last executing test programs: 3.599431241s ago: executing program 0 (id=1): r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, 0xfffffffffffffffe, &(0x7f0000000900)=0x6) r2 = socket$kcm(0x10, 0x2, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x2}, &(0x7f0000000400)=0x8) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001800599c6d0eab070004000523"], 0xfe33) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v2={0x2000000, [{0x8fb0, 0x4}, {0x5, 0xfffffffc}]}, 0x14, 0x0) clock_gettime(0x0, &(0x7f0000000540)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000680)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) listxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000003ec0)=""/4096, 0x1000) 3.530189527s ago: executing program 4 (id=5): r0 = creat(&(0x7f0000000040)='./file0\x00', 0x108) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x2, 0xd, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000000000000000000000851000000100000095000000000000001800000020646c2500000000002020207b1af8ff00000000bd21ffff0000000007010000f8ffffffb502020008000000b70300000000000085000000a400000095"], &(0x7f0000000080)='syzkaller\x00', 0xa, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xd01, 0x5, 0xd5, 0x80, 0x1, 0x6a01492a, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x2}, 0x50) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12c, 0x12c, 0x9, [@ptr={0x4, 0x0, 0x0, 0x2, 0x1}, @volatile={0x2, 0x0, 0x0, 0x9, 0x2}, @union={0xd, 0x9, 0x0, 0x5, 0x1, 0x5, [{0x7, 0x5, 0x8001}, {0x1, 0x5, 0x6}, {0x3, 0x1, 0x4}, {0x2, 0x3, 0x8}, {0x10, 0x5, 0x6}, {0xb, 0x4, 0xf}, {0xe, 0x2, 0x9f}, {0x4, 0x2, 0xfffffffc}, {0x1, 0x4, 0x6}]}, @enum={0x3, 0x3, 0x0, 0x6, 0x4, [{0x9, 0x8}, {0xf, 0x46912a2e}, {0xc, 0x8}]}, @func={0xa, 0x0, 0x0, 0xc, 0x4}, @struct={0x2, 0x8, 0x0, 0x4, 0x0, 0x8000, [{0x8, 0x3, 0xfffffffe}, {0xf, 0x2, 0x5}, {0xb, 0x0, 0xfffffffd}, {0x5, 0x4, 0xfffff480}, {0xc, 0x0, 0x4}, {0xc, 0x1, 0x3}, {0xb, 0x4, 0x3}, {0xa, 0x4, 0x6}]}]}, {0x0, [0x30, 0x5f, 0x2e, 0x2e, 0x5f, 0x61, 0x30]}}, &(0x7f00000009c0)=""/4096, 0x14d, 0x1000, 0x1, 0x403ff}, 0x28) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001740)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000bc7ef9642d29ba564165605dca29708efdf9b15a5c10a126121b2751f642635bcd9a8bf7a928a5d054b0d2c54d519ea75c52f41ed6f2886973626b684c8bd9108c0b0b2ea7e556948f0367aff4fbcede3294f6e73d06ad16dc2d26725ff833b5f83b499918e6a6ec245b781d41aee9624c847e2f2312d6b9db45bad354fc1a3f20407ffe406483a0524937ee7559e4bf70136746b37fdfbbb152758d37ed8bcac41fb7243bdcd536249c7996e898b61927eaa5a8790054ba13d3ade593220f96027090a34aaf7ea92f41aab73e7a85eef87e956bb7c5c76a347264fd99359f4e57b0dcc2bcc188ea880a4b11a8bb81eb22b0ddfc689e3218cf310dcc61cab354149d9107d8a88b0aa5b5661555f00443aee5e714009e52cee5e88f008148ddbc0fa81bf938bed4a1ac778d5337cc0311d0772eeac3eab38426e8d1472ff514aa5379ed21551790cc10148410b4fc27582fd7106a8887a9a0b613dfe10aee77542d887208f5534f5dce4d43f258fc9ef975834e1917666e2aff1cebfc3ce2c1e8ff66bba1d9050000000000000078db7024bf321636bede8651e672ed4f01ba5da2c3f9042a8552bd3f2c9ad546ad0ea20b4d35fb0a15c6239f67c7747a40fe26a88adf727fd1b801b4e56fbffcad99ce68fe2af0d94fdc78d27268de435021dca51acaa7a9e0944bdf579c170db6405944b6791a7713ee54f650fdf71b57c3629fb185efce700620ef5744623be08ec935dd563e6ba0b461bda98b364acf3dcdafa9b0e68c21ea509212c2938aa09cc31aa4ee5bfb8e507181909f5854b13997af4888cd61c8aab5fdfd701a16d546e5a533cd9b985dcc582b67979551dcc750fc51f2c9b6814edeffc76a86ea9f58b7c66fa24540daf14c2163d064f8cf0b4878f81e6b8bc4dabc10dac82b39e033963a6d02434cb783a198829d1373790a85c0e01a362d89e80165d280283af3c2060000000000000034b12a73b0c53bfae5d2f6e55728052247adfe0966c6c5eca57918c4540c979a70a281ba00e408c9fe1b20fa208976dd6a56f9bd9a74d81447c9b265d8c23f0e983e0b1d2d62d1e57c9188e4882634476e62ab1b7415a58208eaaf166d14720092f79a6197fe8b4ea7d5485cc6b3630afed8d3403cfa4d7bf48efb371706e0e65901eea3743c98261cbb7a246cf62f99bbc918741d32539ec0754e7d7f08dd45aaf49623342eabf466e54d8da4346e73da54ba2e4b5e2ae2823864d4147b490e55c9509f75c8828500ac32cab11b0262e75fa9e39e3792d01e0b210fdfb686bfffdc677432f6332c1a27502b43997060acdf7784c79fed0325e06f6b64b6434ebf4730509bcf95b9a1d0ba7c469d55351cc1dce6c90f5872e7ad5eed5f850d9d1f928b4e0263b241e8fe03e5e66252c8a3bd320e8deee5b91c653b8f22f58cff36c2ba4d6774f14229939595d2beb998c9312212de00468fc488591aca07ab75fba4a318d3ee4581711927b77a7f14dbcd639892f8cb0000000000000080411736eb1ee86eec338197a56293c9cdb72e84155681553b896d58b62a96852320e74dc4c9b41d6f90d2353dc573a94a092a84209c12da57f8c78e161b0899eb1c8b694d26c5fbf7f65fefacdbf39151f335dddc3b179a13f6de93ffb338e94738c86e35e9fcc654e4d6618dc1201cbd16e1281df911e6c699da16fbbb7a2e5c77966c98d3e7edd58cabfe6bf1bb7f6329084e3e4a2a36da07bbac3ebc00472f55b7966f250109fcce0ad5d4526d20ef74d1a634d724"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r7) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000880)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x48, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x1}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r7, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002000)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0xe0, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xb8, 0x3, 0x0, 0x1, [{0xb4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xb0, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}]}, @NFTA_DATA_VALUE={0x85, 0x1, "e4db6e1248ff7780d43c6618442a74a7e00859a8f800c43d1196d7f47682680872d410e22a512d4afae19162e93dec0c76c009229c89840f29d213ce24b476f0aa2e0499e73664d30b020126caf59c8391ea25ae47f33ae910aa8f43d325a2a3c4afb31c43932c2bee16d7de766b7f8e6bd52cc507fbbaf03f610d5699ec21fa14"}, @NFTA_DATA_VALUE={0xd, 0x1, "1fdd3c33ddf916f5ef"}]}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x108}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c, 0x3, &(0x7f0000000640)=@framed={{0x18, 0x2, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x3b}}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9, r6}, 0x94) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000740)={{0x1, 0x1, 0xfffffffffffffdf3, 0xffffffffffffffff}, './file0/file0\x00'}) r11 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x63) write$P9_RLERRORu(r11, &(0x7f0000000300)=ANY=[@ANYRESHEX], 0x10) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x10012, r11, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000001d40)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001d80)={0x6, 0x23, &(0x7f00000003c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x9, 0x2, 0x3, 0x10, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfff}], &(0x7f0000000180)='GPL\x00', 0x0, 0xcd, &(0x7f0000000640)=""/205, 0x100, 0x0, '\x00', 0x0, @fallback=0xc, r4, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9, 0xffffffffffffffff, 0x1, &(0x7f0000000500)=[r10, r11], &(0x7f0000000540)=[{0x1, 0x2, 0x14, 0x1}], 0x10, 0x1}, 0x94) r12 = syz_genetlink_get_family_id$mptcp(&(0x7f0000001cc0), r10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r2, &(0x7f0000001ec0)={&(0x7f0000001c80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001d00)={&(0x7f0000001e40)={0x60, r12, 0x218, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0xa}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x4}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0xfff}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x34, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x404c011}, 0x20048080) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000e50000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e334185850000007300000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r13, 0x0, 0xe, 0x0, &(0x7f0000000200)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) r14 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r14, 0x408c5333, &(0x7f0000000580)={0x234b, 0xa2, 0x0, 'queue1\x00'}) connect$unix(0xffffffffffffffff, 0x0, 0x0) 3.454551782s ago: executing program 0 (id=6): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r2, 0x6, 0x24, &(0x7f0000000000)=0x1, 0x4) recvmmsg(r2, &(0x7f0000002340)=[{{0x0, 0x5, 0x0, 0x0, 0x0, 0x40000}, 0x4}], 0xf905db2d12e721d0, 0x10100, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, 0x0, 0x0) bind$inet6(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0xa}, 0x3013, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x64040005, 0x0, 0x0) shutdown(r6, 0x0) r7 = getpgrp(0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r8 = syz_pidfd_open(r7, 0x0) fsetxattr$trusted_overlay_nlink(r8, &(0x7f00000018c0), 0x0, 0x0, 0x1) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r9, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3fc, 0x0, 0x32}, 0x9c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x1, 0x20}, 0xc) bind$inet6(r9, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r9, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fremovexattr(r8, &(0x7f0000000280)=@known='trusted.overlay.nlink\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 3.433180087s ago: executing program 3 (id=4): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="a800000000010104000000000000000002000001240001801400018008000100e000000108000200e00000010c00028005000100000000000800084000009503040010800800154000000000200004"], 0xa8}, 0x1, 0x0, 0x0, 0x400d0}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="09000000060000000800000008"], 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c00)={0x11, 0x11, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000007000000000000000100000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000186a00000900000000000000f9ffffffbf91000000000000b70a0000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000440)='GPL\x00', 0x80000001, 0xd6, &(0x7f00000009c0)=""/214, 0x41100, 0x66, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x9, 0x6, 0x10000}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000b00)=[{0x4, 0x1, 0xa, 0x5}, {0x2, 0x5, 0x6}, {0x0, 0x5, 0x10, 0x2}, {0x2, 0x4, 0xd, 0x2}, {0x1, 0x5, 0x10, 0x8}], 0x10, 0x4}, 0x94) r6 = bpf$TOKEN_CREATE(0x24, &(0x7f00000008c0)={0x0, r4}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001cc0)={0x0, 0xc, &(0x7f0000000880)=ANY=[@ANYRES64=r6, @ANYRES64=r0, @ANYRES64=r4], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r4}, 0x38) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000800)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) cachestat(r0, &(0x7f0000000340)={0x401, 0x2}, &(0x7f0000000400), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000600)={0x9, 0x20000008b}, 0x0) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x6) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x401c2, 0x0) ftruncate(r9, 0x8800000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r11, &(0x7f00000034c0)=[{{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000000b80)=""/4096, 0x20001b80}, {&(0x7f0000001b80)=""/112, 0x70}], 0x2, 0x0, 0xa0028cb4}}], 0x40000000000013c, 0x700, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xcc8, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) msgget$private(0x0, 0x492) sendfile(r10, r9, 0x0, 0x578410eb) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r9) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r7, r1, 0x25, 0x0, @void}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r7, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0], 0x0, 0x12, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0xc5, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) syz_emit_ethernet(0xfdef, &(0x7f0000000640)=ANY=[@ANYRESOCT=r1, @ANYRES16=r11, @ANYRES8=r1, @ANYRES16=r12, @ANYRESHEX=r12], 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r13, 0x0) 3.256716842s ago: executing program 1 (id=2): r0 = syz_open_dev$sg(&(0x7f00000060c0), 0xfffffffffffffffd, 0x101000) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x8}, 0x102260, 0x10000, 0x0, 0x1, 0xc, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) timer_create(0x7, 0x0, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f00000002c0)) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000080)={0x53, 0xfffffffffffffffb, 0x6, 0x23, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000040)="089900050200", &(0x7f0000002240)=""/4115, 0x0, 0x10010, 0x1, 0x0}) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x1a0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x20) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x12, r2, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x400, 0xfffffffffffffffe, 0x0, 0x0, 0x200000000000007, 0x0, 0xfffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff000000007110bb000000000095"], &(0x7f0000000480)='syzkaller\x00'}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffbfffb702000008000000b703000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x2a82) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$LOOP_CONFIGURE(r5, 0x4c0a, &(0x7f00000005c0)={r6, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x4, 0x40000000000000]}}) r7 = syz_open_dev$loop(&(0x7f00000001c0), 0x5, 0x0) ioctl$LOOP_CONFIGURE(r7, 0x4c0a, &(0x7f0000001280)={r5, 0x0, {0x2a12, 0x80010000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd64c6a4b4e00d9603dda1af1ea80000000000000000000000deff00000000000000000000000014a2648f00", "2809e8dbe108038948224ad54afac11d875397bdb22d0000b420a1a93c7540f4767f9e01177d3dd40600000061ac00", "90be8b1c55f96400", [0x112]}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r4, 0x0, 0x14, 0x0, &(0x7f00000014c0)="e02742e8680d01c7f510772f08005ac68bfb70b8", 0x0, 0x2000009, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000007c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}, [@NFT_MSG_NEWRULE={0x40, 0x6, 0xa, 0x403, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x14, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @target={{0xb}, @void}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x20040040) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xa, 0xb, 0x4, 0x4}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000100)={r6, &(0x7f00000004c0)="146bc9290adf1ef47bd897e7702fdeae08b68bfd48f5c9f0e94ec43611803105a0d77cf9583b46581925d86f2bb17799bab427e69e8279c9983c51bc06bc8113cf07", &(0x7f0000000300)=""/20, 0x2}, 0x20) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@getnexthop={0x1c, 0x76, 0xb0d, 0x20, 0x25dfdbff, {0x3}, [@NHA_FDB={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 3.160009893s ago: executing program 2 (id=3): r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001b00)=@newqdisc={0x58, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {0x0, 0x4}, {0xffff, 0xffff}, {0x0, 0xb}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x28, 0x2, {{0x0, 0x0, 0x0, 0x386561e9}, [@TCA_NETEM_DELAY_DIST={0xa, 0xd, "85def352b66e"}]}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x8080) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x804, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r4}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.759007113s ago: executing program 4 (id=7): r0 = socket$netlink(0x10, 0x3, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) timer_delete(0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000400)={0x18, 0x0, {0x2, @local, 'bond_slave_1\x00'}}, 0x1e) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x3fffffffc, 0x4}, 0x11111a, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x1d) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000240)='/dev/ppp\x00', &(0x7f0000000280)='\xaa\xaa\xaa\xaa\xaa', 0x0) socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000300)={0x18, 0x0, {0x2, @broadcast, 'wlan0\x00'}}, 0x1e) r2 = timerfd_create(0x3, 0x80000) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r2, 0x2, &(0x7f0000000200)={{r3, r4+60000000}, {0x0, 0x989680}}, &(0x7f00000002c0)) r5 = fsopen(&(0x7f00000001c0)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) r6 = fsmount(r5, 0x1, 0x0) fchdir(r6) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x3, &(0x7f0000001680)=ANY=[@ANYBLOB="1800000000030000000000000000000095"], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00', r7}, 0x18) unlink(&(0x7f0000000440)='./file0\x00') r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, 0x0, 0x0) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) unshare(0x2c020400) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000900)={0x0, 0xb6}) r10 = socket(0x10, 0x3, 0x0) connect$pppl2tp(r10, 0x0, 0x0) ioctl$PPPIOCATTCHAN(r9, 0x40047438, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0, 0xfb61cb0106df6c98}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x411, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) 2.749823971s ago: executing program 1 (id=8): socket$packet(0x11, 0x3, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x2004de, &(0x7f0000000100), 0x3, 0x451, &(0x7f0000000f80)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x4c142, 0x12) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x4c142, 0x0) truncate(&(0x7f0000000940)='./file1\x00', 0x2fffffd) sendfile(r3, r3, 0x0, 0xe3aa6ea) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) sendfile(r2, r2, 0x0, 0xe3aa6ea) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 2.529168997s ago: executing program 3 (id=9): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) prlimit64(0x0, 0xe, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000080)="09000000e700140000007e7bfbf788a83baa9900d6f18f8e950088a800008100", 0x20, 0x24040011, &(0x7f0000000300)={0x11, 0x8100, r3, 0x1, 0x8, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}}, 0x14) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000680)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000200)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000240)={r5, 0x1, r0, 0x6}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000280)={r5, 0x0, 0x5}) fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xc, 0x43, 0x40, 0xc0, 0x1}, 0x50) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000040)=0x10000000009, 0x8, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x24004045) munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) r6 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f00000001c0)={0x1, 0x8, &(0x7f00000024c0)="739c17c2c2cc029e"}) prctl$PR_MCE_KILL(0x4e, 0x1, 0x1000000) 2.427421126s ago: executing program 2 (id=10): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)) prlimit64(0x0, 0xe, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000040)=0x56c, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000080)="09000000e700140000007e7bfbf788a83baa9900d6f18f8e950088a800008100", 0x20, 0x24040011, &(0x7f0000000300)={0x11, 0x8100, r3, 0x1, 0x8, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}}, 0x14) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000680)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000200)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000240)={r5, 0x1, r0, 0x6}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000280)={r5, 0x0, 0x5}) fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xc, 0x43, 0x40, 0xc0, 0x1}, 0x50) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000040)=0x10000000009, 0x8, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x24004045) munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) r6 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f00000001c0)={0x1, 0x8, &(0x7f00000024c0)="739c17c2c2cc029e"}) prctl$PR_MCE_KILL(0x4e, 0x1, 0x1000000) 1.178193966s ago: executing program 1 (id=11): r0 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000440000004400000009000000000000000000000905000000070000000000001201000000000000000100000d010000000000000002000000000000000000000d000000000000000000000002000000000030005f3000005f"], 0x0, 0x65, 0x0, 0x0, 0x1}, 0x28) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0xf3a, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000002f80)={0x0, 0x0, &(0x7f0000002f40)={&(0x7f0000002fc0)=@newtaction={0x44, 0x30, 0x1, 0x70bd2d, 0x0, {}, [{0x30, 0x1, [@m_bpf={0x2c, 0x2, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040000}, 0x40) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./bus\x00', 0x1400c, &(0x7f0000000840)={[{@sysvgroups}, {@init_itable}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}]}, 0x3, 0x457, &(0x7f0000000bc0)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x143142, 0x40) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x14000) pwritev2(r4, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000240), 0x3af4701e) timer_settime(r1, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 1.00011713s ago: executing program 4 (id=12): r0 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1000) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) ioctl$SIOCPNADDRESOURCE(r2, 0x89e0, &(0x7f0000000100)=0x100) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000c, 0x110, r0, 0x207c7000) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newqdisc={0x3c, 0x24, 0x3fe3aa0262d8c583, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xf}, {0xffff, 0xffff}, {0x6}}, [@qdisc_kind_options=@q_fq_pie={{0xb}, {0xc, 0x8002, [@TCA_FQ_PIE_BETA={0x8, 0x6, 0x5}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2}, 0x2000400c) r4 = openat$cgroup_subtree(r1, &(0x7f0000000100), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[], 0x5) 759.781482ms ago: executing program 3 (id=13): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe000000}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r2}, {}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x14}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d80)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="76ea090000000000009ba56a88ca", 0x0, 0x5, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r1) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r4) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80800, 0x0) close(r6) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x40, 0x7, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x89f9b000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) setresgid(0x0, 0x0, 0xee00) r7 = socket$unix(0x1, 0x1, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x70bd27, 0x80, {0x0, 0x0, 0x0, r9, {0x0, 0xb}, {0xffff, 0xffff}, {0x0, 0xe}}, [@TCA_RATE={0x6, 0x5, {0x3, 0x3}}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc00c001}, 0x20000804) sendmsg$nl_route_sched(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70b923, 0x80000, {0x0, 0x0, 0x0, r9, {0x0, 0xffe0}, {0x2, 0xb}, {0xd, 0xd}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x34}, 0x1, 0x0, 0x0, 0x24000050}, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 379.385176ms ago: executing program 4 (id=14): r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000002180)={@loopback={0xfec0ffff00000000}, @local, @mcast1, 0x9, 0x0, 0x0, 0x0, 0x780000000, 0x272001b}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x7, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004080}, 0x8050) symlink(&(0x7f0000000240)='./file1/../file0\x00', &(0x7f0000000140)='./file0\x00') lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000002700)={{}, {0x1, 0x3}, [], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x1}}, 0x24, 0x3) r2 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_MFC_PROXY(r2, 0x0, 0xd3, &(0x7f0000000000)={@remote, @remote, 0xffffffffffffffff, "f2f66908b0004ada4a9ecdff0e27d50e7d930a478a4f5ea9aac1936014813add", 0x2, 0xffffff21, 0x5, 0x2}, 0x3c) 306.790722ms ago: executing program 4 (id=15): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) prlimit64(0x0, 0xe, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000040)=0x56c, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) sendto$packet(r1, &(0x7f0000000080)="09000000e700140000007e7bfbf788a83baa9900d6f18f8e950088a800008100", 0x20, 0x24040011, &(0x7f0000000300)={0x11, 0x8100, 0x0, 0x1, 0x8, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}}, 0x14) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000680)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000200)={r3}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000240)={r4, 0x1, r0, 0x6}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000280)={r4, 0x0, 0x5}) fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xc, 0x43, 0x40, 0xc0, 0x1}, 0x50) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000040)=0x10000000009, 0x8, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x24004045) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f00000001c0)={0x1, 0x8, &(0x7f00000024c0)="739c17c2c2cc029e"}) prctl$PR_MCE_KILL(0x4e, 0x1, 0x1000000) 233.579337ms ago: executing program 1 (id=16): r0 = socket$inet6(0xa, 0x80003, 0x6) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) read$hidraw(r1, 0x0, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) close_range(r2, 0xffffffffffffffff, 0x2) r3 = getpgid(0x0) r4 = syz_pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x11, 0x0, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@broadcast, @in6=@rand_addr=' \x01\x00', 0x0, 0x0, 0xfffc, 0x0, 0xa}, {0x0, 0x0, 0x4, 0x0, 0x1}, {0x0, 0x4, 0x0, 0xa78b}, 0xfffffffe, 0x6e6bb9, 0x1}, {{@in=@private, 0x0, 0x33}, 0x0, @in=@rand_addr=0x64010101, 0x0, 0x1, 0x1, 0x7, 0x0, 0x0, 0x2}}, 0xe8) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="240000000104010200000180000000000000000008000540000000000500010001"], 0x24}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="240000000104050000000000000100000a00000005000100020000000600064000050000b21269fceb82daab0ec5e542c926c9ba"], 0x24}, 0x1, 0x0, 0x0, 0x40ebe4ec9ca5cb72}, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x8006, 0x6}, 0x0, 0x10001, 0xda, 0x5, 0xa, 0x20005, 0xa, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x2200008, &(0x7f0000000280)={[{@stripe={'stripe', 0x3d, 0x9}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x200000}}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@norecovery}]}, 0x3, 0x586, &(0x7f00000003c0)="$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") setxattr$security_ima(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000200), &(0x7f0000000000)=ANY=[], 0x700, 0x0) rename(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180)='./file1\x00') sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 0s ago: executing program 2 (id=17): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de2500000000", 0x3c}, {&(0x7f0000000e80)="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", 0x119}, {&(0x7f00000003c0)="641a6a2b863c0dd898013a3f97a834ebb75a925ab48c844221841a232932fc2e37e327de21450df098c113e179a0d3", 0x2f}, {&(0x7f00000001c0)}], 0x4}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000b80)="f77d2b5dd5f7d74f0748cf3d2cf218d644566a14103b1c7dd35fd2951bd022f10f2dc7f4ce0d8ac5f4abaca4b97b706153756913b7dd48248b5bfb10460019248bf238743fa2aeb5bef21ce832db670920dc5e911ef2ad63e849901d1001129dbacbfd4924d7545517fd18b5d29978f32a5b5c81755cb89cc0490958ba3211eb99df5cdbbc0f9c941aaa1495893dada02d8188acd26b5afd7476413f322c8f79de769debb56343f3eded2dca93ed6641e50fe595e1e0dbe84ed0f70abb4ed2dfb6648df7dbbd18fa5533a6b0acc138c81a8acbcb2fb79a7d7857d41bca238e0548c5e955d74bbb106fe965274cbb3a29b895df0b4e028b6d65c115b81328e0b660253f1c9a359dde67917fa232e2f566483ddbb93ff9b103c1cac356c9f0f6ab5fe77ea4610f71ec6dc988fddf29b8d0b6aaa82752580b62b5f51800d10077f07319b6ffeff06e4dea184fd7a0a0f4d441763e30d1bc475502a1de1ffbc0e30cb1", 0x161}, {&(0x7f0000000d00)="31cef842d9c50636f60fc0cfdac56c75f1687f0c56287423f5eed69f117e766bdbad0c2171ad6227e1173ab6efa2fcb1c420a51a0917861009000000f049c606ccab7cda1f0e3490fbe385ea382294882839a22674037b8910bd8a1420e33eb1be6f10cfb24eb7cccdf1528ef33b34ab07cdb0909a9ba9547e1e343b451d9025c4e153612d4674b9411fb4de295599abbcb388d291aa839a", 0x98}, {&(0x7f0000001300)="e0cda6472d1ccfb4d1d46bf348a3b7ff9e5b6b3e30ef2266c86a085e37271763c50968fe2e2eb13b9472381bade936f9a85e26aac6ebd21115f086751d870434cf07dbd92e0ea2322f163473dad24cffe6d23ffa95b04a2653e8a7c9ab042ea1b0bf4bde850bc9f6147f1a48e86eec8223fd33fc83374393fbd08a3281a268aff6688fb41eecbdd328ef0fcbe09cd9e34c6b9d641ba6fb677edede912815299a3313b02b4af73d57a5d0", 0xaa}], 0x3}}], 0x2, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 18.907220][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 18.907245][ T28] audit: type=1400 audit(1772380531.813:57): avc: denied { transition } for pid=3189 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.913641][ T28] audit: type=1400 audit(1772380531.813:58): avc: denied { noatsecure } for pid=3189 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.916966][ T28] audit: type=1400 audit(1772380531.823:59): avc: denied { write } for pid=3189 comm="sh" path="pipe:[1498]" dev="pipefs" ino=1498 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 18.920713][ T28] audit: type=1400 audit(1772380531.823:60): avc: denied { rlimitinh } for pid=3189 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.924327][ T28] audit: type=1400 audit(1772380531.823:61): avc: denied { siginh } for pid=3189 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.690342][ T28] audit: type=1400 audit(1772380533.603:62): avc: denied { search } for pid=3195 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.712862][ T28] audit: type=1400 audit(1772380533.603:63): avc: denied { search } for pid=3195 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.736836][ T28] audit: type=1400 audit(1772380533.603:64): avc: denied { search } for pid=3195 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.759914][ T28] audit: type=1400 audit(1772380533.603:65): avc: denied { search } for pid=3195 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.782993][ T28] audit: type=1400 audit(1772380533.603:66): avc: denied { read open } for pid=3196 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.216' (ED25519) to the list of known hosts. [ 27.450964][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 27.450980][ T28] audit: type=1400 audit(1772380540.363:70): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.480558][ T28] audit: type=1400 audit(1772380540.393:71): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.481278][ T3302] cgroup: Unknown subsys name 'net' [ 27.508595][ T28] audit: type=1400 audit(1772380540.423:72): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.668341][ T3302] cgroup: Unknown subsys name 'cpuset' [ 27.674634][ T3302] cgroup: Unknown subsys name 'rlimit' [ 27.794564][ T28] audit: type=1400 audit(1772380540.703:73): avc: denied { setattr } for pid=3302 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 27.828996][ T28] audit: type=1400 audit(1772380540.703:74): avc: denied { create } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.838785][ T3304] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 27.849691][ T28] audit: type=1400 audit(1772380540.703:75): avc: denied { write } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 27.879066][ T28] audit: type=1400 audit(1772380540.703:76): avc: denied { read } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.894122][ T3302] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.899646][ T28] audit: type=1400 audit(1772380540.703:77): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.899671][ T28] audit: type=1400 audit(1772380540.703:78): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 27.899698][ T28] audit: type=1400 audit(1772380540.733:79): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 30.010392][ T3324] chnl_net:caif_netlink_parms(): no params data found [ 30.097849][ T3324] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.105198][ T3324] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.113434][ T3324] bridge_slave_0: entered allmulticast mode [ 30.120398][ T3324] bridge_slave_0: entered promiscuous mode [ 30.127394][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 30.138589][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 30.147928][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 30.166293][ T3324] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.174014][ T3324] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.181370][ T3324] bridge_slave_1: entered allmulticast mode [ 30.188034][ T3324] bridge_slave_1: entered promiscuous mode [ 30.237915][ T3324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.251246][ T3317] chnl_net:caif_netlink_parms(): no params data found [ 30.262972][ T3324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.311353][ T3324] team0: Port device team_slave_0 added [ 30.321017][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.328258][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.335463][ T3314] bridge_slave_0: entered allmulticast mode [ 30.342227][ T3314] bridge_slave_0: entered promiscuous mode [ 30.353201][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.360472][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.367679][ T3314] bridge_slave_1: entered allmulticast mode [ 30.374245][ T3314] bridge_slave_1: entered promiscuous mode [ 30.381407][ T3324] team0: Port device team_slave_1 added [ 30.410709][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.418305][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.425685][ T3313] bridge_slave_0: entered allmulticast mode [ 30.432223][ T3313] bridge_slave_0: entered promiscuous mode [ 30.441862][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.449235][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.456437][ T3320] bridge_slave_0: entered allmulticast mode [ 30.463074][ T3320] bridge_slave_0: entered promiscuous mode [ 30.473798][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.480993][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.488291][ T3320] bridge_slave_1: entered allmulticast mode [ 30.494812][ T3320] bridge_slave_1: entered promiscuous mode [ 30.502435][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.511910][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.519050][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.526260][ T3313] bridge_slave_1: entered allmulticast mode [ 30.533000][ T3313] bridge_slave_1: entered promiscuous mode [ 30.542349][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.549392][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.575911][ T3324] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.587072][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.594126][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.620607][ T3324] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.636990][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.677744][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.692564][ T3314] team0: Port device team_slave_0 added [ 30.700149][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.710736][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.720022][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.727328][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.734789][ T3317] bridge_slave_0: entered allmulticast mode [ 30.741351][ T3317] bridge_slave_0: entered promiscuous mode [ 30.748505][ T3314] team0: Port device team_slave_1 added [ 30.759675][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.777842][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.785189][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.792373][ T3317] bridge_slave_1: entered allmulticast mode [ 30.799165][ T3317] bridge_slave_1: entered promiscuous mode [ 30.823864][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.831134][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.857157][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.868658][ T3313] team0: Port device team_slave_0 added [ 30.880754][ T3324] hsr_slave_0: entered promiscuous mode [ 30.887000][ T3324] hsr_slave_1: entered promiscuous mode [ 30.897799][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.905002][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.931145][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.942719][ T3313] team0: Port device team_slave_1 added [ 30.958558][ T3320] team0: Port device team_slave_0 added [ 30.968757][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.986800][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.994068][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.020267][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.032452][ T3320] team0: Port device team_slave_1 added [ 31.048627][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.055781][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.082545][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.094469][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.112408][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.119756][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.146270][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.170899][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.177888][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.204338][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.242276][ T3313] hsr_slave_0: entered promiscuous mode [ 31.248444][ T3313] hsr_slave_1: entered promiscuous mode [ 31.254476][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 31.260416][ T3313] Cannot create hsr debugfs directory [ 31.268359][ T3314] hsr_slave_0: entered promiscuous mode [ 31.274607][ T3314] hsr_slave_1: entered promiscuous mode [ 31.280456][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 31.286173][ T3314] Cannot create hsr debugfs directory [ 31.301614][ T3317] team0: Port device team_slave_0 added [ 31.314613][ T3317] team0: Port device team_slave_1 added [ 31.368620][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.376304][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.403118][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.421244][ T3320] hsr_slave_0: entered promiscuous mode [ 31.427462][ T3320] hsr_slave_1: entered promiscuous mode [ 31.433552][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 31.439346][ T3320] Cannot create hsr debugfs directory [ 31.450489][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.457570][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 31.483666][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.572955][ T3317] hsr_slave_0: entered promiscuous mode [ 31.579056][ T3317] hsr_slave_1: entered promiscuous mode [ 31.585111][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 31.590883][ T3317] Cannot create hsr debugfs directory [ 31.620460][ T3324] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 31.642312][ T3324] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 31.660898][ T3324] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 31.679582][ T3324] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 31.710127][ T3313] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 31.730486][ T3313] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 31.753569][ T3313] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 31.767922][ T3313] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 31.783984][ T3314] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 31.798032][ T3314] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 31.806998][ T3314] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 31.815736][ T3314] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 31.857313][ T3320] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 31.866649][ T3320] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 31.875878][ T3320] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 31.895227][ T3320] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 31.929293][ T3317] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 31.939252][ T3317] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 31.963821][ T3317] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 31.975526][ T3317] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 31.992741][ T3324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.002040][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.019696][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.038844][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.048772][ T3324] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.063299][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.070511][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.085412][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.092505][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.101322][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.108520][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.121210][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.130157][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.137412][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.150834][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.169269][ T2040] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.176376][ T2040] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.185526][ T2040] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.192959][ T2040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.225343][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.245397][ T3324] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.258877][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.270140][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.280356][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.310739][ T56] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.318732][ T56] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.338735][ T56] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.346499][ T56] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.355766][ T56] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.363049][ T56] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.388927][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.396131][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.443856][ T3324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.459091][ T3317] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 32.494264][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.507173][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.590475][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.646549][ T3314] veth0_vlan: entered promiscuous mode [ 32.667161][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.677546][ T3314] veth1_vlan: entered promiscuous mode [ 32.731560][ T3313] veth0_vlan: entered promiscuous mode [ 32.744193][ T3314] veth0_macvtap: entered promiscuous mode [ 32.754524][ T3313] veth1_vlan: entered promiscuous mode [ 32.769055][ T3314] veth1_macvtap: entered promiscuous mode [ 32.784483][ T3324] veth0_vlan: entered promiscuous mode [ 32.796721][ T3324] veth1_vlan: entered promiscuous mode [ 32.804811][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.823363][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.837772][ T3320] veth0_vlan: entered promiscuous mode [ 32.855787][ T2040] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.865300][ T2040] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.881146][ T3313] veth0_macvtap: entered promiscuous mode [ 32.891866][ T2040] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.900851][ T2040] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.912341][ T3324] veth0_macvtap: entered promiscuous mode [ 32.919596][ T3317] veth0_vlan: entered promiscuous mode [ 32.926110][ T3320] veth1_vlan: entered promiscuous mode [ 32.935024][ T3313] veth1_macvtap: entered promiscuous mode [ 32.942102][ T3324] veth1_macvtap: entered promiscuous mode [ 32.956714][ T3317] veth1_vlan: entered promiscuous mode [ 32.958568][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 32.958582][ T28] audit: type=1400 audit(1772380545.873:90): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/root/syzkaller.FUXr7f/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 32.966518][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.981943][ T28] audit: type=1400 audit(1772380545.893:91): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 33.002789][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.023675][ T28] audit: type=1400 audit(1772380545.893:92): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/root/syzkaller.FUXr7f/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 33.063670][ T3320] veth0_macvtap: entered promiscuous mode [ 33.069922][ T28] audit: type=1400 audit(1772380545.893:93): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 33.084551][ T3317] veth0_macvtap: entered promiscuous mode [ 33.098741][ T28] audit: type=1400 audit(1772380545.893:94): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/root/syzkaller.FUXr7f/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 33.127712][ T28] audit: type=1400 audit(1772380545.893:95): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/root/syzkaller.FUXr7f/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 33.138007][ T30] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.156136][ T28] audit: type=1400 audit(1772380545.893:96): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 33.184272][ T30] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.195193][ T28] audit: type=1400 audit(1772380545.953:97): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 33.221033][ T3320] veth1_macvtap: entered promiscuous mode [ 33.227840][ T28] audit: type=1400 audit(1772380545.953:98): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="gadgetfs" ino=3855 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 33.251016][ T3314] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 33.259413][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.274850][ T3317] veth1_macvtap: entered promiscuous mode [ 33.284216][ T30] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.300860][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.309636][ T30] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.328517][ T28] audit: type=1400 audit(1772380546.233:99): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 33.329018][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.374590][ T3482] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.1'. [ 33.410384][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.420838][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.433235][ T30] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.443564][ T30] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.478917][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.486924][ T30] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.524420][ T30] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.525354][ T3489] netlink: 60 bytes leftover after parsing attributes in process `syz.3.4'. [ 33.544865][ C1] hrtimer: interrupt took 70318 ns [ 33.563047][ T3489] netlink: 28 bytes leftover after parsing attributes in process `syz.3.4'. [ 33.579865][ T30] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.598408][ T30] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.628595][ T30] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.643458][ T30] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.679626][ T30] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.726974][ T30] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.806149][ T30] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.850297][ T30] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.426555][ T3490] syz.0.6 (3490) used greatest stack depth: 10312 bytes left [ 34.470294][ T3508] netlink: 'syz.4.7': attribute type 13 has an invalid length. [ 34.653214][ T3506] loop1: detected capacity change from 0 to 512 [ 34.692121][ T3506] ======================================================= [ 34.692121][ T3506] WARNING: The mand mount option has been deprecated and [ 34.692121][ T3506] and is ignored by this kernel. Remove the mand [ 34.692121][ T3506] option from the mount to silence this warning. [ 34.692121][ T3506] ======================================================= [ 34.774048][ T3506] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 34.852344][ T3506] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 35.013034][ T3506] EXT4-fs (loop1): 1 truncate cleaned up [ 35.099631][ T3506] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.104213][ T3514] syz.2.10 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 35.191096][ T3514] CPU: 1 UID: 0 PID: 3514 Comm: syz.2.10 Not tainted syzkaller #0 PREEMPT(full) [ 35.191169][ T3514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 35.191180][ T3514] Call Trace: [ 35.191186][ T3514] [ 35.191193][ T3514] __dump_stack+0x1d/0x30 [ 35.191223][ T3514] dump_stack_lvl+0x95/0xd0 [ 35.191247][ T3514] dump_stack+0x15/0x1b [ 35.191305][ T3514] dump_header+0x80/0x240 [ 35.191327][ T3514] oom_kill_process+0x295/0x350 [ 35.191348][ T3514] out_of_memory+0x97d/0xb80 [ 35.191370][ T3514] try_charge_memcg+0x62e/0xa10 [ 35.191487][ T3514] mem_cgroup_swapin_charge_folio+0x103/0x1f0 [ 35.191526][ T3514] __swap_cache_prepare_and_add+0x386/0x530 [ 35.191576][ T3514] swap_cache_alloc_folio+0xa2/0x120 [ 35.191673][ T3514] swap_cluster_readahead+0x26e/0x3d0 [ 35.191704][ T3514] swapin_readahead+0xde/0x840 [ 35.191789][ T3514] ? _raw_spin_unlock+0x9/0x30 [ 35.191818][ T3514] ? swap_put_entries_cluster+0x385/0x3a0 [ 35.191846][ T3514] ? swap_put_entries_cluster+0x161/0x3a0 [ 35.191914][ T3514] ? __rcu_read_unlock+0x4e/0x70 [ 35.191944][ T3514] ? swap_cache_get_folio+0x26f/0x280 [ 35.192007][ T3514] do_swap_page+0x309/0x2210 [ 35.192096][ T3514] ? css_rstat_updated+0xbb/0x280 [ 35.192119][ T3514] ? __rcu_read_lock+0x36/0x50 [ 35.192142][ T3514] ? pte_offset_map_rw_nolock+0x19e/0x200 [ 35.192182][ T3514] handle_mm_fault+0xb40/0x3020 [ 35.192243][ T3514] ? vma_start_read+0x1c7/0x2c0 [ 35.192272][ T3514] do_user_addr_fault+0x62f/0x1050 [ 35.192315][ T3514] ? fpregs_assert_state_consistent+0xb3/0xe0 [ 35.192344][ T3514] ? arch_exit_to_user_mode_prepare+0x26/0x80 [ 35.192416][ T3514] ? trace_page_fault_user+0x1f/0xe0 [ 35.192444][ T3514] exc_page_fault+0x62/0xa0 [ 35.192470][ T3514] asm_exc_page_fault+0x26/0x30 [ 35.192489][ T3514] RIP: 0033:0x7f84008478c3 [ 35.192530][ T3514] Code: 25 00 03 00 00 e8 9d 50 06 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 53 49 89 ca 64 48 8b 1c 25 10 00 00 00 8b 83 08 03 00 00 <80> 3d ee 4d 29 00 00 75 44 a8 01 75 40 a8 10 75 3c 41 51 4c 8d 9b [ 35.192557][ T3514] RSP: 002b:00007fff0edba330 EFLAGS: 00010246 [ 35.192576][ T3514] RAX: 0000000000000000 RBX: 0000555560479500 RCX: 0000000000000000 [ 35.192591][ T3514] RDX: 00007fff0edba370 RSI: 0000000000000000 RDI: 0000000000000000 [ 35.192604][ T3514] RBP: 00007f8400b07da0 R08: 0000000000000000 R09: 0000000000000000 [ 35.192617][ T3514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000008a08 [ 35.192659][ T3514] R13: 00007f8400b05fac R14: 0000000000008714 R15: 00007fff0edba4a0 [ 35.192700][ T3514] [ 35.192707][ T3514] memory: usage 307200kB, limit 307200kB, failcnt 179 [ 35.463160][ T3508] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.470474][ T3508] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.482192][ T3514] memory+swap: usage 267324kB, limit 9007199254740988kB, failcnt 0 [ 35.517787][ T3514] kmem: usage 194404kB, limit 9007199254740988kB, failcnt 0 [ 35.557719][ T3514] Memory cgroup stats for /syz3: [ 35.558069][ T3514] cache 0 [ 35.610071][ T3514] rss 0 [ 35.612886][ T3514] shmem 0 [ 35.615867][ T3514] mapped_file 0 [ 35.628304][ T3508] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 35.667270][ T3508] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 35.677568][ T3514] dirty 0 [ 35.680620][ T3514] writeback 0 [ 35.683981][ T3514] workingset_refault_anon 23 [ 35.713011][ T3514] workingset_refault_file 348 [ 35.728867][ T3514] swap 167936 [ 35.737570][ T3514] swapcached 184320 [ 35.744392][ T3320] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.752575][ T3514] pgpgin 4807 [ 35.762719][ T3514] pgpgout 4803 [ 35.766116][ T3514] pgfault 4360 [ 35.786941][ T3514] pgmajfault 22 [ 35.791380][ T3514] inactive_anon 8192 [ 35.795374][ T3514] active_anon 8192 [ 35.799499][ T3514] inactive_file 0 [ 35.803154][ T3514] active_file 0 [ 35.806921][ T3514] unevictable 0 [ 35.810724][ T3514] hierarchical_memory_limit 314572800 [ 35.816127][ T3514] hierarchical_memsw_limit 9223372036854771712 [ 35.823138][ T3514] total_cache 0 [ 35.826668][ T3514] total_rss 0 [ 35.832306][ T3514] total_shmem 0 [ 35.836027][ T3514] total_mapped_file 0 [ 35.840285][ T3514] total_dirty 0 [ 35.844020][ T3514] total_writeback 0 [ 35.848071][ T3514] total_workingset_refault_anon 23 [ 35.853265][ T3514] total_workingset_refault_file 348 [ 35.859411][ T73] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.859576][ T3514] total_swap 167936 [ 35.868922][ T73] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.881545][ T3525] loop1: detected capacity change from 0 to 512 [ 35.892494][ T3525] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 35.902751][ T3514] total_swapcached 184320 [ 35.907202][ T3514] total_pgpgin 4807 [ 35.911621][ T3514] total_pgpgout 4803 [ 35.914445][ T3508] syz.4.7 (3508) used greatest stack depth: 10120 bytes left [ 35.930269][ T73] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.939699][ T3525] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz.1.11: bad orphan inode 131083 [ 35.962029][ T3525] loop1: lost filesystem error report for type 5 error -117 [ 35.963545][ T3525] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.963693][ T73] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.977589][ T3514] total_pgfault 4360 [ 35.996542][ T3514] total_pgmajfault 22 [ 36.000721][ T3514] total_inactive_anon 8192 [ 36.005150][ T3514] total_active_anon 8192 [ 36.009749][ T3514] total_inactive_file 0 [ 36.013939][ T3514] total_active_file 0 [ 36.018190][ T3514] total_unevictable 0 [ 36.022234][ T3514] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz3,task_memcg=/syz3,task=syz.3.9,pid=3511,uid=0 [ 36.036814][ T3514] Memory cgroup out of memory: Killed process 3511 (syz.3.9) total-vm:96128kB, anon-rss:1232kB, file-rss:22400kB, shmem-rss:0kB, UID:0 pgtables:132kB oom_score_adj:1000 [ 36.055933][ T3511] syz.3.9 (3511) used greatest stack depth: 9944 bytes left [ 36.167680][ T3317] syz-executor invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 36.200365][ T3317] CPU: 1 UID: 0 PID: 3317 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full) [ 36.200398][ T3317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 36.200411][ T3317] Call Trace: [ 36.200419][ T3317] [ 36.200428][ T3317] __dump_stack+0x1d/0x30 [ 36.200490][ T3317] dump_stack_lvl+0x95/0xd0 [ 36.200516][ T3317] dump_stack+0x15/0x1b [ 36.200539][ T3317] dump_header+0x80/0x240 [ 36.200564][ T3317] oom_kill_process+0x295/0x350 [ 36.200609][ T3317] out_of_memory+0x97d/0xb80 [ 36.200633][ T3317] try_charge_memcg+0x62e/0xa10 [ 36.200770][ T3317] mem_cgroup_swapin_charge_folio+0x103/0x1f0 [ 36.200804][ T3317] __swap_cache_prepare_and_add+0x386/0x530 [ 36.200886][ T3317] swap_cache_alloc_folio+0xa2/0x120 [ 36.200915][ T3317] swap_cluster_readahead+0x26e/0x3d0 [ 36.200946][ T3317] swapin_readahead+0xde/0x840 [ 36.200982][ T3317] ? __rcu_read_unlock+0x4e/0x70 [ 36.201068][ T3317] ? __perf_event_task_sched_in+0xa65/0xad0 [ 36.201091][ T3317] ? __list_add_valid_or_report+0x38/0xe0 [ 36.201134][ T3317] ? __rcu_read_unlock+0x4e/0x70 [ 36.201209][ T3317] ? swap_cache_get_folio+0x26f/0x280 [ 36.201250][ T3317] do_swap_page+0x309/0x2210 [ 36.201280][ T3317] ? __schedule+0x85a/0xd40 [ 36.201371][ T3317] ? __rcu_read_lock+0x36/0x50 [ 36.201392][ T3317] ? pte_offset_map_rw_nolock+0x19e/0x200 [ 36.201421][ T3317] handle_mm_fault+0xb40/0x3020 [ 36.201508][ T3317] ? vma_start_read+0x1c7/0x2c0 [ 36.201537][ T3317] do_user_addr_fault+0x62f/0x1050 [ 36.201571][ T3317] ? trace_page_fault_user+0x1f/0xe0 [ 36.201632][ T3317] exc_page_fault+0x62/0xa0 [ 36.201662][ T3317] asm_exc_page_fault+0x26/0x30 [ 36.201684][ T3317] RIP: 0033:0x7f8400847917 [ 36.201703][ T3317] Code: 48 89 fa 4c 89 df e8 a8 56 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff [ 36.201722][ T3317] RSP: 002b:00007fff0edba530 EFLAGS: 00010202 [ 36.201745][ T3317] RAX: 0000000000000000 RBX: 0000555560479500 RCX: 00007f8400847917 [ 36.201761][ T3317] RDX: 00007fff0edba570 RSI: 0000000000000000 RDI: 0000000000000000 [ 36.201801][ T3317] RBP: 00007fff0edba5dc R08: 0000000000000000 R09: 0000000000000000 [ 36.201815][ T3317] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000001388 [ 36.201830][ T3317] R13: 00000000000927c0 R14: 00000000000086e2 R15: 00007fff0edba630 [ 36.201880][ T3317] [ 36.201889][ T3317] memory: usage 307200kB, limit 307200kB, failcnt 603 [ 36.293889][ T3534] tipc: Enabling of bearer rejected, failed to enable media [ 36.298590][ T3317] memory+swap: usage 307376kB, limit 9007199254740988kB, failcnt 0 [ 36.471332][ T3317] kmem: usage 307200kB, limit 9007199254740988kB, failcnt 0 [ 36.479043][ T3317] Memory cgroup stats for /syz2: [ 36.479301][ T3317] cache 0 [ 36.488098][ T3317] rss 0 [ 36.490959][ T3317] shmem 0 [ 36.493993][ T3317] mapped_file 0 [ 36.497756][ T3317] dirty 0 [ 36.500797][ T3317] writeback 0 [ 36.504524][ T3317] workingset_refault_anon 51 [ 36.509621][ T3317] workingset_refault_file 262 [ 36.534235][ T3317] swap 180224 [ 36.554319][ T3317] swapcached 180224 [ 36.560107][ T3317] pgpgin 677 [ 36.563504][ T3317] pgpgout 677 [ 36.567004][ T3317] pgfault 315 [ 36.570811][ T3317] pgmajfault 39 [ 36.574527][ T3317] inactive_anon 0 [ 36.578928][ T3317] active_anon 0 [ 36.583675][ T3317] inactive_file 0 [ 36.587939][ T3317] active_file 0 [ 36.591588][ T3317] unevictable 0 [ 36.595188][ T3317] hierarchical_memory_limit 314572800 [ 36.600936][ T3317] hierarchical_memsw_limit 9223372036854771712 [ 36.607254][ T3317] total_cache 0 [ 36.610955][ T3317] total_rss 0 [ 36.645280][ T3317] total_shmem 0 [ 36.658245][ T3317] total_mapped_file 0 [ 36.664997][ T3317] total_dirty 0 [ 36.668646][ T3320] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.668800][ T3317] total_writeback 0 [ 36.682044][ T3317] total_workingset_refault_anon 51 [ 36.687243][ T3317] total_workingset_refault_file 262 [ 36.693598][ T3317] total_swap 180224 [ 36.697470][ T3317] total_swapcached 180224 [ 36.720844][ T3317] total_pgpgin 677 [ 36.724776][ T3317] total_pgpgout 677 [ 36.728996][ T3317] total_pgfault 315 [ 36.733134][ T3317] total_pgmajfault 39 [ 36.737695][ T3317] total_inactive_anon 0 [ 36.742081][ T3317] total_active_anon 0 [ 36.750731][ T3317] total_inactive_file 0 [ 36.755026][ T3317] total_active_file 0 [ 36.759813][ T3317] total_unevictable 0 [ 36.764186][ T3317] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/ [ 36.764480][ T3543] loop1: detected capacity change from 0 to 1024 [ 36.764536][ T3317] ,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.10,pid=3514,uid=0 [ 36.788852][ T3317] Memory cgroup out of memory: Killed process 3514 (syz.2.10) total-vm:95996kB, anon-rss:1228kB, file-rss:22400kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 36.793452][ T3543] EXT4-fs: Ignoring removed orlov option [ 36.851676][ T3543] EXT4-fs (loop1): stripe (9) is not aligned with cluster size (16), stripe is disabled [ 36.852943][ T3516] syz.2.10 (3516) used greatest stack depth: 9520 bytes left [ 36.934914][ T3543] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 37.007646][ T3544] ================================================================== [ 37.015871][ T3544] BUG: KCSAN: data-race in mem_cgroup_flush_stats_ratelimited / tick_do_update_jiffies64 [ 37.025981][ T3544] [ 37.028321][ T3544] read-write to 0xffffffff86c09a00 of 8 bytes by interrupt on cpu 0: [ 37.036485][ T3544] tick_do_update_jiffies64+0x113/0x1c0 [ 37.042136][ T3544] tick_nohz_handler+0x8d/0x3d0 [ 37.047031][ T3544] __hrtimer_run_queues+0x218/0x4f0 [ 37.052351][ T3544] hrtimer_interrupt+0x269/0x810 [ 37.057309][ T3544] __sysvec_apic_timer_interrupt+0x5f/0x1f0 [ 37.063339][ T3544] sysvec_apic_timer_interrupt+0x32/0x80 [ 37.069163][ T3544] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 37.075240][ T3544] [ 37.077582][ T3544] read to 0xffffffff86c09a00 of 8 bytes by task 3544 on cpu 1: [ 37.085236][ T3544] mem_cgroup_flush_stats_ratelimited+0x29/0x70 [ 37.091677][ T3544] count_shadow_nodes+0x6a/0x230 [ 37.096636][ T3544] do_shrink_slab+0x63/0x6a0 [ 37.101377][ T3544] shrink_slab+0x538/0x880 [ 37.105796][ T3544] shrink_node+0x6bc/0x2130 [ 37.110396][ T3544] do_try_to_free_pages+0x408/0xc80 [ 37.115957][ T3544] try_to_free_mem_cgroup_pages+0x1f5/0x470 [ 37.121919][ T3544] try_charge_memcg+0x37e/0xa10 [ 37.126931][ T3544] obj_cgroup_charge_pages+0x23/0xc0 [ 37.132232][ T3544] __memcg_kmem_charge_page+0x9e/0x170 [ 37.137787][ T3544] __alloc_frozen_pages_noprof+0x18a/0x360 [ 37.143607][ T3544] alloc_pages_mpol+0xb3/0x260 [ 37.148393][ T3544] alloc_pages_noprof+0x8f/0x130 [ 37.153360][ T3544] __vmalloc_node_range_noprof+0xa46/0x12b0 [ 37.159281][ T3544] __kvmalloc_node_noprof+0x3d4/0x650 [ 37.164926][ T3544] futex_hash_allocate+0x190/0x9d0 [ 37.170051][ T3544] futex_hash_prctl+0xd8/0xf0 [ 37.174769][ T3544] __se_sys_prctl+0xa3d/0x13f0 [ 37.179715][ T3544] __x64_sys_prctl+0x67/0x80 [ 37.184317][ T3544] x64_sys_call+0x2533/0x3020 [ 37.189093][ T3544] do_syscall_64+0x12c/0x370 [ 37.193687][ T3544] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.199617][ T3544] [ 37.202028][ T3544] value changed: 0x00000000ffff990d -> 0x00000000ffff990e [ 37.209131][ T3544] [ 37.211541][ T3544] Reported by Kernel Concurrency Sanitizer on: [ 37.217810][ T3544] CPU: 1 UID: 0 PID: 3544 Comm: syz.4.15 Not tainted syzkaller #0 PREEMPT(full) [ 37.227365][ T3544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 37.237746][ T3544] ================================================================== [ 37.306507][ T3324] syz-executor invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 37.364248][ T3324] CPU: 0 UID: 0 PID: 3324 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full) [ 37.364282][ T3324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 37.364296][ T3324] Call Trace: [ 37.364304][ T3324] [ 37.364313][ T3324] __dump_stack+0x1d/0x30 [ 37.364354][ T3324] dump_stack_lvl+0x95/0xd0 [ 37.364377][ T3324] dump_stack+0x15/0x1b [ 37.364417][ T3324] dump_header+0x80/0x240 [ 37.364443][ T3324] oom_kill_process+0x295/0x350 [ 37.364467][ T3324] out_of_memory+0x97d/0xb80 [ 37.364487][ T3324] try_charge_memcg+0x62e/0xa10 [ 37.364567][ T3324] __mem_cgroup_charge+0x65/0x150 [ 37.364602][ T3324] filemap_add_folio+0x110/0x350 [ 37.364625][ T3324] __filemap_get_folio_mpol+0x326/0x680 [ 37.364647][ T3324] filemap_fault+0x486/0xb90 [ 37.364716][ T3324] __do_fault+0xbc/0x200 [ 37.364733][ T3324] handle_mm_fault+0x11d7/0x3020 [ 37.364766][ T3324] ? vma_start_read+0x1c7/0x2c0 [ 37.364797][ T3324] do_user_addr_fault+0x62f/0x1050 [ 37.364863][ T3324] ? trace_page_fault_user+0x1f/0xe0 [ 37.364946][ T3324] exc_page_fault+0x62/0xa0 [ 37.364979][ T3324] asm_exc_page_fault+0x26/0x30 [ 37.365003][ T3324] RIP: 0033:0x7f1ad502a7b4 [ 37.365073][ T3324] Code: 85 62 0a 00 00 48 b8 db 34 b6 d7 82 de 1b 43 48 f7 a4 24 98 00 00 00 48 8b 05 00 b0 ed 00 48 69 8c 24 90 00 00 00 e8 03 00 00 <8b> 78 08 48 8b 44 24 18 48 c1 ea 12 4c 8b 0d f9 ae ed 00 48 01 d1 [ 37.365089][ T3324] RSP: 002b:00007ffdfb796060 EFLAGS: 00010206 [ 37.365106][ T3324] RAX: 0000001b33c24000 RBX: 000000000000000d RCX: 0000000000009088 [ 37.365122][ T3324] RDX: 0000000004282d75 RSI: 00007ffdfb7960f0 RDI: 0000000000000001 [ 37.365138][ T3324] RBP: 00007ffdfb79609c R08: 000000000fdb83ea R09: 7fffffffffffffff [ 37.365202][ T3324] R10: 3fffffffffffffff R11: 0000000000000202 R12: 0000000000001388 [ 37.365215][ T3324] R13: 00000000000927c0 R14: 0000000000008fe8 R15: 00007ffdfb7960f0 [ 37.365232][ T3324] [ 37.793207][ T3320] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.817631][ T3324] memory: usage 268068kB, limit 307200kB, failcnt 72 [ 37.824969][ T3324] memory+swap: usage 268124kB, limit 9007199254740988kB, failcnt 0 [ 37.849879][ T3324] kmem: usage 284968kB, limit 9007199254740988kB, failcnt 0 [ 37.857381][ T3324] Memory cgroup stats for /syz4: [ 37.867731][ T3324] cache 1048576 [ 37.877672][ T3324] rss 102400 [ 37.880985][ T3324] shmem 0 [ 37.884423][ T3324] mapped_file 49152 [ 37.918205][ T3324] dirty 32768 [ 37.921636][ T3324] writeback 0 [ 37.925272][ T3324] workingset_refault_anon 26 [ 37.947548][ T3324] workingset_refault_file 508 [ 37.952472][ T3324] swap 57344 [ 37.955796][ T3324] swapcached 192512 [ 37.967598][ T3324] pgpgin 6732 [ 37.970979][ T3324] pgpgout 6443 [ 37.974350][ T3324] pgfault 6337 [ 37.988338][ T3324] pgmajfault 21 [ 37.991823][ T3324] inactive_anon 36864 [ 37.995899][ T3324] active_anon 98304 [ 38.017566][ T3324] inactive_file 0 [ 38.021240][ T3324] active_file 1048576 [ 38.025226][ T3324] unevictable 0 [ 38.037549][ T3324] hierarchical_memory_limit 314572800 [ 38.043126][ T3324] hierarchical_memsw_limit 9223372036854771712 [ 38.057541][ T3324] total_cache 1048576 [ 38.061625][ T3324] total_rss 102400 [ 38.065357][ T3324] total_shmem 0 [ 38.087556][ T3324] total_mapped_file 49152 [ 38.092213][ T3324] total_dirty 32768 [ 38.096038][ T3324] total_writeback 0 [ 38.104271][ T3324] total_workingset_refault_anon 26 [ 38.110065][ T3324] total_workingset_refault_file 508 [ 38.115459][ T3324] total_swap 57344 [ 38.119221][ T3324] total_swapcached 192512 [ 38.123584][ T3324] total_pgpgin 6732 [ 38.127423][ T3324] total_pgpgout 6443 [ 38.131381][ T3324] total_pgfault 6337 [ 38.135309][ T3324] total_pgmajfault 21 [ 38.139498][ T3324] total_inactive_anon 36864 [ 38.144010][ T3324] total_active_anon 98304 [ 38.148733][ T3324] total_inactive_file 0 [ 38.153273][ T3324] total_active_file 1048576 [ 38.157923][ T3324] total_unevictable 0 [ 38.162382][ T3324] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz4,task_memcg=/syz4,task=syz.4.15,pid=3540,uid=0 [ 38.177401][ T3324] Memory cgroup out of memory: OOM victim 3540 (syz.4.15) is already exiting. Skip killing the task