004000300080001000100000008000100030000000800010003000000050002000000000008000100040000000400030064000180090002005e29265b00000000040003000d000200232a255e2a7b2a5e00000000080001000700000012000200287b2a725e2d2629245c2a3a26000000080001000000804004000300040003000b000200544950437632000008000100090000000c00018008000100810000002c00018004000300040003000400030004000300060002002f0000000800010005000000040003000400030004000100e800028091000400aa6a20ad59d21b3278f1662aa7be467e11e96ba1cff4367f69ede7cd441f34b2bdbf165e7d43388c2c3950a607944fc0168ae08378cba11b678e0df3cc399aacf20c75c6e4b3bcaab735cc167a570c79d4a016e1ded0b64da8ca820a73e08b3082e5291ce756806ec173ce643a3d52dc0309896eefc4484fa7fce36b45ce088a68f9ed8d37452206a1d1a98398000000400003803c0001801100020073636865645f7377697463680000000006000200400000000800010007000000090002002d5c7d5d000000000400030004000300080002007f0000000400010004000100b8010280e400038018000180040003000500020000000000080001000e000000240001800800010012ac000004000300040003000800020047504c00060002003a000000380001800400030004000300080001004d450000040003001100020073636865645f737769746368000000000b00020054495043763200003800018004000300080001000700000008000100d00e0000180002007065726370755f616c6c6f635f7065726370750008000100010000001800018008000100010000000c000200657468746f6f6c001c0001800400070004000300040003000900020028406f5b00000000450004007d1bee7620f39af0d62f9ffa958574ffa97deeac61457a69ad078fff8b8c7981eca9718ef78ca6695f52a68daab3ee024de14bc1b3f775c6b66704fb3b212cbf7a000000840003800c00018004000300040003003400018008000100080000000400030008000100030000000700020024232300080001000100000005000200000000000400030020000180050002000000000004000300040003000400030008000100090000000c0001800600020027000000140001800400030004000300040003000400030004000100280001801400020067656e6576653000000000000000000008000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB], 0x3c4}, 0x1, 0x0, 0x0, 0x8040}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x1, 0x0, 0xa, 0x9441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffefffe, 0x1, @perf_bp={0x0, 0x4}, 0x10c869, 0x10000, 0x8, 0x1, 0x8, 0x2028005, 0x200b, 0x0, 0x0, 0x0, 0x8e}, 0x0, 0x7, r1, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000007c0)={0x40000000000ff80, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="020f000015000000000000000000000005000500000000000a00000000000000000000000000000000432e0000000000000000000000000008001200000002000000f1edc4ea00000600000000000000000000000000000000000000000000000000000000000000fc010000000000000000000000008100"], 0xa8}}, 0x40080) socket$nl_xfrm(0x10, 0x3, 0x6) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYRES16], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f00000000c0)='netlink_extack\x00', r8}, 0x18) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r10}, 0x10) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) munlockall() syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000100)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000540)="$eJzs3c9vVFsdAPDvnXZoKQMFZaFGBRFFQ5j+ABqCC2GjMYTESFy5gNoOTdMZpum0SCuLsnRvIokr/RPcuTBh5cKdO925wYUJKnkv9CVvMS/3zqUd2g7te7Qd6Hw+ye2955xhvufMcM6Ze2B6AuhZZyNiNSKORMS9iBjO85P8iButI33cq5ePp9ZePp5Kotm8878kK0/zou3PpI7lzzkYET/7ccQvk61xG8src5PVamUhT48s1uZHGssrl2YLec74xNjE6LXLV8f3rK1nan968aPZWz//y5+/8fzvq9//dVqt0m+OZ2Xt7dhLraYXo9SW1x8Rt/YjWJf0539/+PCkve1LEXEu6//D0Ze9mwDAYdZsDkdzuD0NABx26f1/KZJCOV8LKEWhUC631vBOx1ChWm8sXhyuLz2YjmwN62QUC/dnq5XRfK3wZBSTND2WXW+kxzelL0fEqYj47cDRLF2eqlenu/nBBwB62LFN8//HA635HwA45Aa7XQEA4MCZ/wGg95j/AaD3fI7537cDAeCQcP8PAL3H/A8AvWfH+f/JwdQDADgQP719Oz2aa/nvv55+uLz0g9LDS9OVxly5tjRVnqovzJdn6vWZaqU81Wzu9HzVen1+7Mp6srG8crdWX3qweHe2NjlTuVsp7nN7AICdnTrz7J9JRKxeP5od0baXg7kaDrdCtysAdE1ftysAdI3v80Dv2sU9vmUAOOS22aL3DR3/i9BTm7/Ch+rCV63/Q6+y/g+964ut//9wz+sBHDzr/9C7ms3Env8A0GOs8QPv9O//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0KNK2ZEUytle4Kvpz0K5HHE8Ik5GMbk/W62MRsSJiPjHQHEgTY91u9IAwDsq/CfJ9/+6MHy+tLn0SPLJQHaOiF/9/s7vHk0uLi6Mpfn/X89ffJrnjx/pRgMAgHY3tma15un83HYj/+rl46nXx0FW8cXN1uaiady1/GiV9Ed/dh6MYkQMfZTk6Zb080rfHsRffRIRX9lo/6O2CKVsDaS18+nm+Gns4/sQf+P13xy/8Eb8QlaWnovZa/HlPagL9JpnN1vjZN730i6W979CnM3O2/f/wWyEenevx7+1LeNfYX3869sSP8n6/Nn19Ntr8uLKX3+yJbM53Cp7EvG1/u3iJ+vxkw7j7/ldtvFfX//muU5lzT9EXIjt47fUsmF2ZLE2P9JYXrk0W5ucqcxUHoyPT4xNjF67fHV8JFujbv3823Yx/nv94olO8dP2D3WIP7hD+7+zy/b/8dN7v/jWW+J/79vbv/+n3xI/nRO/u8v4k0M3Om7fncaf7tD+nd7/i7uM//zfK9O7fCgAcAAayytzk9VqZWGHi/Sz5k6PcfFhXsRqxHtQDRfv1UW3RyZgv210+m7XBAAAAAAAAAAAAAAA6KSxvDI3EPv7daJutxEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDD67MAAAD//w/PzvM=") r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r11, 0x8004587d, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x9cf, 0x1, 0x800000000001004}) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 293.400361ms ago: executing program 3 (id=478): syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") bpf$MAP_CREATE(0x0, 0x0, 0x48) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000005c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x8008000000010, &(0x7f00000000c0)="17000000020001000003be8c5ee1768810003308030300ecff3f000000030000980000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba000840024f0298e9e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0x11a) r2 = openat(0xffffffffffffff9c, &(0x7f0000000980)='./file1\x00', 0x42, 0xc2) pwrite64(r2, &(0x7f0000000080)="cc", 0x1, 0x200980) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) sendfile(r3, r3, 0x0, 0xe0000000) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000180), &(0x7f00000001c0)=0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000500)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r5, 0x0, 0x800000000006}, 0x18) r6 = socket$pppl2tp(0x18, 0x1, 0x1) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r6, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, r7, 0x8, 0x0, 0x5, 0x0, {0xa, 0x0, 0xf9d, @private2}}}, 0x32) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 250.750825ms ago: executing program 2 (id=479): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_getevents(0x0, 0xff2, 0x6, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}], 0x0) openat$binfmt_format(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/fs/binfmt_misc/syz3\x00', 0x2, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, 0x0, 0x0) sendmsg$rds(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000280)='./file1\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0xfb, 0x1219, &(0x7f0000001100)="$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") ftruncate(0xffffffffffffffff, 0x2000009) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000004c0)='initcall_finish\x00', 0xffffffffffffffff, 0x0, 0x8}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) pwritev2(r1, &(0x7f00000001c0)=[{&(0x7f0000000400)="ba", 0xfdef}], 0x1, 0xe7b, 0x0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], &(0x7f00000002c0)=""/203, 0xfffffffffffffe5f) 203.47712ms ago: executing program 3 (id=480): r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_INIT(r0, 0x29, 0xc8, &(0x7f0000000340), 0x4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) setsockopt$MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1}, 0xc) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000080)=0x6, 0x4) 202.89334ms ago: executing program 4 (id=481): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x400000000000004) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000040)=0x1000000, 0x4) writev(r3, &(0x7f0000000100)=[{&(0x7f0000000180)="480000001400190d7ebdeb75fd0d9c562c84d8c033aae421962ea6ff3cd3c461ebe430a2ed7a80ffe0090f000000000000a2bc5603ca00000f7f89000000200000004a247108", 0x46}], 0x1) 182.890732ms ago: executing program 4 (id=482): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x2208c08, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x40}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44880}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0xe4ff, &(0x7f0000000200)={&(0x7f0000000280)=@newtfilter={0x8c, 0x2c, 0xd27, 0x30bd25, 0x25df9bfb, {0x0, 0x0, 0x0, r4, {0xd, 0xe}, {}, {0x7}}, [@filter_kind_options=@f_route={{0xa}, {0x54, 0x2, [@TCA_ROUTE4_ACT={0x50, 0x6, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0xa, 0x5, 0x4, 0x7, 0x8}, 0x39}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x80, 0x3}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8010}, 0x0) 97.220301ms ago: executing program 3 (id=483): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="190000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[], 0xff2e) syz_open_pts(r1, 0x900) read(0xffffffffffffffff, &(0x7f00000000c0)=""/226, 0xe2) read$watch_queue(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r0}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000080)=0x655a, 0x4) bind$inet(r2, &(0x7f0000000200)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) timer_create(0x3, 0x0, &(0x7f0000044000)=0x0) timer_settime(r3, 0x0, &(0x7f00000002c0)={{}, {0x0, 0x989680}}, 0x0) timer_settime(r3, 0x1, &(0x7f0000000a00), &(0x7f0000000a40)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000100)={{}, {r4, r5+60000000}}, 0x0) setsockopt$sock_int(r2, 0x1, 0xc, &(0x7f0000000000)=0x1, 0x4) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x40000000) 76.123642ms ago: executing program 2 (id=484): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x1004, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcdb) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_emit_ethernet(0x106, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x1, 0x4, 0xf8, 0x67, 0x0, 0x5, 0x84, 0x0, @private=0xa010101, @remote}, "c8e81fa33af9a85dccbe277c82d27598706635a8ed36956fbbf665af5c0d12cef0bb4be001e9c1ec65f5548d653902957d50a83377a94b5dbe6390bb38a197281865b7e86e270ac541aafa4bbe7b5e290dea38f4db89662070d85fb0bbc9411a78a4402d3749b417afd1ef1d0705283c6e5be544ab622ba2c36b69a8ab7b8a89e3e3b6bbf3ed21d8a69c70241645af9f28e5e0bdfcfcb9b66d81c1f5042aac99413328f43d7f70215ae7b30004114954edff6db508e885009a7f0273768f97a44ecfd9e6ab3488552280b02176b0b82a4147503719a615e0daf6828d2beefd9d9c26a0d2"}}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) close(r1) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x1a1) fcntl$setlease(r5, 0x400, 0x1) read$watch_queue(r0, &(0x7f00000001c0)=""/178, 0xb2) 74.520203ms ago: executing program 4 (id=485): prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000040)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000080)) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000000c0)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000100)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000140)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000180)) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000001c0)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000200)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000240)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000280)) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000002c0)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000300)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000340)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000380)) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000003c0)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000400)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000440)) r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000480)={'nat\x00', 0x0, 0x0, 0x0, [0x9, 0x9, 0xfffffffffffffffe, 0xffff, 0xfffffffffffffff8, 0x2caa]}, &(0x7f0000000500)=0x78) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000540)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000580)) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000005c0)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000600)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000640)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000680)) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000006c0)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000700)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000740)) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000780)) 0s ago: executing program 4 (id=486): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r0, r1, 0x5, 0x0, @void}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc094, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x10000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000001}, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, 0x0, 0x0}, 0x20) socket$key(0xf, 0x3, 0x2) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.102' (ED25519) to the list of known hosts. [ 30.519222][ T29] audit: type=1400 audit(1760413969.327:62): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 30.542635][ T29] audit: type=1400 audit(1760413969.347:63): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.543723][ T3301] cgroup: Unknown subsys name 'net' [ 30.570602][ T29] audit: type=1400 audit(1760413969.377:64): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.667260][ T3301] cgroup: Unknown subsys name 'cpuset' [ 30.673561][ T3301] cgroup: Unknown subsys name 'rlimit' [ 30.804693][ T29] audit: type=1400 audit(1760413969.607:65): avc: denied { setattr } for pid=3301 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.828028][ T29] audit: type=1400 audit(1760413969.607:66): avc: denied { create } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.849371][ T29] audit: type=1400 audit(1760413969.607:67): avc: denied { write } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.869828][ T29] audit: type=1400 audit(1760413969.617:68): avc: denied { read } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.890221][ T29] audit: type=1400 audit(1760413969.617:69): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 30.915143][ T29] audit: type=1400 audit(1760413969.617:70): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 30.924553][ T3303] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 30.947469][ T29] audit: type=1400 audit(1760413969.757:71): avc: denied { relabelto } for pid=3303 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 30.995878][ T3301] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 32.347502][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 32.442937][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.450164][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.457462][ T3310] bridge_slave_0: entered allmulticast mode [ 32.463895][ T3310] bridge_slave_0: entered promiscuous mode [ 32.470709][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.477917][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.485037][ T3310] bridge_slave_1: entered allmulticast mode [ 32.491532][ T3310] bridge_slave_1: entered promiscuous mode [ 32.504401][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 32.572241][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.589719][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.604369][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 32.624840][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.632148][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.639433][ T3311] bridge_slave_0: entered allmulticast mode [ 32.645857][ T3311] bridge_slave_0: entered promiscuous mode [ 32.671463][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 32.680489][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.687612][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.694753][ T3311] bridge_slave_1: entered allmulticast mode [ 32.701346][ T3311] bridge_slave_1: entered promiscuous mode [ 32.712921][ T3310] team0: Port device team_slave_0 added [ 32.736709][ T3310] team0: Port device team_slave_1 added [ 32.774195][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.790804][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.797854][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.823804][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.843751][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.858133][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 32.867568][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.874676][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 32.900914][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.918986][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.926101][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.933330][ T3320] bridge_slave_0: entered allmulticast mode [ 32.940233][ T3320] bridge_slave_0: entered promiscuous mode [ 32.963420][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.970570][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.977755][ T3320] bridge_slave_1: entered allmulticast mode [ 32.984088][ T3320] bridge_slave_1: entered promiscuous mode [ 33.006519][ T3311] team0: Port device team_slave_0 added [ 33.031780][ T3311] team0: Port device team_slave_1 added [ 33.037640][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.044795][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.052038][ T3315] bridge_slave_0: entered allmulticast mode [ 33.058574][ T3315] bridge_slave_0: entered promiscuous mode [ 33.066075][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.087091][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.094226][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.101440][ T3315] bridge_slave_1: entered allmulticast mode [ 33.108073][ T3315] bridge_slave_1: entered promiscuous mode [ 33.115157][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.131716][ T3310] hsr_slave_0: entered promiscuous mode [ 33.137966][ T3310] hsr_slave_1: entered promiscuous mode [ 33.163337][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.177682][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.184659][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.210695][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.227476][ T3320] team0: Port device team_slave_0 added [ 33.234433][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.248878][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.255897][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.282032][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.298087][ T3320] team0: Port device team_slave_1 added [ 33.310313][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.317421][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.324549][ T3317] bridge_slave_0: entered allmulticast mode [ 33.331015][ T3317] bridge_slave_0: entered promiscuous mode [ 33.339786][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.346922][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.354117][ T3317] bridge_slave_1: entered allmulticast mode [ 33.360667][ T3317] bridge_slave_1: entered promiscuous mode [ 33.383044][ T3315] team0: Port device team_slave_0 added [ 33.399024][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.406003][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.431990][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.446393][ T3315] team0: Port device team_slave_1 added [ 33.466656][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.473640][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.499872][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.528715][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.538131][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.545192][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.571250][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.584990][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.592028][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.618124][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.637590][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.657129][ T3311] hsr_slave_0: entered promiscuous mode [ 33.663248][ T3311] hsr_slave_1: entered promiscuous mode [ 33.669312][ T3311] debugfs: 'hsr0' already exists in 'hsr' [ 33.675043][ T3311] Cannot create hsr debugfs directory [ 33.709867][ T3317] team0: Port device team_slave_0 added [ 33.737059][ T3317] team0: Port device team_slave_1 added [ 33.752011][ T3320] hsr_slave_0: entered promiscuous mode [ 33.758148][ T3320] hsr_slave_1: entered promiscuous mode [ 33.763950][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 33.769798][ T3320] Cannot create hsr debugfs directory [ 33.782352][ T3315] hsr_slave_0: entered promiscuous mode [ 33.788570][ T3315] hsr_slave_1: entered promiscuous mode [ 33.794654][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 33.800457][ T3315] Cannot create hsr debugfs directory [ 33.834056][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.841133][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.867163][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.895402][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.902499][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.928568][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.991373][ T3317] hsr_slave_0: entered promiscuous mode [ 33.997561][ T3317] hsr_slave_1: entered promiscuous mode [ 34.003313][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 34.009101][ T3317] Cannot create hsr debugfs directory [ 34.028172][ T3310] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 34.039391][ T3310] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 34.068106][ T3310] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 34.077140][ T3310] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 34.142782][ T3311] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 34.152087][ T3311] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 34.175308][ T3311] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 34.191977][ T3311] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 34.216187][ T3320] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 34.225204][ T3320] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 34.236234][ T3320] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 34.249775][ T3320] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 34.277692][ T3315] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 34.286721][ T3315] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 34.302099][ T3315] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 34.318643][ T3315] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 34.365097][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.377758][ T3317] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 34.388192][ T3317] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 34.397153][ T3317] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 34.414187][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.421795][ T3317] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 34.439101][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.468888][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.476993][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.494512][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.504081][ T1383] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.511190][ T1383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.520359][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.535379][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.542530][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.558028][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.565150][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.574080][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.581217][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.591051][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.598218][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.610960][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.621896][ T59] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.629017][ T59] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.643348][ T59] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.650946][ T59] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.660022][ T59] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.667308][ T59] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.725705][ T3320] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 34.736195][ T3320] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.752947][ T3310] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.785848][ T3315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.838472][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.870272][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.880238][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.892454][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.905213][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.938523][ T1874] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.945796][ T1874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.965008][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.982259][ T1874] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.989411][ T1874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.058951][ T3311] veth0_vlan: entered promiscuous mode [ 35.106960][ T3311] veth1_vlan: entered promiscuous mode [ 35.131286][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.141022][ T3310] veth0_vlan: entered promiscuous mode [ 35.149614][ T3311] veth0_macvtap: entered promiscuous mode [ 35.165605][ T3310] veth1_vlan: entered promiscuous mode [ 35.173527][ T3320] veth0_vlan: entered promiscuous mode [ 35.180397][ T3311] veth1_macvtap: entered promiscuous mode [ 35.201986][ T3320] veth1_vlan: entered promiscuous mode [ 35.213318][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.230843][ T3310] veth0_macvtap: entered promiscuous mode [ 35.247264][ T3310] veth1_macvtap: entered promiscuous mode [ 35.258848][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.273482][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.288260][ T1874] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.300306][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.309270][ T3320] veth0_macvtap: entered promiscuous mode [ 35.324854][ T1874] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.338931][ T1874] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.364674][ T3315] veth0_vlan: entered promiscuous mode [ 35.373536][ T12] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.384003][ T3320] veth1_macvtap: entered promiscuous mode [ 35.391947][ T3311] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 35.408202][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.425130][ T3315] veth1_vlan: entered promiscuous mode [ 35.433638][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.445942][ T3317] veth0_vlan: entered promiscuous mode [ 35.466432][ T1874] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.493587][ T1874] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.503121][ T3317] veth1_vlan: entered promiscuous mode [ 35.519322][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.530084][ T3315] veth0_macvtap: entered promiscuous mode [ 35.544556][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 35.544572][ T29] audit: type=1400 audit(1760413974.347:96): avc: denied { prog_load } for pid=3485 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 35.569560][ T29] audit: type=1400 audit(1760413974.347:97): avc: denied { bpf } for pid=3485 comm="syz.0.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 35.570394][ T3317] veth0_macvtap: entered promiscuous mode [ 35.598876][ T29] audit: type=1400 audit(1760413974.407:98): avc: denied { map_create } for pid=3482 comm="syz.3.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 35.617700][ T29] audit: type=1400 audit(1760413974.407:99): avc: denied { map_read map_write } for pid=3482 comm="syz.3.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 35.637182][ T29] audit: type=1400 audit(1760413974.407:100): avc: denied { perfmon } for pid=3482 comm="syz.3.6" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 35.659788][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.671658][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.676187][ T29] audit: type=1400 audit(1760413974.407:101): avc: denied { prog_run } for pid=3482 comm="syz.3.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 35.694021][ T3315] veth1_macvtap: entered promiscuous mode [ 35.731921][ T3317] veth1_macvtap: entered promiscuous mode [ 35.738877][ T1874] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.754617][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.775883][ T1874] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.786478][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.797595][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.812991][ T1874] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.827859][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.844590][ T3497] vhci_hcd: invalid port number 236 [ 35.846369][ T29] audit: type=1400 audit(1760413974.647:102): avc: denied { write } for pid=3496 comm="syz.3.7" name="001" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 35.876859][ T1874] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.888052][ T1874] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.934130][ T1874] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.960453][ T3420] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 35.968049][ T3420] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 35.975478][ T3420] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 35.981818][ T29] audit: type=1400 audit(1760413974.717:103): avc: denied { remount } for pid=3496 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 35.982942][ T3420] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 36.002101][ T29] audit: type=1400 audit(1760413974.717:104): avc: denied { map } for pid=3496 comm="+}[@" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 36.009430][ T3420] hid-generic 0000:0000:0000.0001: unknown main item tag 0x2 [ 36.032881][ T29] audit: type=1400 audit(1760413974.717:105): avc: denied { allowed } for pid=3496 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 36.040363][ T3420] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 36.066578][ T3420] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 36.074078][ T3420] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 36.081654][ T3420] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 36.089530][ T3420] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 36.102055][ T3420] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz1 [ 36.119874][ T1874] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.143911][ T3507] loop0: detected capacity change from 0 to 256 [ 36.156675][ T3507] FAT-fs (loop0): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 36.169814][ T1874] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.187797][ T1874] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.205922][ T3505] fido_id[3505]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 36.226350][ T3507] FAT-fs (loop0): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 36.253562][ T37] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.298897][ T37] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.370502][ T3519] loop4: detected capacity change from 0 to 1024 [ 36.381707][ T3525] netlink: 24 bytes leftover after parsing attributes in process `syz.0.13'. [ 36.392339][ T3519] ======================================================= [ 36.392339][ T3519] WARNING: The mand mount option has been deprecated and [ 36.392339][ T3519] and is ignored by this kernel. Remove the mand [ 36.392339][ T3519] option from the mount to silence this warning. [ 36.392339][ T3519] ======================================================= [ 36.442253][ T3519] EXT4-fs: inline encryption not supported [ 36.448180][ T3519] EXT4-fs: Ignoring removed i_version option [ 36.460091][ T3526] pim6reg: entered allmulticast mode [ 36.499026][ T3519] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.521337][ T3520] pim6reg: left allmulticast mode [ 36.619512][ T3315] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.629754][ T3542] netlink: 8 bytes leftover after parsing attributes in process `syz.1.19'. [ 36.736628][ T3556] loop3: detected capacity change from 0 to 512 [ 36.743419][ T3556] EXT4-fs: Ignoring removed orlov option [ 36.749175][ T3556] EXT4-fs: Ignoring removed i_version option [ 36.776630][ T3556] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 36.779736][ T3548] syz.0.22 (3548) used greatest stack depth: 10400 bytes left [ 36.812285][ T3551] syzkaller0: entered promiscuous mode [ 36.818094][ T3551] syzkaller0: entered allmulticast mode [ 36.834218][ T3556] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.853326][ T3554] pim6reg: entered allmulticast mode [ 36.866751][ T3558] pim6reg: left allmulticast mode [ 36.872185][ T3556] ext4 filesystem being mounted at /5/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 36.907266][ T3556] capability: warning: `syz.3.25' uses deprecated v2 capabilities in a way that may be insecure [ 36.938914][ T3311] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.038559][ T3564] syzkaller0: entered promiscuous mode [ 37.044306][ T3564] syzkaller0: entered allmulticast mode [ 37.078637][ T3570] bridge_slave_0: left allmulticast mode [ 37.084332][ T3570] bridge_slave_0: left promiscuous mode [ 37.090269][ T3570] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.103991][ T3576] netlink: 'syz.1.29': attribute type 10 has an invalid length. [ 37.112232][ T3576] netlink: 40 bytes leftover after parsing attributes in process `syz.1.29'. [ 37.124736][ T3570] bridge_slave_1: left allmulticast mode [ 37.131454][ T3570] bridge_slave_1: left promiscuous mode [ 37.137348][ T3570] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.150046][ T3570] bond0: (slave bond_slave_0): Releasing backup interface [ 37.172468][ T3570] bond0: (slave bond_slave_1): Releasing backup interface [ 37.187828][ T3570] team0: Port device team_slave_0 removed [ 37.216679][ T3570] team0: Port device team_slave_1 removed [ 37.223439][ T3590] syz.0.32 uses obsolete (PF_INET,SOCK_PACKET) [ 37.230836][ T3570] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 37.238822][ T3570] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 37.253559][ T3570] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 37.261042][ T3570] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 37.281201][ T3570] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 37.309245][ T3576] batman_adv: batadv0: Adding interface: veth1_vlan [ 37.316696][ T3576] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.344239][ T3576] batman_adv: batadv0: Interface activated: veth1_vlan [ 37.414778][ T3585] syzkaller0: entered promiscuous mode [ 37.420396][ T3585] syzkaller0: entered allmulticast mode [ 37.441515][ T3604] netlink: 8 bytes leftover after parsing attributes in process `syz.3.36'. [ 37.510008][ T3603] loop1: detected capacity change from 0 to 8192 [ 37.511714][ T3604] bridge0: entered promiscuous mode [ 37.525604][ T3604] macvtap1: entered allmulticast mode [ 37.531574][ T3604] bridge0: entered allmulticast mode [ 37.729844][ T3616] pim6reg: entered allmulticast mode [ 37.762269][ T3616] pim6reg: left allmulticast mode [ 37.908231][ T3391] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 37.961730][ T3626] Illegal XDP return value 123 on prog (id 42) dev syz_tun, expect packet loss! [ 37.982856][ T3626] loop2: detected capacity change from 0 to 512 [ 37.986304][ T3628] fido_id[3628]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 38.004264][ T3626] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 38.061086][ T3626] EXT4-fs error (device loop2): ext4_orphan_get:1418: comm wÞ£ÿ: bad orphan inode 15 [ 38.095745][ T3626] ext4_test_bit(bit=14, block=18) = 1 [ 38.101327][ T3626] is_bad_inode(inode)=0 [ 38.105676][ T3626] NEXT_ORPHAN(inode)=1023 [ 38.110083][ T3626] max_ino=32 [ 38.113297][ T3626] i_nlink=0 [ 38.128019][ T3641] process 'syz.1.47' launched './file0' with NULL argv: empty string added [ 38.146636][ T3642] netlink: 8 bytes leftover after parsing attributes in process `syz.4.48'. [ 38.172017][ T3626] EXT4-fs error (device loop2): ext4_xattr_delete_inode:2967: inode #15: comm wÞ£ÿ: corrupted xattr block 19: e_value size too large [ 38.205680][ T3626] EXT4-fs warning (device loop2): ext4_evict_inode:274: xattr delete (err -117) [ 38.217501][ T3626] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.244674][ T3644] syzkaller0: entered promiscuous mode [ 38.250432][ T3644] syzkaller0: entered allmulticast mode [ 38.299148][ T3649] loop4: detected capacity change from 0 to 2048 [ 38.306448][ T3317] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.326704][ T3649] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 38.405823][ T3315] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.416173][ T3656] netlink: 'syz.0.55': attribute type 21 has an invalid length. [ 38.605528][ T3665] loop3: detected capacity change from 0 to 2048 [ 38.657369][ T3508] loop3: p2 < > p4 [ 38.665795][ T3508] loop3: p4 size 262144 extends beyond EOD, truncated [ 38.682752][ T3665] loop3: p2 < > p4 [ 38.700628][ T3665] loop3: p4 size 262144 extends beyond EOD, truncated [ 38.717988][ T3674] loop2: detected capacity change from 0 to 2048 [ 38.748606][ T3665] loop3: detected capacity change from 0 to 256 [ 38.778034][ T3299] loop2: p2 < > p4 [ 38.793693][ T3508] udevd[3508]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 38.835391][ T3299] loop2: p4 size 262144 extends beyond EOD, truncated [ 38.835979][ T3515] udevd[3515]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 38.871391][ T3678] loop4: detected capacity change from 0 to 512 [ 38.888924][ T3674] loop2: p2 < > p4 [ 38.894536][ T3674] loop2: p4 size 262144 extends beyond EOD, truncated [ 38.912489][ T3678] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 38.944541][ T3515] udevd[3515]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 38.947817][ T3508] udevd[3508]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 38.977591][ T3678] EXT4-fs error (device loop4): ext4_orphan_get:1397: comm syz.4.62: couldn't read orphan inode 26 (err -116) [ 39.028641][ T3678] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 39.053255][ T3508] udevd[3508]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 39.073344][ T3678] ext4 filesystem being mounted at /10/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 39.079855][ T3299] udevd[3299]: inotify_add_watch(7, /dev/loop2p4, 10) failed: No such file or directory [ 39.096827][ T3678] FAULT_INJECTION: forcing a failure. [ 39.096827][ T3678] name failslab, interval 1, probability 0, space 0, times 1 [ 39.109669][ T3678] CPU: 0 UID: 0 PID: 3678 Comm: wÞ£ÿ Not tainted syzkaller #0 PREEMPT(voluntary) [ 39.109701][ T3678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 39.109717][ T3678] Call Trace: [ 39.109726][ T3678] [ 39.109736][ T3678] __dump_stack+0x1d/0x30 [ 39.109826][ T3678] dump_stack_lvl+0xe8/0x140 [ 39.109847][ T3678] dump_stack+0x15/0x1b [ 39.109936][ T3678] should_fail_ex+0x265/0x280 [ 39.109990][ T3678] should_failslab+0x8c/0xb0 [ 39.110035][ T3678] kmem_cache_alloc_noprof+0x50/0x480 [ 39.110129][ T3678] ? dst_alloc+0xbd/0x100 [ 39.110226][ T3678] ? __traceiter_kfree+0x2e/0x50 [ 39.110251][ T3678] dst_alloc+0xbd/0x100 [ 39.110298][ T3678] ip_route_output_key_hash_rcu+0xf29/0x1380 [ 39.110331][ T3678] ip_route_output_flow+0x65/0x110 [ 39.110372][ T3678] udp_sendmsg+0x11b0/0x13c0 [ 39.110407][ T3678] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 39.110430][ T3678] ? __rcu_read_unlock+0x4f/0x70 [ 39.110511][ T3678] ? __pfx_ip4_datagram_release_cb+0x10/0x10 [ 39.110562][ T3678] ? __pfx_udp_sendmsg+0x10/0x10 [ 39.110583][ T3678] inet_sendmsg+0xac/0xd0 [ 39.110701][ T3678] __sock_sendmsg+0x102/0x180 [ 39.110726][ T3678] ____sys_sendmsg+0x345/0x4e0 [ 39.110765][ T3678] ___sys_sendmsg+0x17b/0x1d0 [ 39.110830][ T3678] __sys_sendmmsg+0x178/0x300 [ 39.110874][ T3678] __x64_sys_sendmmsg+0x57/0x70 [ 39.110911][ T3678] x64_sys_call+0x1c4a/0x3000 [ 39.110955][ T3678] do_syscall_64+0xd2/0x200 [ 39.110980][ T3678] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 39.111055][ T3678] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 39.111078][ T3678] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.111155][ T3678] RIP: 0033:0x7f82e995eec9 [ 39.111176][ T3678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.111201][ T3678] RSP: 002b:00007f82e83c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 39.111222][ T3678] RAX: ffffffffffffffda RBX: 00007f82e9bb5fa0 RCX: 00007f82e995eec9 [ 39.111235][ T3678] RDX: 0000000000000001 RSI: 0000200000000780 RDI: 0000000000000007 [ 39.111247][ T3678] RBP: 00007f82e83c7090 R08: 0000000000000000 R09: 0000000000000000 [ 39.111261][ T3678] R10: 0000000004008804 R11: 0000000000000246 R12: 0000000000000001 [ 39.111341][ T3678] R13: 00007f82e9bb6038 R14: 00007f82e9bb5fa0 R15: 00007ffcf644f798 [ 39.111360][ T3678] [ 39.389974][ T3315] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.408416][ T3299] udevd[3299]: inotify_add_watch(7, /dev/loop2p4, 10) failed: No such file or directory [ 39.411137][ T3690] SELinux: failed to load policy [ 39.420718][ T3508] udevd[3508]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 39.502216][ T3508] udevd[3508]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 39.513541][ T3299] udevd[3299]: inotify_add_watch(7, /dev/loop2p4, 10) failed: No such file or directory [ 39.558456][ T3710] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 39.608739][ T3712] loop3: detected capacity change from 0 to 512 [ 39.633850][ T3712] ext3: Unknown parameter 'euid>00000000000000000000' [ 39.722823][ T3715] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=3715 comm=syz.3.75 [ 39.775106][ T3723] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1023 sclass=netlink_route_socket pid=3723 comm=+}[@ [ 39.795529][ T3723] macvlan1: entered promiscuous mode [ 39.803571][ T3723] ipvlan0: entered promiscuous mode [ 39.809986][ T3723] ipvlan0: left promiscuous mode [ 39.817911][ T3723] macvlan1: left promiscuous mode [ 39.836706][ T3728] netlink: 'syz.4.79': attribute type 21 has an invalid length. [ 39.856488][ T3729] mmap: syz.1.78 (3729) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 39.879363][ T3734] loop2: detected capacity change from 0 to 512 [ 39.891827][ T3734] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 39.941555][ T3739] netlink: 'syz.1.81': attribute type 4 has an invalid length. [ 39.941751][ T3734] EXT4-fs error (device loop2): ext4_acquire_dquot:6945: comm syz.2.80: Failed to acquire dquot type 1 [ 39.949211][ T3739] netlink: 8 bytes leftover after parsing attributes in process `syz.1.81'. [ 39.982564][ T3734] EXT4-fs (loop2): 1 truncate cleaned up [ 40.012259][ T3734] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 40.073071][ T3317] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.391932][ T3771] syzkaller0: entered promiscuous mode [ 40.397716][ T3771] syzkaller0: entered allmulticast mode [ 40.506531][ T3782] syzkaller0: entered promiscuous mode [ 40.512174][ T3782] syzkaller0: entered allmulticast mode [ 40.558034][ T29] kauditd_printk_skb: 513 callbacks suppressed [ 40.558103][ T29] audit: type=1400 audit(1760413979.367:617): avc: denied { prog_load } for pid=3786 comm="syz.3.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 40.622869][ T29] audit: type=1400 audit(1760413979.367:618): avc: denied { bpf } for pid=3786 comm="syz.3.98" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 40.643597][ T29] audit: type=1400 audit(1760413979.377:619): avc: denied { map_create } for pid=3786 comm="syz.3.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 40.663041][ T29] audit: type=1400 audit(1760413979.377:620): avc: denied { prog_load } for pid=3786 comm="syz.3.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 40.682132][ T29] audit: type=1400 audit(1760413979.377:621): avc: denied { prog_load } for pid=3786 comm="syz.3.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 40.701250][ T29] audit: type=1400 audit(1760413979.377:622): avc: denied { prog_load } for pid=3786 comm="syz.3.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 40.720335][ T29] audit: type=1400 audit(1760413979.387:623): avc: denied { read write } for pid=3783 comm="syz.1.97" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.744125][ T29] audit: type=1400 audit(1760413979.407:624): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.768687][ T29] audit: type=1400 audit(1760413979.407:625): avc: denied { prog_load } for pid=3783 comm="syz.1.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 40.787695][ T29] audit: type=1400 audit(1760413979.417:626): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.908344][ T3809] syzkaller0: entered promiscuous mode [ 40.913880][ T3809] syzkaller0: entered allmulticast mode [ 41.147147][ T3837] syzkaller0: entered promiscuous mode [ 41.153072][ T3837] syzkaller0: entered allmulticast mode [ 41.704131][ T3904] syzkaller0: entered promiscuous mode [ 41.709805][ T3904] syzkaller0: entered allmulticast mode [ 41.736254][ T3913] netlink: 12 bytes leftover after parsing attributes in process `syz.1.150'. [ 41.751893][ T3907] netlink: 12 bytes leftover after parsing attributes in process `syz.0.148'. [ 41.780603][ T3913] netlink: 'syz.1.150': attribute type 5 has an invalid length. [ 41.832716][ T3923] netlink: 'syz.2.151': attribute type 4 has an invalid length. [ 41.916737][ T3933] FAULT_INJECTION: forcing a failure. [ 41.916737][ T3933] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 41.930053][ T3933] CPU: 1 UID: 0 PID: 3933 Comm: syz.3.153 Not tainted syzkaller #0 PREEMPT(voluntary) [ 41.930124][ T3933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 41.930141][ T3933] Call Trace: [ 41.930148][ T3933] [ 41.930158][ T3933] __dump_stack+0x1d/0x30 [ 41.930185][ T3933] dump_stack_lvl+0xe8/0x140 [ 41.930280][ T3933] dump_stack+0x15/0x1b [ 41.930355][ T3933] should_fail_ex+0x265/0x280 [ 41.930401][ T3933] should_fail+0xb/0x20 [ 41.930434][ T3933] should_fail_usercopy+0x1a/0x20 [ 41.930459][ T3933] strncpy_from_user+0x25/0x230 [ 41.930558][ T3933] path_setxattrat+0xeb/0x310 [ 41.930608][ T3933] __x64_sys_lsetxattr+0x71/0x90 [ 41.930636][ T3933] x64_sys_call+0x287b/0x3000 [ 41.930747][ T3933] do_syscall_64+0xd2/0x200 [ 41.930809][ T3933] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 41.930836][ T3933] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 41.930887][ T3933] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.930911][ T3933] RIP: 0033:0x7f3aaedeeec9 [ 41.930936][ T3933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.930954][ T3933] RSP: 002b:00007f3aad84f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 41.930976][ T3933] RAX: ffffffffffffffda RBX: 00007f3aaf045fa0 RCX: 00007f3aaedeeec9 [ 41.930992][ T3933] RDX: 0000200000000540 RSI: 00002000000003c0 RDI: 0000200000000000 [ 41.931015][ T3933] RBP: 00007f3aad84f090 R08: 0000000000000000 R09: 0000000000000000 [ 41.931034][ T3933] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000001 [ 41.931048][ T3933] R13: 00007f3aaf046038 R14: 00007f3aaf045fa0 R15: 00007ffe3082f948 [ 41.931072][ T3933] [ 42.108772][ T3930] netlink: 12 bytes leftover after parsing attributes in process `syz.2.154'. [ 42.194849][ T3950] netlink: 'syz.1.164': attribute type 4 has an invalid length. [ 42.251245][ T3954] syzkaller0: entered promiscuous mode [ 42.256760][ T3954] syzkaller0: entered allmulticast mode [ 42.277089][ T3957] 8021q: adding VLAN 0 to HW filter on device bond1 [ 42.284852][ T3957] team0: Port device bond1 added [ 42.472161][ T3983] netlink: 'syz.0.176': attribute type 4 has an invalid length. [ 42.547736][ T3989] syzkaller0: entered promiscuous mode [ 42.553266][ T3989] syzkaller0: entered allmulticast mode [ 42.636695][ T3996] syzkaller0: entered promiscuous mode [ 42.642271][ T3996] syzkaller0: entered allmulticast mode [ 42.723528][ T4009] Zero length message leads to an empty skb [ 42.810340][ T4023] netlink: 60 bytes leftover after parsing attributes in process `syz.1.195'. [ 42.962018][ T4042] netlink: 8 bytes leftover after parsing attributes in process `syz.4.204'. [ 42.971387][ T4042] netlink: 8 bytes leftover after parsing attributes in process `syz.4.204'. [ 42.995922][ T4048] serio: Serial port ptm0 [ 43.242838][ T4075] syzkaller0: entered promiscuous mode [ 43.248556][ T4075] syzkaller0: entered allmulticast mode [ 43.333923][ T4077] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(10) [ 43.340640][ T4077] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 43.348327][ T4077] vhci_hcd vhci_hcd.0: Device attached [ 43.354355][ T4081] netlink: 'syz.1.218': attribute type 21 has an invalid length. [ 43.357606][ T4078] vhci_hcd: connection closed [ 43.362193][ T4081] netlink: 'syz.1.218': attribute type 4 has an invalid length. [ 43.362629][ T31] vhci_hcd: stop threads [ 43.379202][ T31] vhci_hcd: release socket [ 43.383692][ T31] vhci_hcd: disconnect device [ 43.759933][ T4105] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(9) [ 43.766521][ T4105] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 43.774232][ T4105] vhci_hcd vhci_hcd.0: Device attached [ 43.780708][ T4105] vhci_hcd vhci_hcd.0: pdev(1) rhport(1) sockfd(11) [ 43.787400][ T4105] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 43.794993][ T4105] vhci_hcd vhci_hcd.0: Device attached [ 43.814970][ T4105] vhci_hcd vhci_hcd.0: pdev(1) rhport(2) sockfd(13) [ 43.821731][ T4105] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 43.829397][ T4105] vhci_hcd vhci_hcd.0: Device attached [ 43.845518][ T4105] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 43.863053][ T4117] syzkaller0: entered promiscuous mode [ 43.868595][ T4117] syzkaller0: entered allmulticast mode [ 43.877260][ T4105] vhci_hcd vhci_hcd.0: pdev(1) rhport(4) sockfd(17) [ 43.883913][ T4105] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 43.891525][ T4105] vhci_hcd vhci_hcd.0: Device attached [ 43.919965][ T4105] vhci_hcd vhci_hcd.0: pdev(1) rhport(5) sockfd(19) [ 43.926635][ T4105] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 43.934308][ T4105] vhci_hcd vhci_hcd.0: Device attached [ 43.958326][ T4105] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 43.970796][ T4105] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 43.982899][ T4114] vhci_hcd: connection closed [ 43.982933][ T4106] vhci_hcd: connection closed [ 43.983041][ T4120] vhci_hcd: connection closed [ 43.988355][ T31] vhci_hcd: stop threads [ 44.001598][ T31] vhci_hcd: release socket [ 44.001700][ T4110] vhci_hcd: connection closed [ 44.006028][ T31] vhci_hcd: disconnect device [ 44.011114][ T4125] vhci_hcd: connection closed [ 44.022164][ T31] vhci_hcd: stop threads [ 44.031306][ T31] vhci_hcd: release socket [ 44.035746][ T31] vhci_hcd: disconnect device [ 44.041245][ T10] usb 3-1: new low-speed USB device number 2 using vhci_hcd [ 44.048663][ T10] usb 3-1: enqueue for inactive port 0 [ 44.054347][ T10] usb 3-1: enqueue for inactive port 0 [ 44.060454][ T10] usb 3-1: enqueue for inactive port 0 [ 44.066778][ T31] vhci_hcd: stop threads [ 44.071117][ T31] vhci_hcd: release socket [ 44.075784][ T31] vhci_hcd: disconnect device [ 44.093764][ T4135] syzkaller0: entered promiscuous mode [ 44.099372][ T4135] syzkaller0: entered allmulticast mode [ 44.106881][ T31] vhci_hcd: stop threads [ 44.111251][ T31] vhci_hcd: release socket [ 44.115708][ T31] vhci_hcd: disconnect device [ 44.121088][ T31] vhci_hcd: stop threads [ 44.125361][ T31] vhci_hcd: release socket [ 44.129902][ T31] vhci_hcd: disconnect device [ 44.136374][ T10] vhci_hcd: vhci_device speed not set [ 44.246963][ T4155] bridge_slave_0: left allmulticast mode [ 44.252712][ T4155] bridge_slave_0: left promiscuous mode [ 44.259089][ T4155] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.270928][ T4155] bridge_slave_1: left allmulticast mode [ 44.276753][ T4155] bridge_slave_1: left promiscuous mode [ 44.282549][ T4155] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.292273][ T4155] bond0: (slave bond_slave_0): Releasing backup interface [ 44.302662][ T4155] bond0: (slave bond_slave_1): Releasing backup interface [ 44.314696][ T4155] team0: Port device team_slave_0 removed [ 44.323871][ T4155] team0: Port device team_slave_1 removed [ 44.330960][ T4155] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 44.338631][ T4155] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 44.347389][ T4155] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 44.354907][ T4155] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 44.364889][ T4155] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 44.390260][ T4168] bond_slave_0: entered promiscuous mode [ 44.396254][ T4168] bond_slave_0: entered allmulticast mode [ 44.425438][ T4169] syzkaller0: entered promiscuous mode [ 44.431189][ T4169] syzkaller0: entered allmulticast mode [ 44.563519][ T4184] bond2 (unregistering): Released all slaves [ 44.967974][ T4203] FAULT_INJECTION: forcing a failure. [ 44.967974][ T4203] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 44.981133][ T4203] CPU: 1 UID: 0 PID: 4203 Comm: syz.3.264 Not tainted syzkaller #0 PREEMPT(voluntary) [ 44.981233][ T4203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 44.981245][ T4203] Call Trace: [ 44.981251][ T4203] [ 44.981258][ T4203] __dump_stack+0x1d/0x30 [ 44.981278][ T4203] dump_stack_lvl+0xe8/0x140 [ 44.981297][ T4203] dump_stack+0x15/0x1b [ 44.981319][ T4203] should_fail_ex+0x265/0x280 [ 44.981401][ T4203] should_fail+0xb/0x20 [ 44.981429][ T4203] should_fail_usercopy+0x1a/0x20 [ 44.981448][ T4203] _copy_to_user+0x20/0xa0 [ 44.981503][ T4203] simple_read_from_buffer+0xb5/0x130 [ 44.981593][ T4203] proc_fail_nth_read+0x10e/0x150 [ 44.981621][ T4203] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 44.981646][ T4203] vfs_read+0x1a8/0x770 [ 44.981665][ T4203] ? __rcu_read_unlock+0x4f/0x70 [ 44.981733][ T4203] ? __fget_files+0x184/0x1c0 [ 44.981758][ T4203] ksys_read+0xda/0x1a0 [ 44.981781][ T4203] __x64_sys_read+0x40/0x50 [ 44.981802][ T4203] x64_sys_call+0x27c0/0x3000 [ 44.981821][ T4203] do_syscall_64+0xd2/0x200 [ 44.981843][ T4203] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 44.981931][ T4203] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 44.982032][ T4203] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 44.982093][ T4203] RIP: 0033:0x7f3aaeded8dc [ 44.982156][ T4203] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 44.982172][ T4203] RSP: 002b:00007f3aad84f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 44.982189][ T4203] RAX: ffffffffffffffda RBX: 00007f3aaf045fa0 RCX: 00007f3aaeded8dc [ 44.982200][ T4203] RDX: 000000000000000f RSI: 00007f3aad84f0a0 RDI: 0000000000000003 [ 44.982211][ T4203] RBP: 00007f3aad84f090 R08: 0000000000000000 R09: 0000000000000000 [ 44.982222][ T4203] R10: 00002000000000c0 R11: 0000000000000246 R12: 0000000000000001 [ 44.982232][ T4203] R13: 00007f3aaf046038 R14: 00007f3aaf045fa0 R15: 00007ffe3082f948 [ 44.982318][ T4203] [ 45.252651][ T4212] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 45.352714][ T4223] FAULT_INJECTION: forcing a failure. [ 45.352714][ T4223] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 45.359973][ T4226] netlink: 'syz.4.275': attribute type 4 has an invalid length. [ 45.365925][ T4223] CPU: 0 UID: 0 PID: 4223 Comm: syz.3.273 Not tainted syzkaller #0 PREEMPT(voluntary) [ 45.365984][ T4223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 45.366004][ T4223] Call Trace: [ 45.366013][ T4223] [ 45.366022][ T4223] __dump_stack+0x1d/0x30 [ 45.366057][ T4223] dump_stack_lvl+0xe8/0x140 [ 45.366085][ T4223] dump_stack+0x15/0x1b [ 45.366109][ T4223] should_fail_ex+0x265/0x280 [ 45.366224][ T4223] should_fail+0xb/0x20 [ 45.366277][ T4223] should_fail_usercopy+0x1a/0x20 [ 45.366306][ T4223] _copy_from_user+0x1c/0xb0 [ 45.366421][ T4223] memdup_user+0x5e/0xd0 [ 45.366456][ T4223] strndup_user+0x68/0xb0 [ 45.366491][ T4223] __se_sys_mount+0x4d/0x2e0 [ 45.366525][ T4223] ? fput+0x8f/0xc0 [ 45.366629][ T4223] ? ksys_write+0x192/0x1a0 [ 45.366663][ T4223] __x64_sys_mount+0x67/0x80 [ 45.366771][ T4223] x64_sys_call+0x2b51/0x3000 [ 45.366802][ T4223] do_syscall_64+0xd2/0x200 [ 45.366837][ T4223] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 45.366876][ T4223] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 45.366963][ T4223] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.366993][ T4223] RIP: 0033:0x7f3aaedeeec9 [ 45.367014][ T4223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.367038][ T4223] RSP: 002b:00007f3aad84f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 45.367066][ T4223] RAX: ffffffffffffffda RBX: 00007f3aaf045fa0 RCX: 00007f3aaedeeec9 [ 45.367084][ T4223] RDX: 0000200000000200 RSI: 0000200000000280 RDI: 0000000000000000 [ 45.367172][ T4223] RBP: 00007f3aad84f090 R08: 0000200000000340 R09: 0000000000000000 [ 45.367190][ T4223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.367207][ T4223] R13: 00007f3aaf046038 R14: 00007f3aaf045fa0 R15: 00007ffe3082f948 [ 45.367233][ T4223] [ 45.385497][ T4224] netlink: 'syz.0.274': attribute type 30 has an invalid length. [ 45.412390][ T4226] netlink: 'syz.4.275': attribute type 4 has an invalid length. [ 45.447920][ T4229] syzkaller0: entered promiscuous mode [ 45.583242][ T4229] syzkaller0: entered allmulticast mode [ 45.607565][ T29] kauditd_printk_skb: 1620 callbacks suppressed [ 45.607583][ T29] audit: type=1400 audit(1760413984.417:2244): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.641219][ T29] audit: type=1326 audit(1760413984.417:2245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4233 comm="syz.4.277" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82e995eec9 code=0x7ffc0000 [ 45.641266][ T29] audit: type=1326 audit(1760413984.417:2246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4233 comm="syz.4.277" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82e995eec9 code=0x7ffc0000 [ 45.688246][ T29] audit: type=1326 audit(1760413984.417:2247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4233 comm="syz.4.277" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7f82e995eec9 code=0x7ffc0000 [ 45.688284][ T29] audit: type=1326 audit(1760413984.417:2248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4233 comm="syz.4.277" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82e995eec9 code=0x7ffc0000 [ 45.688374][ T29] audit: type=1326 audit(1760413984.417:2249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4233 comm="syz.4.277" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f82e995d710 code=0x7ffc0000 [ 45.723270][ T4235] netlink: 16 bytes leftover after parsing attributes in process `syz.4.277'. [ 45.735732][ T29] audit: type=1326 audit(1760413984.447:2250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4233 comm="syz.4.277" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82e995eec9 code=0x7ffc0000 [ 45.792833][ T29] audit: type=1326 audit(1760413984.447:2251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4233 comm="syz.4.277" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f82e995eec9 code=0x7ffc0000 [ 45.825130][ T29] audit: type=1400 audit(1760413984.577:2252): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.825705][ T29] audit: type=1400 audit(1760413984.627:2253): avc: denied { map_create } for pid=4236 comm="syz.0.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 45.949679][ T4250] netlink: 24 bytes leftover after parsing attributes in process `'. [ 46.366024][ T4309] syzkaller0: entered promiscuous mode [ 46.371721][ T4309] syzkaller0: entered allmulticast mode [ 46.393422][ T4310] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 46.505435][ T4318] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(5) [ 46.512182][ T4318] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 46.520199][ T4318] vhci_hcd vhci_hcd.0: Device attached [ 46.529124][ T4319] vhci_hcd: connection closed [ 46.529484][ T59] vhci_hcd: stop threads [ 46.538546][ T59] vhci_hcd: release socket [ 46.543036][ T59] vhci_hcd: disconnect device [ 46.962559][ T4331] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 46.999942][ T4333] netlink: 3672 bytes leftover after parsing attributes in process `syz.4.320'. [ 47.063116][ T4335] syzkaller0: entered promiscuous mode [ 47.068777][ T4335] syzkaller0: entered allmulticast mode [ 47.087558][ T4339] bond1 (unregistering): Released all slaves [ 47.256161][ T4362] syzkaller0: entered promiscuous mode [ 47.261702][ T4362] syzkaller0: entered allmulticast mode [ 47.381196][ T4369] netlink: 28 bytes leftover after parsing attributes in process `syz.2.334'. [ 47.390792][ T4369] netlink: 48 bytes leftover after parsing attributes in process `syz.2.334'. [ 47.745440][ T4381] syzkaller0: entered promiscuous mode [ 47.751091][ T4381] syzkaller0: entered allmulticast mode [ 47.835071][ T4383] netlink: 12 bytes leftover after parsing attributes in process `syz.0.339'. [ 47.901334][ T4391] FAULT_INJECTION: forcing a failure. [ 47.901334][ T4391] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 47.914801][ T4391] CPU: 1 UID: 0 PID: 4391 Comm: syz.0.342 Not tainted syzkaller #0 PREEMPT(voluntary) [ 47.914873][ T4391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 47.914885][ T4391] Call Trace: [ 47.914891][ T4391] [ 47.914898][ T4391] __dump_stack+0x1d/0x30 [ 47.914917][ T4391] dump_stack_lvl+0xe8/0x140 [ 47.914942][ T4391] dump_stack+0x15/0x1b [ 47.914957][ T4391] should_fail_ex+0x265/0x280 [ 47.915032][ T4391] should_fail_alloc_page+0xf2/0x100 [ 47.915058][ T4391] __alloc_frozen_pages_noprof+0xff/0x360 [ 47.915110][ T4391] alloc_pages_mpol+0xb3/0x260 [ 47.915202][ T4391] vma_alloc_folio_noprof+0x1aa/0x300 [ 47.915221][ T4391] handle_mm_fault+0xec2/0x2be0 [ 47.915243][ T4391] ? vma_start_read+0x141/0x1f0 [ 47.915273][ T4391] do_user_addr_fault+0x630/0x1080 [ 47.915317][ T4391] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 47.915341][ T4391] exc_page_fault+0x62/0xa0 [ 47.915420][ T4391] asm_exc_page_fault+0x26/0x30 [ 47.915438][ T4391] RIP: 0033:0x7f91535bea86 [ 47.915503][ T4391] Code: 04 14 00 8b 75 00 ba 03 00 00 00 45 89 e0 49 89 45 00 41 b9 00 00 00 10 b9 01 80 00 00 31 ff c1 e6 06 e8 6d 04 14 00 8b 55 40 <49> 89 07 49 03 55 00 45 85 f6 74 1b 44 89 f3 31 c0 66 0f 1f 84 00 [ 47.915519][ T4391] RSP: 002b:00007f9152166fd0 EFLAGS: 00010217 [ 47.915534][ T4391] RAX: ffffffffffffffff RBX: 00007f9153955fa0 RCX: 00007f91536fef03 [ 47.915545][ T4391] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 47.915560][ T4391] RBP: 0000200000000440 R08: 00000000ffffffff R09: 0000000010000000 [ 47.915632][ T4391] R10: 0000000000008001 R11: 0000000000000246 R12: ffffffffffffffff [ 47.915659][ T4391] R13: 0000200000000400 R14: 000000000000010e R15: 0000200000001940 [ 47.915676][ T4391] [ 47.915695][ T4391] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 48.111923][ T4399] netlink: 'syz.0.346': attribute type 21 has an invalid length. [ 48.119788][ T4399] netlink: 128 bytes leftover after parsing attributes in process `syz.0.346'. [ 48.129689][ T4399] netlink: 'syz.0.346': attribute type 4 has an invalid length. [ 48.137462][ T4399] netlink: 3 bytes leftover after parsing attributes in process `syz.0.346'. [ 48.177512][ T4405] Cannot find add_set index 4 as target [ 48.209690][ T4397] syzkaller0: entered promiscuous mode [ 48.215444][ T4397] syzkaller0: entered allmulticast mode [ 48.281197][ T4409] syzkaller0: entered promiscuous mode [ 48.286981][ T4409] syzkaller0: entered allmulticast mode [ 48.303858][ T4415] netlink: 14 bytes leftover after parsing attributes in process `syz.3.352'. [ 48.339913][ T4413] syzkaller0: entered promiscuous mode [ 48.345426][ T4413] syzkaller0: entered allmulticast mode [ 48.361194][ T4415] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 48.372467][ T4415] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 48.382873][ T4415] bond0 (unregistering): Released all slaves [ 48.534421][ T4436] netlink: 4 bytes leftover after parsing attributes in process `syz.3.360'. [ 48.555135][ T4440] netlink: 4 bytes leftover after parsing attributes in process `syz.4.361'. [ 48.571460][ T4439] netlink: 60 bytes leftover after parsing attributes in process `syz.2.362'. [ 48.637003][ T4443] syzkaller0: entered promiscuous mode [ 48.642581][ T4443] syzkaller0: entered allmulticast mode [ 48.860629][ T4460] syzkaller0: entered promiscuous mode [ 48.866288][ T4460] syzkaller0: entered allmulticast mode [ 49.138941][ T4487] syzkaller0: entered promiscuous mode [ 49.144485][ T4487] syzkaller0: entered allmulticast mode [ 49.187416][ T4495] syzkaller0: entered promiscuous mode [ 49.193044][ T4495] syzkaller0: entered allmulticast mode [ 49.318443][ T4505] futex_wake_op: syz.4.390 tries to shift op by 144; fix this program [ 49.629071][ T4526] netlink: 'syz.1.398': attribute type 4 has an invalid length. [ 49.685678][ T4526] netlink: 'syz.1.398': attribute type 4 has an invalid length. [ 49.831248][ T4532] syzkaller0: entered promiscuous mode [ 49.836807][ T4532] syzkaller0: entered allmulticast mode [ 50.084298][ T4553] netlink: 'syz.1.411': attribute type 4 has an invalid length. [ 50.118127][ T4553] netlink: 'syz.1.411': attribute type 4 has an invalid length. [ 50.319237][ T4559] syzkaller0: entered promiscuous mode [ 50.324763][ T4559] syzkaller0: entered allmulticast mode [ 50.509486][ T4567] syzkaller0: entered promiscuous mode [ 50.515060][ T4567] syzkaller0: entered allmulticast mode [ 50.616111][ T29] kauditd_printk_skb: 3169 callbacks suppressed [ 50.616129][ T29] audit: type=1400 audit(1760413989.417:5424): avc: denied { block_suspend } for pid=4577 comm="syz.1.420" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 50.644148][ T29] audit: type=1400 audit(1760413989.417:5423): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 50.702488][ T3041] audit: audit_backlog=65 > audit_backlog_limit=64 [ 50.709732][ T3041] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 50.717491][ T3041] audit: backlog limit exceeded [ 50.728703][ T4574] audit: audit_backlog=65 > audit_backlog_limit=64 [ 50.735616][ T4574] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 50.743440][ T4574] audit: backlog limit exceeded [ 50.766141][ T4582] audit: audit_backlog=65 > audit_backlog_limit=64 [ 50.772801][ T4582] audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 [ 50.857053][ T4587] netlink: 'syz.0.423': attribute type 4 has an invalid length. [ 50.923219][ T4587] netlink: 'syz.0.423': attribute type 4 has an invalid length. [ 51.064009][ T4593] ªªªªªªÿÿòÿÿÿòÿÿ: renamed from wg2 (while UP) [ 51.437384][ T4625] ªªªªªªÿÿòÿÿÿòÿÿ: renamed from wg2 (while UP) [ 51.975400][ T4657] can0: slcan on ttyS3. [ 52.476560][ T4654] can0 (unregistered): slcan off ttyS3. [ 52.730981][ T4670] syzkaller0: entered promiscuous mode [ 52.736644][ T4670] syzkaller0: entered allmulticast mode [ 52.858312][ T4678] bridge_slave_0: left allmulticast mode [ 52.864017][ T4678] bridge_slave_0: left promiscuous mode [ 52.869960][ T4678] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.918951][ T4683] netlink: 'syz.2.460': attribute type 10 has an invalid length. [ 52.926846][ T4683] __nla_validate_parse: 5 callbacks suppressed [ 52.926861][ T4683] netlink: 40 bytes leftover after parsing attributes in process `syz.2.460'. [ 52.944322][ T4678] bridge_slave_1: left allmulticast mode [ 52.950227][ T4678] bridge_slave_1: left promiscuous mode [ 52.955987][ T4678] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.965085][ T4686] netlink: 'syz.4.462': attribute type 4 has an invalid length. [ 53.037985][ T4678] bond0: (slave bond_slave_0): Releasing backup interface [ 53.079113][ T4678] bond0: (slave bond_slave_1): Releasing backup interface [ 53.116925][ T4678] team0: Port device team_slave_0 removed [ 53.143893][ T4678] team0: Port device team_slave_1 removed [ 53.172863][ T4678] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 53.180435][ T4678] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 53.198290][ T4678] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 53.205995][ T4678] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 53.219692][ T4678] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 53.253753][ T4683] batman_adv: batadv0: Adding interface: veth1_vlan [ 53.260536][ T4683] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 53.349244][ T4683] batman_adv: batadv0: Interface activated: veth1_vlan [ 53.626679][ T4717] netlink: 14 bytes leftover after parsing attributes in process `syz.2.475'. [ 53.658168][ T4714] syzkaller0: entered promiscuous mode [ 53.663905][ T4714] syzkaller0: entered allmulticast mode [ 53.682592][ T4717] bond0 (unregistering): Released all slaves [ 53.986154][ C1] ================================================================== [ 53.994385][ C1] BUG: KCSAN: data-race in wq_worker_tick / wq_worker_tick [ 54.001626][ C1] [ 54.003972][ C1] read-write to 0xffff8881000732b8 of 8 bytes by interrupt on cpu 0: [ 54.012151][ C1] wq_worker_tick+0x60/0x230 [ 54.016825][ C1] sched_tick+0x11a/0x270 [ 54.021206][ C1] update_process_times+0x15f/0x190 [ 54.026462][ C1] tick_nohz_handler+0x249/0x2d0 [ 54.031462][ C1] __hrtimer_run_queues+0x20f/0x5a0 [ 54.036708][ C1] hrtimer_interrupt+0x21a/0x460 [ 54.041698][ C1] __sysvec_apic_timer_interrupt+0x5f/0x1d0 [ 54.047738][ C1] sysvec_apic_timer_interrupt+0x6f/0x80 [ 54.053432][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 54.059481][ C1] queue_work_on+0x102/0x160 [ 54.064123][ C1] tty_insert_flip_string_and_push_buffer+0x1ce/0x1f0 [ 54.070932][ C1] pty_write+0x70/0x90 [ 54.075068][ C1] tty_put_char+0x8f/0xc0 [ 54.079435][ C1] __process_echoes+0x309/0x6b0 [ 54.084351][ C1] n_tty_receive_buf_common+0x8e4/0xbe0 [ 54.090125][ C1] n_tty_receive_buf2+0x33/0x40 [ 54.095276][ C1] tty_ldisc_receive_buf+0x66/0xf0 [ 54.100450][ C1] tty_port_default_receive_buf+0x59/0x90 [ 54.106289][ C1] flush_to_ldisc+0x148/0x340 [ 54.111001][ C1] process_scheduled_works+0x4ce/0x9d0 [ 54.116522][ C1] worker_thread+0x582/0x770 [ 54.121141][ C1] kthread+0x489/0x510 [ 54.125253][ C1] ret_from_fork+0x122/0x1b0 [ 54.129865][ C1] ret_from_fork_asm+0x1a/0x30 [ 54.134680][ C1] [ 54.137020][ C1] read-write to 0xffff8881000732b8 of 8 bytes by interrupt on cpu 1: [ 54.145141][ C1] wq_worker_tick+0x60/0x230 [ 54.149769][ C1] sched_tick+0x11a/0x270 [ 54.154148][ C1] update_process_times+0x15f/0x190 [ 54.159391][ C1] tick_nohz_handler+0x249/0x2d0 [ 54.164416][ C1] __hrtimer_run_queues+0x20f/0x5a0 [ 54.169645][ C1] hrtimer_interrupt+0x21a/0x460 [ 54.174696][ C1] __sysvec_apic_timer_interrupt+0x5f/0x1d0 [ 54.180812][ C1] sysvec_apic_timer_interrupt+0x6f/0x80 [ 54.186579][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 54.192596][ C1] flush_to_ldisc+0x1e7/0x340 [ 54.197315][ C1] process_scheduled_works+0x4ce/0x9d0 [ 54.202812][ C1] worker_thread+0x582/0x770 [ 54.207512][ C1] kthread+0x489/0x510 [ 54.211606][ C1] ret_from_fork+0x122/0x1b0 [ 54.216226][ C1] ret_from_fork_asm+0x1a/0x30 [ 54.221032][ C1] [ 54.223370][ C1] value changed: 0x0000000000011170 -> 0x0000000000013880 [ 54.230492][ C1] [ 54.232836][ C1] Reported by Kernel Concurrency Sanitizer on: [ 54.239183][ C1] CPU: 1 UID: 0 PID: 31 Comm: kworker/u8:1 Not tainted syzkaller #0 PREEMPT(voluntary) [ 54.248939][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 54.259019][ C1] Workqueue: events_unbound flush_to_ldisc [ 54.264967][ C1] ================================================================== [ 55.626502][ T29] kauditd_printk_skb: 27421 callbacks suppressed [ 55.626517][ T29] audit: type=1400 audit(1760413994.437:30121): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 55.634417][ T3041] audit: audit_backlog=65 > audit_backlog_limit=64 [ 55.654426][ T29] audit: type=1400 audit(1760413994.437:30122): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 55.660954][ T3041] audit: audit_lost=913 audit_rate_limit=0 audit_backlog_limit=64 [ 55.660972][ T3041] audit: backlog limit exceeded [ 55.661656][ T3041] audit: audit_backlog=65 > audit_backlog_limit=64 [ 55.682298][ T29] audit: type=1400 audit(1760413994.437:30123): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 55.690141][ T3041] audit: audit_lost=914 audit_rate_limit=0 audit_backlog_limit=64 [ 55.695019][ T29] audit: type=1400 audit(1760413994.437:30124): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 55.695084][ T29] audit: type=1400 audit(1760413994.437:30125): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.636091][ T29] kauditd_printk_skb: 49709 callbacks suppressed [ 60.636138][ T29] audit: type=1400 audit(1760413999.437:76945): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.644146][ T3041] audit: audit_backlog=65 > audit_backlog_limit=64 [ 60.664631][ T29] audit: type=1400 audit(1760413999.447:76946): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.670316][ T3041] audit: audit_lost=1878 audit_rate_limit=0 audit_backlog_limit=64 [ 60.670338][ T3041] audit: backlog limit exceeded [ 60.691688][ T29] audit: type=1400 audit(1760413999.447:76947): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.691721][ T29] audit: type=1400 audit(1760413999.447:76948): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.701404][ T3041] audit: audit_backlog=65 > audit_backlog_limit=64 [ 60.704486][ T29] audit: type=1400 audit(1760413999.447:76949): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.725740][ T3041] audit: audit_lost=1879 audit_rate_limit=0 audit_backlog_limit=64