last executing test programs: 2.692402313s ago: executing program 3 (id=4): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) creat(0x0, 0xecf86c37d53049cc) msgrcv(0x0, 0x0, 0x0, 0x1, 0x0) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x88, 0x24, 0xd0f, 0x70bd30, 0x0, {0x60, 0x0, 0x0, r3, {0x0, 0xd}, {0xfff1, 0xffff}, {0x0, 0xfff2}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x3, [0x6, 0xf, 0xb, 0x3, 0x3, 0xa, 0x6, 0xd, 0x5, 0xe, 0x4, 0xa, 0xe, 0xb, 0x3], 0x1, [0x800, 0x0, 0x6, 0x7, 0x1, 0xc, 0x8000, 0x2, 0x81, 0x7, 0x3, 0x6, 0x4, 0xf943, 0x3f, 0x5], [0x4, 0x8, 0x7fff, 0xd, 0x9, 0xff, 0x4, 0x5, 0x7, 0x5, 0x8, 0xf, 0x8, 0x1, 0xa, 0x2]}}}}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0) msgsnd(0x0, &(0x7f0000002880)={0x1}, 0x8, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x3, "e09b985a4492a397a32567a028d1eb63b2f316c5631d8d82fc309378aa35880f1fd5b2aa62eb65dcccefc08c7576515b77e2ecaab8a74f04cbd6a21c204988937a8302b404bb"}, 0x4e, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xc, 0x3, 0x7ff, 0x2, 0x1, 0xffffffffffffffff, 0xb924, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4}, 0x50) 2.480530477s ago: executing program 1 (id=2): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r2, 0x6, 0x9, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000006c0)={0x9, {{0xa, 0x4e20, 0xfffffffa, @mcast1, 0x3ff}}, 0x0, 0x6, [{{0xa, 0x4e22, 0xb, @remote, 0x200}}, {{0xa, 0x4e22, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}, {{0xa, 0x4e24, 0xfffffffd, @private0, 0xeb}}, {{0xa, 0x4e20, 0x80000000, @local, 0x2}}, {{0xa, 0x4e23, 0x3ec, @private0, 0x9}}, {{0xa, 0x4e22, 0x44, @ipv4={'\x00', '\xff\xff', @local}}}]}, 0x390) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'ipvlan1\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=@delqdisc={0x24, 0x26, 0x1f, 0x60bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}, {0xf, 0xa}}}, 0x24}, 0x1, 0x0, 0x0, 0x4081}, 0x2400c800) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000380)={{0x14, 0x10, 0x1, 0x0, 0x2000000, {0x7}}, [@NFT_MSG_NEWSET={0x4c, 0x9, 0xa, 0x43f, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x11c}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x74}, 0x1, 0x0, 0x0, 0x4000850}, 0x0) close(0x3) r5 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0xffffffff}, 0x1c) socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x33, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x11, 0x0, @opaque="7e666d37baa90e69fe"}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000008095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffe01}, 0x94) setsockopt$inet6_udp_encap(r5, 0x11, 0x64, &(0x7f00000000c0)=0x2, 0x4) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7}, 0x94) r7 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r7, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x5, 0xb68, 0x300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x7, 0x4, 0x7ffc0001}]}) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x100}, 0x204, 0x0, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0xfffc) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="120000001b0000000800000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r10, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000280)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r11, &(0x7f0000000400), 0x0}, 0x20) 2.384446997s ago: executing program 4 (id=5): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x244}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000640)={0x1, &(0x7f0000000040)=[{0x6, 0x4, 0x8f, 0x7fff0000}]}) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80042103, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) unshare(0x62040200) socket$l2tp6(0xa, 0x2, 0x73) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc097, 0x2, @perf_config_ext={0x288}, 0xa216, 0x6, 0x11000, 0x4, 0x9484, 0x2001, 0x400, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x3) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000300)={[{@minixdf}, {@quota}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@dioread_lock}, {@noblock_validity}, {@nobh}, {@nodelalloc}, {@noblock_validity}, {@nomblk_io_submit}]}, 0x1, 0x566, &(0x7f00000015c0)="$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") r4 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, r4, 0x0) r5 = getpid() process_vm_readv(r5, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x36}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{0x0}], 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="300000001800090000000000000000001c140000fe00000100000000"], 0x30}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='westwood', 0x8) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, &(0x7f00000000c0)) 1.096618758s ago: executing program 0 (id=1): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}, 0x102260, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000300)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@jqfmt_vfsold}, {@minixdf}, {@quota}]}, 0x3, 0x442, &(0x7f0000001180)="$eJzs3M1vG0UbAPBn7aR9+5m8VfloWiBQEBEfSZOW0gMXEEgcQEKCQzmGJK1C3QY1RqJVBAGhckSVuCOOSPwFnOCCgBMSV7ijShXKpYWT0drexHbsNHGdLNS/n7TtzO44M493x57ZySaAvjWa/pNE7I+I3yJiqJZtLjBa++/2ytLMXytLM0lUKm/+mVTL3VpZmsmKZq/bl2UGIgqfJnG0Tb2LV65emC6V5i7X8xPli+9NLF65+uz8xenzc+fnLk2dOXPq5OTzp6ee60mcaVy3Rj5cOHbk1bevvz5z9vo7P32TZPG3xNEjoxsdfKJS6XF1+TrQkE4GcmwIW1KsddMYrPb/oSjG2skbilc+aShaPphLC4HtUqlUKvd3PrxcAe5hSeTdAiAf2Rd9Ov/Ntogo7NDwI3c3X6xNgNK4b9e32pGB1TdhsGV+20ujEXF2+e8v0y225z4EAECT79LxzzPrxn/VIWDjfaGD9TWU4Yj4f0QciojTEXE4Iu6LqJZ9ICIe3GL9rYsk68c/hRtdBbZJ6fjvhfraVvP4b3UIPFys5w5U4x9Mzs2X5k7U35OxGNyd5ic3qOP7l3/9vNOxxvFfuqX1Z2PBejtuDOxufs3sdHn6bmJudPPjiJGBdvEnqysBSUQciYiRLuuYf+rrY52O3Tn+DfRgnanyVcSTtfO/HC3xZ5KN1ycn/heluRMT2VWx3s+/XHujU/13FX8PpOd/b9vrfzX+4aRxvXZx63Vc+/2zjnOabq//XclbTfs+mC6XL09G7EpeqzW6cf9US7mptfJp/GPH2/f/Q7H2ThyNiPQifigiHo6IR+ptfzQiHouI4xvE/+NLj7/bffzbK41/dkvnfy2xK1r3tE8UL/zwbVOlw1uJPz3/p6qpsfqezXz+baZd3V3NAAAA8N9TiIj9kRTGV9OFwvh47Xf4D8feQmlhsfz0uYX3L83WnhEYjsFCdqdrqOF+6GR9Wp/lp1ryJ+v3jb8o7qnmx2cWSrN5Bw99bl+H/p/6o5h364Bt53kt6F/6P/Qv/R/6l/4P/atN/9+TRzuAndfu+/+jHNoB7LyW/m/ZD/qI+T/0r276f9/8hSC4x/n+h760uCfu/JC8hMS6RBT+Fc2QSBPZcLyHPznvTyYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDe+CcAAP//Fmvj5w==") prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x4580, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r3 = creat(0x0, 0xecf86c37d53049cc) syz_io_uring_setup(0x6440, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f00000009c0)={'\x00', 0x2, 0x40, 0x10001, 0x2, 0x80, r0}) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000200)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@noauto_da_alloc}, {@errors_remount}]}, 0x11, 0x553, &(0x7f0000000440)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x143142, 0x40) pwritev2(r4, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) r5 = open(&(0x7f0000000140)='./file1\x00', 0x64042, 0x178) sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000b00)={&(0x7f0000000b80)=ANY=[@ANYBLOB="0fc3a72c685b96aeeef1bf2b254c5efded9f5d21578d9d276ed61cbc17f529ae383a8e87373ff93efca0cb6d5e0a8803743d33fa6a45461b269c390100791003fe751ac851", @ANYRES16=0x0, @ANYBLOB="000129bd7000ffdbdf250200000008000400030000000f000100696e6c696e65637279707400080002000500000014000500fe8000000000000000000000000000aa"], 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x4040000) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000380)=""/246) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r6, 0x89f3, &(0x7f0000001040)={'gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x1700, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @empty}}}}) syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x82002) r7 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x800, 0x1, 0xbfdffffc}, &(0x7f00000000c0)=0x0, &(0x7f00000003c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r8, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r8, r9, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0xd4c2}, 0x1}) io_uring_enter(r7, 0x47f6, 0x0, 0x0, 0x0, 0x0) pwritev2(r5, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x2000, 0x0, 0x3) 1.093271457s ago: executing program 2 (id=3): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000100)=0x8001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x7, @empty, 0x8009}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000480)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0xb, @loopback, 0x1}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000140)='2', 0x1}], 0x1}}], 0x1, 0x8000) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) write(r1, &(0x7f0000000300)="2cd889f035a53e14f3d5ac", 0xb) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x54, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=[0x8], 0x0, 0x0, 0x1}}, 0x40) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r4, &(0x7f0000000140)={0xa, 0x4e23, 0x100002, @ipv4={'\x00', '\xff\xff', @local}, 0xffbf}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000000680)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0xa9, @loopback, 0x8}, 0x1c, &(0x7f0000000780)=[{&(0x7f0000000900)='2', 0x1}], 0x1}}], 0x1, 0x2000fffc) ioctl$BTRFS_IOC_BALANCE(r4, 0x5000940c, 0x0) 779.145629ms ago: executing program 1 (id=6): r0 = socket(0x25, 0x5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) r1 = syz_io_uring_setup(0x837, &(0x7f0000000180)={0x0, 0x679a, 0x80, 0x4, 0x3ce}, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_CONNECT={0x10, 0x40, 0x0, r0, 0x80, &(0x7f00000000c0)=@nl=@unspec}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = dup(r4) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r6, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001000)=ANY=[@ANYBLOB="14000000020201010000009b5f00000000000200"], 0x14}}, 0x40800) r7 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r7, &(0x7f0000000480)=[{&(0x7f0000000000)=@in6={0xa, 0x4e24, 0x861, @mcast2, 0x3}, 0x1c, &(0x7f0000000400)=[{&(0x7f0000000200)="d190bf809368bfb816763e4d409d845a5f0c382ca0e1f10a27f3c33ca61adf2fbc4b", 0x22}, {&(0x7f0000000240)="64e03d59d9de8d5aaf15d1c7b5a16ae1ad2db139ad55b6c3da88ff147e93484b666e305e77e357332ccac075259947e77369b5425bed14383d5d69cb5ef9da0efc4c2d1178f0cc9ca9", 0x49}, {&(0x7f0000000300)="2003de84c5f17f88742feb8ff86fc96c8917f86a753df2f2ca0ccad0dc5bb0c4650f787f39491a8972d097fd3c8fec0ff0427dc150a0250326ef62c9c7c3d449f4ef08c92a146d66a5049a90318936f40917ba97a1749c06741445c8e6629665bb0f6b2a936354e5a68c1106869bd4bd15b3b8a6fc557760879da736c05b164ce2d196325dff42f2883cdce688f191fdd68a449c30367bcb3084051d66e08d39542d507208eacbb770b7abcd0c00e9e4682b0dc547062ebb6f70a6419e29302e82f5ccb14b7da0a2068b7fa13b3e75e169fa05655e636bf642a085474d84fc", 0xdf}], 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="21000000000000008420000006000000080000000000f2ad03ae33d7680dedfa598b9dd1cd"], 0x18, 0x40}], 0x1, 0x20000000) r8 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r8) syz_usb_connect(0x0, 0x24, &(0x7f0000000000)=ANY=[], 0x0) ioctl$EVIOCRMFF(r8, 0x40085507, &(0x7f0000000500)=0xdc) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40b9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x100}, 0x204, 0x0, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x24, 0x4, 0x8, 0x201, 0x0, 0x0, {0x2, 0x0, 0xa}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x809d}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x5}, 0x4004010) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r12 = syz_clone3(&(0x7f0000001880)={0x100000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) tgkill(r12, r12, 0x21) io_uring_register$IORING_REGISTER_NAPI(r5, 0x1b, &(0x7f00000004c0)={0x8, 0x80}, 0x1) io_uring_enter(r1, 0x3516, 0x0, 0x0, 0x0, 0x0) 315.097919ms ago: executing program 4 (id=7): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000580)={0x234b, 0xa2, 0x0, 'queue1\x00'}) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000300)=0x1, 0x4) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000040)="6a57abe9994088b69be2a4ae17ce0324e9227de08ed2a48a0932bcd2ccda19bd574af89bf4590ff5", 0x28}], 0x1) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000000)={0xfffffffb}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000001200210325bd70000000000007"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000200)=[@in={0x2, 0x4e24, @rand_addr=0x64010100}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000080)={r6, 0xf39}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000000c0)={0x8, 0x9, 0x3, 0xfff, r6}, &(0x7f0000000100)=0x10) sendmsg$TCPDIAG_GETSOCK(r2, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ac0000001200010500"/56, @ANYRES32=0x0, @ANYBLOB="00000000000000feffffff0000000000040002005c0001000058"], 0xac}}, 0x4000) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x700000c, 0x11, r1, 0x100000000) 282.641802ms ago: executing program 2 (id=8): bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x4, &(0x7f0000000e00)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000780), r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x106200, 0x1000, 0x20da, 0x0, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x670, 0x5, 0x678, 0x458, 0x528, 0xfeffffff, 0x458, 0x528, 0x5e0, 0x5e0, 0xffffffff, 0x5e0, 0x5e0, 0x5, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010102, 0x0, 0x0, 'wlan1\x00', 'nr0\x00', {}, {}, 0x6}, 0x0, 0x308, 0x330, 0x0, {}, [@common=@unspec=@physdev={{0x68}, {'veth0_vlan\x00', {0xff}, 'team0\x00', {}, 0xe, 0x1}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00', {0x6}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@set={{0x40}, {{0x0, [0x4000000, 0x4000000, 0x1000002]}}}, @common=@set={{0x40}, {{0x0, [0x4, 0x0, 0x0, 0x1, 0x6, 0x1], 0x0, 0x2}}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @broadcast, @remote, @icmp_id}}}}, {{@ip={@multicast2, @rand_addr, 0x0, 0x0, 'veth0\x00', 'ip6tnl0\x00', {}, {}, 0x73}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0xe, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @gre_key=0x1, @gre_key=0x80}}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@private=0xa010100, @ipv4=@dev, @port=0xfffd}}}], {{'\x00', 0x0, 0x70, 0x98, 0x6000000}, {0x28}}}}, 0x6d8) 145.035582ms ago: executing program 2 (id=9): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f00000003c0)={[{@nombcache}, {@journal_dev={'journal_dev', 0x3d, 0x1}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@nouid32}]}, 0x1, 0x441, &(0x7f0000000580)="$eJzs28tvG8UfAPDv2kn66zP5VeXRBxAoiIpH0qSl9MAFBBIHkJDgUI4hSatQt0FNkGgVQUCoHFEl7ogjEv8AnOCCgBMSV7ijShXKpYWT0dq7ie3aaZI62RR/PtK2M7tjzXw9O/bMThxAzxpO/0ki9kTE7xExWM82Fxiu/3draWHy76WFySSq1Tf/Smrlbi4tTOZF89ftzjN9EaVPkzjcpt65y1fOT1Qq05ey/Oj8hfdG5y5feXbmwsS56XPTF8dPnz55Yuz5U+PPdSXONK6bhz6cPXLw1bevvT555to7P3+T5PG3xNElw6tdfKJa7XJ1xdrbkE76CmwI61KuD9Por43/wSjHSucNxiufFNo4YFNVq9Xq/Z0vL1aB/7Akim4BUIz8iz5d/+bHFk09toUbL9YXQGnct7KjfqUvSlmZ/pb1bTcNR8SZxX++TI/YnOcQAABNvk/nP8+0m/+VovG50L5sD2UoIv4fEfsj4lREHIiI+yJqZR+IiAfXWX/rJsnt85/S9Q0Ftkbp/O+FbG+ref6Xz/5iqJzl9tbi70/OzlSmj2fvybHo35Hmx1ap44eXf/u807XG+V96pPXnc8GsHdf7djS/ZmpifuJuYm504+OIQ33t4k+WdwKSiDgYEYc2WMfMU18f6XTtzvGvogv7TNWvIp6s9/9itMSfS1bfnxz9X1Smj4/md8Xtfvn16hud6r+r+Lsg7f9dbe//5fiHksb92rn113H1j8/ar2n2bfz+H0jeajr3wcT8/KWxiIHktXqjG8+Pt5QbXymfxn/saPvxvz9W3onDEZHexA9FxMMR8UjWd49GxGMRcXSV+H966fF3O13bDv0/ta7+X0kMROuZ9ony+R+/a6p0aD3xp/1/spY6lp1Zy+ffWtq1sbsZAAAA7j2liNgTSWlkOV0qjYzU/4b/QOwqVWbn5p8+O/v+xan6bwSGor+UP+kabHgeOpYt6/P8eEv+RPbc+Ivyzlp+ZHK2MlV08NDjdncY/6k/y0W3Dth0fq8Fvcv4h95l/EPvMv6hd7UZ/zuLaAew9dp9/39UQDuArdcy/m37QQ+x/ofe1Tj+kwLbAWw93//Qk+Z2xp1/JN8DiYHt0Yx7KBGltRf+Nrvbim6zxNoTBX8wAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMm/AQAA//8iOuPQ") r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='.\x00', 0x8880, 0x91) prlimit64(0x0, 0xe, &(0x7f0000000040)={0xd, 0x8d}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000180)={0x80, 0x4, 0x8, 0x400fff, 0x800000f, 0xe6b}) 64.359214ms ago: executing program 0 (id=10): r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x40, @empty}, 0x1c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = socket$key(0xf, 0x3, 0x2) unshare(0xa000400) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) setns(r4, 0x24020000) sendmsg$key(r2, &(0x7f0000000040)={0xfffd, 0x0, &(0x7f0000000880)={&(0x7f00000008c0)=ANY=[@ANYBLOB="020300020c00000000000000000000000200080018000000d0be830000000000030006000000000002000000ffffffff000000000000000002000100000004d50000080201000040030005003200000002"], 0x60}, 0x1, 0x7}, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[], 0xff2e) r5 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r5}, &(0x7f0000000000)=0x0) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000080)={'bridge0\x00'}) r8 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r8, 0x29, 0x43, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r6, 0x1, &(0x7f0000000040), 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 0s ago: executing program 2 (id=11): r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x40, @empty}, 0x1c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}, 0x102260, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) unshare(0xa000400) getpid() sendmsg$key(r2, &(0x7f0000000040)={0xfffd, 0x0, &(0x7f0000000880)={&(0x7f00000008c0)=ANY=[@ANYBLOB="020300020c00000000000000000000000200080018000000d0be830000000000030006000000000002000000ffffffff000000000000000002000100000004d50000080201000040030005003200000002"], 0x60}, 0x1, 0x7}, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[], 0xff2e) r3 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r3}, &(0x7f0000000000)=0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000200000000000000000000090400000000000000000000010500000008000000000000000000000300000000020000000200000000000000000000000000000d03"], 0x0, 0x5a}, 0x20) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge0\x00'}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000100), 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r4, 0x1, &(0x7f0000000040), 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) kernel console output (not intermixed with test programs): [ 22.232471][ T28] audit: type=1400 audit(1772275492.547:62): avc: denied { search } for pid=3196 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.256655][ T28] audit: type=1400 audit(1772275492.547:63): avc: denied { search } for pid=3196 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.279657][ T28] audit: type=1400 audit(1772275492.547:64): avc: denied { search } for pid=3196 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=487 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.302653][ T28] audit: type=1400 audit(1772275492.547:65): avc: denied { search } for pid=3196 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 22.325771][ T28] audit: type=1400 audit(1772275492.557:66): avc: denied { read open } for pid=3197 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=488 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.164' (ED25519) to the list of known hosts. [ 27.506286][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 27.506302][ T28] audit: type=1400 audit(1772275497.827:70): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 27.535481][ T28] audit: type=1400 audit(1772275497.857:71): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.537799][ T3299] cgroup: Unknown subsys name 'net' [ 27.563217][ T28] audit: type=1400 audit(1772275497.877:72): avc: denied { unmount } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 27.684094][ T3299] cgroup: Unknown subsys name 'cpuset' [ 27.690435][ T3299] cgroup: Unknown subsys name 'rlimit' [ 27.801711][ T28] audit: type=1400 audit(1772275498.117:73): avc: denied { setattr } for pid=3299 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 27.830228][ T28] audit: type=1400 audit(1772275498.127:74): avc: denied { create } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.850850][ T28] audit: type=1400 audit(1772275498.127:75): avc: denied { write } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.871292][ T28] audit: type=1400 audit(1772275498.127:76): avc: denied { read } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 27.891610][ T28] audit: type=1400 audit(1772275498.147:77): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 27.912590][ T28] audit: type=1400 audit(1772275498.147:78): avc: denied { mounton } for pid=3299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.915068][ T3306] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 27.937433][ T28] audit: type=1400 audit(1772275498.147:79): avc: denied { mount } for pid=3299 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 28.000921][ T3299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.271762][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 29.283284][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 29.297704][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 29.313144][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 29.398548][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.405765][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.412892][ T3313] bridge_slave_0: entered allmulticast mode [ 29.419479][ T3313] bridge_slave_0: entered promiscuous mode [ 29.444600][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.451682][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.458867][ T3313] bridge_slave_1: entered allmulticast mode [ 29.465368][ T3313] bridge_slave_1: entered promiscuous mode [ 29.495678][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.503013][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.510241][ T3312] bridge_slave_0: entered allmulticast mode [ 29.516691][ T3312] bridge_slave_0: entered promiscuous mode [ 29.526060][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.533226][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.540644][ T3312] bridge_slave_1: entered allmulticast mode [ 29.547177][ T3312] bridge_slave_1: entered promiscuous mode [ 29.553739][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.560802][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.568125][ T3319] bridge_slave_0: entered allmulticast mode [ 29.574791][ T3319] bridge_slave_0: entered promiscuous mode [ 29.592057][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.607871][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.615020][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.622177][ T3319] bridge_slave_1: entered allmulticast mode [ 29.628817][ T3319] bridge_slave_1: entered promiscuous mode [ 29.645934][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.655219][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 29.669285][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.676416][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.683700][ T3320] bridge_slave_0: entered allmulticast mode [ 29.690185][ T3320] bridge_slave_0: entered promiscuous mode [ 29.710542][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.721063][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.730358][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.737480][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.744644][ T3320] bridge_slave_1: entered allmulticast mode [ 29.751193][ T3320] bridge_slave_1: entered promiscuous mode [ 29.758718][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.774020][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.789110][ T3313] team0: Port device team_slave_0 added [ 29.813448][ T3312] team0: Port device team_slave_0 added [ 29.824667][ T3313] team0: Port device team_slave_1 added [ 29.840980][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.851084][ T3312] team0: Port device team_slave_1 added [ 29.871934][ T3319] team0: Port device team_slave_0 added [ 29.878565][ T3319] team0: Port device team_slave_1 added [ 29.885196][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.914668][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.921713][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.947762][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.963681][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.970650][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.996604][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.007627][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.014715][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.040661][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.066700][ T3320] team0: Port device team_slave_0 added [ 30.072346][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.079713][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.086897][ T3316] bridge_slave_0: entered allmulticast mode [ 30.093410][ T3316] bridge_slave_0: entered promiscuous mode [ 30.102889][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.109931][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.135879][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.146970][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.154120][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.180122][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.191674][ T3320] team0: Port device team_slave_1 added [ 30.197548][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.204770][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.211866][ T3316] bridge_slave_1: entered allmulticast mode [ 30.218398][ T3316] bridge_slave_1: entered promiscuous mode [ 30.238714][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.245782][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.271791][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.297744][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 30.308055][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.327149][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.334171][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.360167][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.390310][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.397433][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.423583][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.450615][ T3319] hsr_slave_0: entered promiscuous mode [ 30.456631][ T3319] hsr_slave_1: entered promiscuous mode [ 30.468023][ T3312] hsr_slave_0: entered promiscuous mode [ 30.474101][ T3312] hsr_slave_1: entered promiscuous mode [ 30.480035][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 30.485838][ T3312] Cannot create hsr debugfs directory [ 30.492127][ T3316] team0: Port device team_slave_0 added [ 30.499983][ T3313] hsr_slave_0: entered promiscuous mode [ 30.506233][ T3313] hsr_slave_1: entered promiscuous mode [ 30.512099][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 30.517882][ T3313] Cannot create hsr debugfs directory [ 30.526033][ T3316] team0: Port device team_slave_1 added [ 30.576538][ T3320] hsr_slave_0: entered promiscuous mode [ 30.582641][ T3320] hsr_slave_1: entered promiscuous mode [ 30.588958][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 30.594752][ T3320] Cannot create hsr debugfs directory [ 30.600621][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.607671][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.633949][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.662378][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.669467][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.695431][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.790771][ T3316] hsr_slave_0: entered promiscuous mode [ 30.796850][ T3316] hsr_slave_1: entered promiscuous mode [ 30.802684][ T3316] debugfs: 'hsr0' already exists in 'hsr' [ 30.808509][ T3316] Cannot create hsr debugfs directory [ 30.917665][ T3313] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 30.926744][ T3313] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 30.937636][ T3313] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 30.948604][ T3313] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 30.981281][ T3319] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 30.990782][ T3319] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 31.000579][ T3319] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 31.012273][ T3319] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 31.038828][ T3312] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 31.063260][ T3312] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 31.076176][ T3312] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 31.090510][ T3312] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 31.102166][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.129460][ T3320] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 31.147547][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.155283][ T3320] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 31.164618][ T3320] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 31.174199][ T3320] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 31.195165][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.202255][ T364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.221028][ T3316] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 31.232233][ T3316] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 31.241513][ T3316] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 31.251156][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.258286][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.277166][ T3316] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 31.299974][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.311282][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.336222][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.347826][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.360225][ T70] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.367354][ T70] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.390352][ T3313] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 31.400819][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.414630][ T70] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.421777][ T70] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.450054][ T70] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.457190][ T70] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.467658][ T70] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.474759][ T70] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.509379][ T3319] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.552729][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.570050][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.580311][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 31.595384][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.616035][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.626411][ T364] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.633606][ T364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.645200][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.652335][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.667939][ T70] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.675039][ T70] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.685119][ T70] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.692226][ T70] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.708814][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.723163][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.801529][ T3316] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 31.812507][ T3316] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.854809][ T3313] veth0_vlan: entered promiscuous mode [ 31.886220][ T3313] veth1_vlan: entered promiscuous mode [ 31.924601][ T3312] veth0_vlan: entered promiscuous mode [ 31.948591][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.966145][ T3313] veth0_macvtap: entered promiscuous mode [ 31.974877][ T3312] veth1_vlan: entered promiscuous mode [ 31.985046][ T3313] veth1_macvtap: entered promiscuous mode [ 32.010818][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 32.022786][ T3319] veth0_vlan: entered promiscuous mode [ 32.033235][ T3312] veth0_macvtap: entered promiscuous mode [ 32.051530][ T3319] veth1_vlan: entered promiscuous mode [ 32.059718][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.068406][ T3312] veth1_macvtap: entered promiscuous mode [ 32.091172][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.108672][ T3319] veth0_macvtap: entered promiscuous mode [ 32.123184][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.141064][ T3320] veth0_vlan: entered promiscuous mode [ 32.152702][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.160997][ T364] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.174010][ T364] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.184393][ T364] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.193137][ T364] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.204049][ T3319] veth1_macvtap: entered promiscuous mode [ 32.211986][ T3320] veth1_vlan: entered promiscuous mode [ 32.227190][ T364] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.245364][ T364] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.254255][ T364] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.265901][ T364] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.287266][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.306549][ T3316] veth0_vlan: entered promiscuous mode [ 32.316064][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.337111][ T3312] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 32.354548][ T3316] veth1_vlan: entered promiscuous mode [ 32.368410][ T50] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.381739][ T50] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.429499][ T3316] veth0_macvtap: entered promiscuous mode [ 32.437253][ T3316] veth1_macvtap: entered promiscuous mode [ 32.444562][ T3320] veth0_macvtap: entered promiscuous mode [ 32.451170][ T50] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.460536][ T50] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.484133][ T3320] veth1_macvtap: entered promiscuous mode [ 32.496328][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.518112][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.536208][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.550501][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.560154][ T50] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.591003][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 32.591085][ T28] audit: type=1400 audit(1772275502.907:102): avc: denied { create } for pid=3485 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 32.629022][ T28] audit: type=1400 audit(1772275502.917:103): avc: denied { write } for pid=3485 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 32.652246][ T50] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.661982][ T50] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.682281][ T50] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.692012][ T50] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.703176][ T28] audit: type=1400 audit(1772275503.017:104): avc: denied { name_bind } for pid=3485 comm="syz.1.2" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 32.857582][ T50] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.866549][ T28] audit: type=1400 audit(1772275503.017:105): avc: denied { create } for pid=3485 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 32.886016][ T28] audit: type=1400 audit(1772275503.057:106): avc: denied { prog_load } for pid=3485 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 32.904856][ T28] audit: type=1400 audit(1772275503.057:107): avc: denied { bpf } for pid=3485 comm="syz.1.2" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 32.928300][ T28] audit: type=1400 audit(1772275503.057:108): avc: denied { perfmon } for pid=3485 comm="syz.1.2" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 32.949170][ T28] audit: type=1400 audit(1772275503.057:109): avc: denied { prog_run } for pid=3485 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 32.983217][ T28] audit: type=1400 audit(1772275503.057:110): avc: denied { create } for pid=3485 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 33.043844][ T3496] loop4: detected capacity change from 0 to 1024 [ 33.051539][ T3496] EXT4-fs: Ignoring removed nobh option [ 33.057340][ T3496] EXT4-fs: Ignoring removed nomblk_io_submit option [ 33.134089][ T3496] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 33.453836][ T3496] netlink: 20 bytes leftover after parsing attributes in process `syz.4.5'. [ 33.472198][ T50] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.800389][ T28] audit: type=1400 audit(1772275503.057:111): avc: denied { setopt } for pid=3485 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 33.924061][ T50] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.050021][ T3509] loop0: detected capacity change from 0 to 512 [ 34.090473][ T3509] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 34.167647][ T3509] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 34.237907][ T3509] EXT4-fs warning (device loop0): ext4_expand_extra_isize_ea:2858: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 34.330851][ T3509] EXT4-fs (loop0): 1 truncate cleaned up [ 34.363250][ T3509] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 34.593196][ T3514] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 34.618290][ T3514] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 34.681957][ T3506] syz.2.3 (3506) used greatest stack depth: 10168 bytes left [ 34.740749][ T3319] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.919577][ T3523] loop2: detected capacity change from 0 to 512 [ 34.951655][ T3523] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 34.970340][ T3523] EXT4-fs (loop2): 1 truncate cleaned up [ 34.977018][ T3523] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 34.993009][ T3316] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.005590][ T3523] EXT4-fs warning (device loop2): ext4_group_add:1735: No reserved GDT blocks, can't resize [ 35.055675][ T3320] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.173420][ C1] ================================================================== [ 35.181579][ C1] BUG: KCSAN: data-race in wq_worker_tick / wq_worker_tick [ 35.188846][ C1] [ 35.191195][ C1] read-write to 0xffff8881000c5cd8 of 8 bytes by interrupt on cpu 0: [ 35.199289][ C1] wq_worker_tick+0x60/0x230 [ 35.203935][ C1] sched_tick+0xda/0x210 [ 35.208201][ C1] update_process_times+0x15e/0x190 [ 35.213435][ C1] tick_nohz_handler+0x275/0x3d0 [ 35.218407][ C1] __hrtimer_run_queues+0x218/0x4f0 [ 35.223636][ C1] hrtimer_interrupt+0x269/0x810 [ 35.228639][ C1] __sysvec_apic_timer_interrupt+0x5f/0x1f0 [ 35.234575][ C1] sysvec_apic_timer_interrupt+0x6f/0x80 [ 35.240237][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 35.246238][ C1] _raw_spin_unlock_irq+0x12/0x30 [ 35.251302][ C1] process_scheduled_works+0x497/0x9e0 [ 35.256816][ C1] worker_thread+0x581/0x770 [ 35.261440][ C1] kthread+0x22a/0x280 [ 35.265539][ C1] ret_from_fork+0x150/0x360 [ 35.270169][ C1] ret_from_fork_asm+0x1a/0x30 [ 35.274969][ C1] [ 35.277308][ C1] read-write to 0xffff8881000c5cd8 of 8 bytes by interrupt on cpu 1: [ 35.285403][ C1] wq_worker_tick+0x60/0x230 [ 35.290036][ C1] sched_tick+0xda/0x210 [ 35.294315][ C1] update_process_times+0x15e/0x190 [ 35.299566][ C1] tick_nohz_handler+0x275/0x3d0 [ 35.304542][ C1] __hrtimer_run_queues+0x218/0x4f0 [ 35.309768][ C1] hrtimer_interrupt+0x269/0x810 [ 35.314742][ C1] __sysvec_apic_timer_interrupt+0x5f/0x1f0 [ 35.320669][ C1] sysvec_apic_timer_interrupt+0x6f/0x80 [ 35.326367][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 35.332380][ C1] _raw_spin_unlock_irqrestore+0x1a/0x30 [ 35.338060][ C1] tty_insert_flip_string_and_push_buffer+0x1aa/0x1f0 [ 35.344860][ C1] pty_write+0x70/0x90 [ 35.348960][ C1] tty_put_char+0x8f/0xc0 [ 35.353323][ C1] __process_echoes+0x309/0x6b0 [ 35.358212][ C1] n_tty_receive_buf_common+0x918/0xc10 [ 35.363785][ C1] n_tty_receive_buf2+0x33/0x40 [ 35.368677][ C1] tty_ldisc_receive_buf+0x66/0xf0 [ 35.373820][ C1] tty_port_default_receive_buf+0x59/0x90 [ 35.379571][ C1] flush_to_ldisc+0x148/0x340 [ 35.384271][ C1] process_scheduled_works+0x4de/0x9e0 [ 35.389755][ C1] worker_thread+0x581/0x770 [ 35.394385][ C1] kthread+0x22a/0x280 [ 35.398481][ C1] ret_from_fork+0x150/0x360 [ 35.403112][ C1] ret_from_fork_asm+0x1a/0x30 [ 35.407927][ C1] [ 35.410273][ C1] value changed: 0x0000000000029810 -> 0x000000000002bf20 [ 35.417409][ C1] [ 35.419786][ C1] Reported by Kernel Concurrency Sanitizer on: [ 35.425982][ C1] CPU: 1 UID: 0 PID: 2229 Comm: kworker/u8:9 Not tainted syzkaller #0 PREEMPT(full) [ 35.435511][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 35.445605][ C1] Workqueue: events_unbound flush_to_ldisc [ 35.451461][ C1] ==================================================================