last executing test programs: 677.566788ms ago: executing program 3 (id=4): r0 = socket$inet_icmp(0x2, 0x2, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x1, 0x0, 0xe0, 0x0, 0xe000, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x11, 0x0, @empty=0xac1414aa, @multicast1}, "341517c1b7df60c7"}}}}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd00, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r4}, 0x18) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x1a00404, &(0x7f0000000080)={[{@grpquota}, {@nomblk_io_submit}]}, 0x1, 0xbac, &(0x7f00000017c0)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r7, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) lseek(r7, 0x5, 0x4) socket$nl_generic(0x10, 0x3, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB="010000000b0000001f3200"/20, @ANYRES32=r5, @ANYRES8=r6, @ANYRES32, @ANYRES32, @ANYBLOB="00000000020000000000000000000000000000000000000000000000c09ee86ba9f4021c318fbe65f61add14b8eed6434ea2981c632b0a25940691781f66eaf3b73f961166cfab8ced390dd9fabf593cfe94466cc263b880b5581322ed92553a3627d7fa143d58ac880a503860c154af9accaa0cbcd91f083d9d85268c12dc621af227e4b77b5a327526adcde1d19524f18fe524f877dce72daa70876550e76a8c68de8b82a4943035d511a63c8a9d7c4db0eb2a0d25cb2c6a7e801fc92d9d52ec82342819a71e5547a6b414e9f517", @ANYRESOCT], 0x48) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x3248c2, &(0x7f0000000300)={[], [{@func={'func', 0x3d, 'BPRM_CHECK'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}, 0x3, 0x572, &(0x7f0000000c40)="$eJzs3c9rHFUcAPDvbJL+1qZQinqQQA9WajdN4o8KQutRtFjQe12SaSjZdEt2U5pYaHuwIF6kCCIWxD/Au8fiH6B/RUELRUrQg5fIbGbbbZLNJunWbJ3PB6Z9b2ayb96++b79zs4uG0BhjWT/lCJejoivk4iDbdsGI984srLf0sNrk9mSxPLyJ38mkeTrWvsn+f/788pLEfHLFxHHS2vbrS8szlSq1XQur482Zi+P1hcWT1ycrUyn0+ml8YmJU29NjL/7zts96+vr5/7+7uO7H5z66ujStz/dP3Q7iTNxIN/W3o+ncKO9MhIj+XMyFGdW7TjWg8b6SbLTB8C2DORxPhTZHHAwBvKoB/7/rkfEMlBQifiHgmrlAa1r+x5dBz83Hry/cgG0tv+DK++NxJ7mtdG+peSJK6Psene4B+1nbfz8x53b2RJd3oe43oP2AFpu3IyIk4ODa+e/JJ//tu9k883jja1uo2ivP7CT7mb5zxvr5T+lR/lPrJP/7F8ndreje/yX7vegmY6y/O+9dfPfR1PX8EBee6GZ8w0lFy5W05MR8WJEHIuh3Vl9o/s5p5buLXfa1p7/ZUvWfisXzI/j/uDuJ/9mqtKoPE2f2z24GfHK4/w3iTXz/55mrrt6/LPn41xW+PXLrm0cSe+82mlb9/63630GvPxjxGvrjv/jO1rJxvcnR5vnw2jrrFjrr1tHfuvU/tb633vZ+O/buP/DSfv92vrW2/hhzz9pp23bPf93JZ82y7vydVcrjcbcWMSu5KO168cf/22r3to/6/+xoxvPf+ud/3sj4rNN9v/W4Vsdd+2H8Z/a0vhvvXDvw8+/79T+5sb/zWbpWL5mM/PfZg/waZ47AAAAAAAA6DeliDgQSan8qFwqlcsrn+84HPtK1Vq9cfxCbf7SVDS/KzscQ6XWne6DbZ+HGMs/D9uqj6+qT0TEoYj4ZmBvs16erFWndrrzAAAAAAAAAAAAAAAAAAAA0Cf2d/j+f+b3gZ0+OuCZ85PfUFxd478Xv/QE9CWv/1Bc4h+KS/xDcYl/KC7xD8Ul/qG4xD8Ul/gHAAAAAAAAAAAAAAAAAAAAAAAAAACAnjp39my2LC89vDaZ1aeuLMzP1K6cmErrM+XZ+cnyZG3ucnm6VpuupuXJ2my3x6vWapfHxmP+6mgjrTdG6wuL52dr85ca5y/OVqbT8+nQf9IrAAAAAAAAAAAAAAAAAAAAeL7UFxZnKtVqOqfQsXA6+uIwtl1Iuo3y6fxk2NIjR14Y3PkOKjyDwg5PTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADQ5t8AAAD//8nLNLM=") openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0xce342, 0x0) r10 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r3, 0x40049421, 0x3) pwrite64(r10, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1c, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffe9b703000000000000b70400000000000085000000c30000009549d8015cd7eb971558e403fe3f8662570b1e08e6a8555e9fc5d58691b42e77cf7f1945dc5b01cedad73736d47ffd129d29571f2e20c88e792fefaf2046bac410a9c339b840052f9f0144330bd497c3856fe45e48f40f98ca8f4faf22f4e12f8c1825eace349d2d13d737afa4f51c323e5dfda0f4eabbebb3f8e65f241ead3bd7baf597deb4f5faf5ecd96ab3886e4fd912414db53e8e6d803172071744391e657b27", @ANYRESDEC=r9], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_open_dev$evdev(&(0x7f00000001c0), 0x1bbc, 0x801) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)={0x14, 0x38, 0x1, 0xfffffffc, 0x8000, {0x0, 0x3, 0x2}}, 0x14}}, 0x0) sendmmsg$inet(r0, &(0x7f0000000340)=[{{&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000400)='\b\x00\x00\x00(\x00\x00\x00', 0x8}], 0x1}}, {{&(0x7f0000000480)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f00000000c0)="c685e3edc50741e5", 0x8}], 0x1}}], 0x2, 0x4000) 672.304199ms ago: executing program 2 (id=3): r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x141301) ioctl$USBDEVFS_CONTROL(r0, 0xc0105500, &(0x7f00000000c0)={0xc5, 0xa, 0x303, 0x4, 0x0, 0x6e9, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYRES64=0x0, @ANYRESHEX, @ANYRES64=r0, @ANYRES64=r0, @ANYRES8=r0, @ANYRESDEC=r0], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000c00)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="b48932f86a0092a62bb9ff8d0000711035000000000005000000000000000a33fa88e23680ef9f529500000000000000621d2177dbdf3d"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x39) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006940)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/6, 0x6}], 0x1}, 0x85}], 0x1, 0x40, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="640000000206010200000000000000000000000015000300686173683a69702c706f72742c6e6574000000000900020073797a32000000000500040000000000140007800800124000000000050015002200000005000500020000000500010006"], 0x64}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x1) sendmsg$NFT_BATCH(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000020000000a3c000000120a01010000000000000000020000000900020073797a310000000008000440000000000900010073797a30000000000800034000000002"], 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'ip6gretap0\x00', 0x0}) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000480)={@private1, r6}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES8], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000140)={0x0, r1}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0xd, &(0x7f0000000400)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800ff00000000bfa200000000000007020000f8ffffffb703000008002010b7040000000000008500000001000000950000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r8 = accept$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs, &(0x7f0000000240)=0x6e) recvfrom$unix(r8, &(0x7f0000000700)=""/226, 0xe2, 0x0, &(0x7f0000000800)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYBLOB="e8f2064500070000020500010007000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$sock(r9, &(0x7f00000044c0), 0x4000000000001c0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) recvfrom(r10, &(0x7f0000000040)=""/60, 0xdb, 0x40, 0x0, 0x0) 575.876047ms ago: executing program 4 (id=5): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x80, 0x5, 0x7fff0003}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000440)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c560a0677bc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010000081000418e00000004fcff", 0x58}], 0x1) read(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="600000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000400012800e00010069703665727370616e0000002c0002801400050000000000000000000000000000000002050016000200000004001200050017"], 0x60}}, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x20000023896) close(r6) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0xc100, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 522.239432ms ago: executing program 0 (id=1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) accept(r1, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00"/11], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r7}, 0x18) r8 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000001c0)={'bridge0\x00', 0x0}) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000000000)=0xf3f, 0x4) sendto$packet(r8, &(0x7f0000000080)="3f031c000302140006001e0089003307258000000000000000c988a807008100000088a800ff", 0x26, 0x0, &(0x7f00000000c0)={0xc9, 0x8100, r9, 0x1, 0x8, 0x6, @local}, 0x14) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="00002f00000000000082fde08600e15b9b3a2458e1ff05d068c1e3e7d809318b46ebb29597a82ba26383cab8c814d876d9824b139b1f349ac5a480221285085649787b26739cecb44298323ad516ac9448a03ec00d768d10d4d7fc798843bc2b9b2101c5a0e667f61fb6a3c88acc0c3253bd0717e1b1e81a15fa04c4bafa4e4b476904297428f8db21504117ae60889c0421d8a5469a542f0f76892323a0014bd2c3d889e4f8fb3689268f6dc4ebeaf7cd7595a42bf5a3", @ANYRES32=r5, @ANYRES8=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r11, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bind$can_j1939(r11, &(0x7f0000000080)={0x1d, r12, 0x2, {0x1}}, 0x18) sendmsg$inet(r11, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000780)="8af83b", 0x3}], 0x1}, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000f00)='kfree\x00', r13, 0x0, 0x34}, 0x18) r14 = socket$rds(0x15, 0x5, 0x0) bind$rds(r14, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYRESOCT=r10], 0x0, 0x0, 0xff96, 0x0, 0x60700, 0x20}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x5, 0xe, 0x0, &(0x7f0000000300)="0101000071a78326c7ffffc826a8", 0x0, 0x3a, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x9, 0xc, &(0x7f0000000640)=ANY=[@ANYRESOCT=r10, @ANYRESOCT=r3, @ANYRES64=r4], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x2b, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) 452.464399ms ago: executing program 0 (id=6): r0 = socket(0x2, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'team_slave_1\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000004009c00000000000100000095"], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x40f00, 0x40, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000002740)=@delchain={0x5f0, 0x65, 0x2, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x6}, {0x0, 0x1}, {0x0, 0xb}}, [@TCA_RATE={0x6, 0x5, {0x80, 0x60}}, @filter_kind_options=@f_bpf={{0x8}, {0x520, 0x2, [@TCA_BPF_POLICE={0x48, 0x2, [@TCA_POLICE_AVRATE={0x8, 0x4, 0xe0}, @TCA_POLICE_TBF={0x3c, 0x1, {0x7, 0x2, 0x5, 0x7, 0x6, {0xa, 0x2, 0x5, 0x7ff, 0xffff, 0x2}, {0x7, 0x2, 0x2, 0x7, 0x8, 0xfffffff8}, 0x7, 0x85f, 0x7fffffff}}]}, @TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x5, [{0x3, 0x49, 0x7, 0x4}]}}, @TCA_BPF_POLICE={0x464, 0x2, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x4, 0x10000, 0x1, 0x1000, 0xbdc, 0xe8, 0x800, 0x401, 0x5, 0x2b6d, 0x6a0000, 0xb40, 0x0, 0x7, 0x1, 0x7, 0x0, 0x4, 0x9, 0x2, 0x3, 0x57, 0xa2, 0x4, 0x74, 0x1340, 0x401, 0x6, 0x0, 0x0, 0x5, 0x2, 0x2, 0x3, 0x8000, 0x9, 0x5, 0x69e7, 0xffff, 0x7, 0x2, 0x2, 0x6ab, 0x8, 0x0, 0xf, 0x7fffffff, 0xfdd, 0xc, 0x7, 0x7, 0x6, 0x80000001, 0x7, 0x9, 0x0, 0x5, 0x6, 0x9, 0x2, 0x8, 0x9, 0xffff, 0xef, 0xfff, 0xa, 0xfffffc38, 0xf, 0x9, 0x4, 0x8, 0xfffffffb, 0x1, 0x4, 0xe, 0x1, 0x7, 0x0, 0x401, 0x2, 0x100, 0x9, 0x6e61, 0x41ca, 0x10000, 0x2, 0x7, 0xfffffff9, 0x2, 0x3db, 0x8001, 0xffffffff, 0xfffffffc, 0xd, 0x8e, 0xfffffffb, 0x2, 0x0, 0x0, 0x9, 0x440, 0x9, 0x1f01, 0x1, 0x400000, 0x40, 0xffffffff, 0x5, 0x6, 0x255c, 0x7, 0x9, 0x3, 0x7fff, 0x101, 0x9, 0x7, 0x3, 0xd, 0xffffffff, 0x2, 0x2, 0x9, 0x1, 0xfffffffd, 0x3, 0x100, 0x0, 0x3d0, 0x2e3, 0x4, 0x8, 0xfffffffe, 0x30a7, 0x8, 0x1, 0x100003, 0x3, 0x0, 0x8, 0x2, 0x0, 0x7ff, 0x7fff, 0x6350, 0x8, 0x401, 0x5, 0xa50, 0x7f, 0x6b69, 0x8, 0x1, 0x7, 0x6, 0x5, 0x800, 0x8, 0x9, 0x3, 0x40e0, 0x4, 0x2, 0xfffffff1, 0x60504646, 0x19e8ea36, 0xfff, 0x0, 0x9, 0x9, 0xffff8000, 0xffffff81, 0x7, 0x248, 0x4b92, 0x4, 0x8, 0xa83, 0x4, 0xd81f, 0x10000, 0x6, 0x200003, 0xffffffff, 0x4, 0xfffffffa, 0x4, 0xce5, 0x42, 0x9, 0x7fffffff, 0x47, 0xfffffd63, 0x1, 0x9733, 0x8, 0xd05d, 0x101, 0x3, 0x200, 0x7, 0x3, 0x10001, 0x1, 0x9, 0x3, 0x62, 0x1b4, 0xe8, 0x9, 0x5, 0x8, 0x4, 0x6, 0xfffff001, 0x3, 0xd8, 0x0, 0x5, 0x8, 0x7fffffff, 0x5, 0x8, 0x20be, 0x81, 0x6c93, 0x4, 0x1ff, 0x5, 0x7fffffff, 0x10000, 0xfff, 0x3, 0x80000, 0x4, 0x9, 0x4e, 0xe3, 0xed4, 0x7, 0x9, 0x3, 0x2, 0xc9, 0x3, 0x5, 0xfff, 0x3, 0xfc, 0x7ff, 0xb, 0x4, 0x4, 0x2, 0x8, 0x8000]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x6, 0x30000000, 0x4, 0xac7, 0x10, {0x6, 0x0, 0x7, 0x8000, 0x98d, 0x3}, {0x3, 0x1, 0xc, 0x5, 0x0, 0xe}, 0x401, 0x2f7, 0x6}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x3ff}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0xa1}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x1}]}, @TCA_BPF_POLICE={0x54, 0x2, [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x2}, @TCA_POLICE_RESULT={0x8, 0x5, 0x4}, @TCA_POLICE_TBF={0x3c, 0x1, {0x5, 0x3, 0x3, 0x401, 0x9, {0xf, 0x2, 0x9f, 0x3ff, 0x3, 0x9}, {0xd, 0x3, 0x40, 0x7f, 0x0, 0x8}, 0xa, 0x200008}}]}, @TCA_BPF_FLAGS={0x8, 0x8, 0x80000000}]}}, @filter_kind_options=@f_bpf={{0x8}, {0x94, 0x2, [@TCA_BPF_FD={0x8}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_ACT={0x70, 0x1, [@m_simple={0x38, 0x1e, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x7, 0x3, '%!\x00'}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_connmark={0x34, 0x5, 0x0, 0x0, {{0xd}, {0x4}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}, @TCA_BPF_OPS={{0x6}, {0x4}}]}}]}, 0x5f0}, 0x1, 0x0, 0x0, 0x81}, 0x28000080) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x20000800) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x8, 0x3, 0x1d8, 0x128, 0x43, 0xa0, 0x128, 0x98, 0x1d8, 0x178, 0x178, 0x1d8, 0x178, 0x49, 0x0, {[{{@ip={@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xffffffff, 'veth0_vlan\x00', 'bond0\x00', {0xff}, {}, 0x0, 0x2}, 0x12a, 0x70, 0x90, 0x0, {0x0, 0x7a010000}}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x3, 0x1, "7a7d0d9452729a5afa3851200a44a3d28da04828d1768c081f126a6bc527"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x238) r3 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0x80) fchdir(r4) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0xffffffffffffff2f}}], 0x4000000000003b4, 0x2040000, &(0x7f0000003700)={0x77359400}) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0xe, 0x1}, {0x0, 0x3}}}, 0x24}}, 0x800) 374.195556ms ago: executing program 1 (id=2): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="00000000000023000000000000000000edff0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1b, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f00000002c0)='kfree\x00', 0xffffffffffffffff, 0x0, 0x40}, 0x18) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x8001}}, './file0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001c80)=@newtaction={0x64, 0x30, 0x1, 0x20, 0x80001, {}, [{0x50, 0x1, [@m_vlan={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0xfffff800, 0x40, 0x1, 0x3, 0x4}, 0x1002}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4008044}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}, 0x1, 0xfffc}, 0x4000800) r7 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000002040)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$AUDIT_TTY_SET(r6, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x18, 0x3f9, 0x4, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x40012001}, 0x20000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kfree\x00', r8}, 0x18) r9 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDR(r9, 0x29, 0x39, &(0x7f0000000280)=ANY=[], 0x18) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000003080)=@delchain={0x34, 0x64, 0xf31, 0xfffffffb, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xfff3, 0xffff}, {0x0, 0x1b}}, [@filter_kind_options=@f_flower={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=@delchain={0x24, 0x11, 0x1, 0x1f, 0x0, {0x0, 0x0, 0x0, r5}}, 0x24}}, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e, 0x0) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) 145.712147ms ago: executing program 1 (id=7): prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000200)) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) syz_emit_ethernet(0x4a, &(0x7f0000000800)=ANY=[@ANYBLOB="ffffffffffff00000000000086dd6100272400373afffc000000000000000000000000000001ff02000000000000000000000000000187009078fc00"/74], 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3}, 0x94) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000100)=0x40049, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x20, 0x4, 0x2, 0x0, 0x201, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_pfifo={{0xa}, {0x8, 0x2, 0x6b9374e7}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x2c040002) sendmsg$nl_route_sched(r4, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@gettfilter={0x24, 0x2e, 0x205, 0x70bd2c, 0x25dfdafd, {0x0, 0x0, 0x0, r6, {0xc, 0xc}, {0x0, 0xfff1}, {0x0, 0x2}}}, 0x24}, 0x1, 0x0, 0x0, 0x20000801}, 0x4041080) 115.1704ms ago: executing program 2 (id=8): socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x800002, 0x800) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000200)=0x7ffffffc) bpf$MAP_CREATE(0x0, 0x0, 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x20, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0xc, 0x2, 0x0, 0x0, @str='nl80211\x00'}]}, 0x20}}, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 45.046836ms ago: executing program 2 (id=9): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000c"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000780)='kfree\x00', r2}, 0x18) r3 = syz_io_uring_setup(0x1104, &(0x7f0000000300)={0x0, 0x0, 0x400, 0x0, 0x8000021e}, &(0x7f00000001c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x1}) io_uring_enter(r3, 0x47fa, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_SEND={0x1a, 0x30, 0x0, r0, 0x0, 0x0, 0x0, 0x60040815, 0xec618f0018aa0bbd}) 0s ago: executing program 1 (id=10): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x80, 0x5, 0x7fff0003}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000440)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c560a0677bc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010000081000418e00000004fcff", 0x58}], 0x1) read(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="600000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000400012800e00010069703665727370616e0000002c0002801400050000000000000000000000000000000002050016000200000004001200050017"], 0x60}}, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x20000023896) close(r6) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0xc100, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@newtaction={0x18, 0x30, 0xb, 0x0, 0x25dfdbfb, {}, [{0x4}]}, 0x18}}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.104' (ED25519) to the list of known hosts. [ 26.343607][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 26.343621][ T29] audit: type=1400 audit(1766975134.844:70): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.372494][ T29] audit: type=1400 audit(1766975134.874:71): avc: denied { mount } for pid=3307 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.373146][ T3307] cgroup: Unknown subsys name 'net' [ 26.400361][ T29] audit: type=1400 audit(1766975134.904:72): avc: denied { unmount } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.600643][ T3307] cgroup: Unknown subsys name 'cpuset' [ 26.606608][ T3307] cgroup: Unknown subsys name 'rlimit' [ 26.776636][ T29] audit: type=1400 audit(1766975135.274:73): avc: denied { setattr } for pid=3307 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.800722][ T29] audit: type=1400 audit(1766975135.274:74): avc: denied { create } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.815879][ T3309] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.821192][ T29] audit: type=1400 audit(1766975135.274:75): avc: denied { write } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.850124][ T29] audit: type=1400 audit(1766975135.274:76): avc: denied { read } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.870410][ T29] audit: type=1400 audit(1766975135.284:77): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.888173][ T3307] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.895243][ T29] audit: type=1400 audit(1766975135.284:78): avc: denied { mount } for pid=3307 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.927291][ T29] audit: type=1400 audit(1766975135.304:79): avc: denied { read } for pid=3046 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 28.864161][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 28.882774][ T3323] chnl_net:caif_netlink_parms(): no params data found [ 28.891290][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 28.912161][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 29.003563][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.010657][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.017824][ T3318] bridge_slave_0: entered allmulticast mode [ 29.024154][ T3318] bridge_slave_0: entered promiscuous mode [ 29.034967][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.042091][ T3323] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.049279][ T3323] bridge_slave_0: entered allmulticast mode [ 29.055676][ T3323] bridge_slave_0: entered promiscuous mode [ 29.070019][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.077117][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.084265][ T3316] bridge_slave_0: entered allmulticast mode [ 29.090572][ T3316] bridge_slave_0: entered promiscuous mode [ 29.097026][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.104200][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.111483][ T3318] bridge_slave_1: entered allmulticast mode [ 29.117758][ T3318] bridge_slave_1: entered promiscuous mode [ 29.128278][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.135349][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.142678][ T3323] bridge_slave_1: entered allmulticast mode [ 29.148865][ T3323] bridge_slave_1: entered promiscuous mode [ 29.156818][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.164030][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.171148][ T3316] bridge_slave_1: entered allmulticast mode [ 29.177361][ T3316] bridge_slave_1: entered promiscuous mode [ 29.187863][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.194952][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.202100][ T3320] bridge_slave_0: entered allmulticast mode [ 29.208665][ T3320] bridge_slave_0: entered promiscuous mode [ 29.227831][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.234927][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.242151][ T3320] bridge_slave_1: entered allmulticast mode [ 29.248482][ T3320] bridge_slave_1: entered promiscuous mode [ 29.272175][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.281262][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 29.295043][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.305199][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.318061][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.327797][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.337850][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.347770][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.373259][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.395330][ T3318] team0: Port device team_slave_0 added [ 29.411844][ T3316] team0: Port device team_slave_0 added [ 29.418216][ T3318] team0: Port device team_slave_1 added [ 29.428156][ T3323] team0: Port device team_slave_0 added [ 29.434531][ T3320] team0: Port device team_slave_0 added [ 29.444620][ T3316] team0: Port device team_slave_1 added [ 29.454927][ T3323] team0: Port device team_slave_1 added [ 29.461131][ T3320] team0: Port device team_slave_1 added [ 29.496719][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.503718][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.529799][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.549759][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.556955][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.564138][ T3321] bridge_slave_0: entered allmulticast mode [ 29.570774][ T3321] bridge_slave_0: entered promiscuous mode [ 29.577390][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.584351][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.610292][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.621376][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.628310][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.654235][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.665388][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.672336][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.698345][ T3323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.709335][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.716365][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.742254][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.753153][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.760252][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.767517][ T3321] bridge_slave_1: entered allmulticast mode [ 29.774022][ T3321] bridge_slave_1: entered promiscuous mode [ 29.780635][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.787554][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.813442][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.826766][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.833768][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.859679][ T3323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.870507][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.877451][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 29.903348][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.924299][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.948307][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 30.000399][ T3323] hsr_slave_0: entered promiscuous mode [ 30.006414][ T3323] hsr_slave_1: entered promiscuous mode [ 30.013216][ T3321] team0: Port device team_slave_0 added [ 30.020483][ T3316] hsr_slave_0: entered promiscuous mode [ 30.026358][ T3316] hsr_slave_1: entered promiscuous mode [ 30.032140][ T3316] debugfs: 'hsr0' already exists in 'hsr' [ 30.037891][ T3316] Cannot create hsr debugfs directory [ 30.045445][ T3318] hsr_slave_0: entered promiscuous mode [ 30.051401][ T3318] hsr_slave_1: entered promiscuous mode [ 30.057149][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 30.062972][ T3318] Cannot create hsr debugfs directory [ 30.074293][ T3320] hsr_slave_0: entered promiscuous mode [ 30.080310][ T3320] hsr_slave_1: entered promiscuous mode [ 30.086100][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 30.091845][ T3320] Cannot create hsr debugfs directory [ 30.097967][ T3321] team0: Port device team_slave_1 added [ 30.137175][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 30.144195][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.170170][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 30.193446][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 30.200442][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 30.226346][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 30.303281][ T3321] hsr_slave_0: entered promiscuous mode [ 30.309330][ T3321] hsr_slave_1: entered promiscuous mode [ 30.315147][ T3321] debugfs: 'hsr0' already exists in 'hsr' [ 30.320863][ T3321] Cannot create hsr debugfs directory [ 30.418226][ T3320] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 30.431234][ T3320] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 30.444063][ T3320] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 30.454341][ T3320] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 30.471353][ T3323] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 30.486964][ T3323] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 30.495538][ T3323] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 30.507498][ T3323] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 30.518087][ T3318] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 30.528407][ T3318] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 30.538546][ T3318] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 30.548724][ T3318] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 30.576170][ T3316] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 30.584701][ T3316] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 30.600238][ T3316] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 30.609072][ T3316] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 30.647348][ T3321] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 30.661220][ T3321] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 30.672495][ T3321] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 30.681613][ T3321] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 30.717840][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.740758][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.748963][ T3323] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.768189][ T61] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.775351][ T61] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.783588][ T61] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.790692][ T61] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.801018][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.811722][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.826723][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.833845][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.855620][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.863874][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.870931][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.880644][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.898889][ T1087] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.906034][ T1087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.916054][ T1087] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.923231][ T1087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.934209][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.948772][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.955833][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.968314][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.979066][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.986194][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.006296][ T3320] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 31.016774][ T3320] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.037543][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.070010][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.077156][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.092010][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.099197][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.121704][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.133622][ T3316] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 31.161450][ T3323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.210662][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.276592][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.368433][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 31.389724][ T3320] veth0_vlan: entered promiscuous mode [ 31.411909][ T3320] veth1_vlan: entered promiscuous mode [ 31.435908][ T3318] veth0_vlan: entered promiscuous mode [ 31.452761][ T3323] veth0_vlan: entered promiscuous mode [ 31.464621][ T3316] veth0_vlan: entered promiscuous mode [ 31.475020][ T3318] veth1_vlan: entered promiscuous mode [ 31.485769][ T3323] veth1_vlan: entered promiscuous mode [ 31.495347][ T3316] veth1_vlan: entered promiscuous mode [ 31.512550][ T3320] veth0_macvtap: entered promiscuous mode [ 31.527044][ T3320] veth1_macvtap: entered promiscuous mode [ 31.539464][ T3318] veth0_macvtap: entered promiscuous mode [ 31.553304][ T3318] veth1_macvtap: entered promiscuous mode [ 31.563296][ T3321] veth0_vlan: entered promiscuous mode [ 31.575449][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.583321][ T3323] veth0_macvtap: entered promiscuous mode [ 31.593816][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.603779][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.611595][ T3316] veth0_macvtap: entered promiscuous mode [ 31.618987][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.629056][ T3323] veth1_macvtap: entered promiscuous mode [ 31.635809][ T3321] veth1_vlan: entered promiscuous mode [ 31.644823][ T2712] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.654102][ T3316] veth1_macvtap: entered promiscuous mode [ 31.660792][ T2712] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.673006][ T2712] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.684261][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.695505][ T2712] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.708288][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.717417][ T2712] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.728504][ T2712] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.738384][ T2712] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.747219][ T2712] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.759554][ T50] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.769709][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.781780][ T50] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.796862][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 31.796877][ T29] audit: type=1400 audit(1766975140.294:90): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/root/syzkaller.5wdfzA/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 31.827458][ T29] audit: type=1400 audit(1766975140.294:91): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 31.849445][ T29] audit: type=1400 audit(1766975140.294:92): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/root/syzkaller.5wdfzA/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 31.874679][ T29] audit: type=1400 audit(1766975140.294:93): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 31.896440][ T29] audit: type=1400 audit(1766975140.294:94): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/root/syzkaller.5wdfzA/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 31.922944][ T29] audit: type=1400 audit(1766975140.294:95): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/root/syzkaller.5wdfzA/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 31.950264][ T29] audit: type=1400 audit(1766975140.294:96): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 31.970538][ T29] audit: type=1400 audit(1766975140.324:97): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 31.993266][ T29] audit: type=1400 audit(1766975140.324:98): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="gadgetfs" ino=4637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 32.018621][ T3318] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 32.024735][ T3321] veth0_macvtap: entered promiscuous mode [ 32.041469][ T50] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.050295][ T50] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.068335][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.071122][ T29] audit: type=1400 audit(1766975140.564:99): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 32.111874][ T1819] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.120995][ T3321] veth1_macvtap: entered promiscuous mode [ 32.139668][ T1819] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.152928][ T3490] vhci_hcd vhci_hcd.4: default hub control req: c50a v0303 i0004 l0 [ 32.161636][ T1819] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.193027][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 32.219803][ T1819] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.244713][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 32.259286][ T3488] loop3: detected capacity change from 0 to 4096 [ 32.271377][ T61] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.326175][ T3488] EXT4-fs: Ignoring removed nomblk_io_submit option [ 32.342396][ T61] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.383026][ T3488] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 32.387629][ T61] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.439388][ T61] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.469502][ T3511] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2'. [ 32.500787][ T3500] netlink: 'syz.4.5': attribute type 5 has an invalid length. [ 32.507927][ T3512] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3'. [ 32.517388][ T3511] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1017 sclass=netlink_route_socket pid=3511 comm=syz.1.2 [ 32.546926][ T3511] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2'. [ 32.761160][ T3524] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=56 sclass=netlink_route_socket pid=3524 comm=syz.3.4 [ 32.826440][ T3522] cgroup: fork rejected by pids controller in /syz2 [ 32.834135][ T2] ================================================================== [ 32.842224][ T2] BUG: KCSAN: data-race in copy_process / free_pid [ 32.848735][ T2] [ 32.851060][ T2] read-write to 0xffffffff86860008 of 4 bytes by task 3522 on cpu 1: [ 32.859123][ T2] free_pid+0xb9/0x1d0 [ 32.863197][ T2] copy_process+0x1177/0x1ef0 [ 32.867874][ T2] create_io_thread+0x71/0xa0 [ 32.872551][ T2] create_io_worker+0xdf/0x360 [ 32.877309][ T2] io_wq_enqueue+0x2c1/0x3a0 [ 32.881910][ T2] io_queue_iowq+0x208/0x2f0 [ 32.886508][ T2] io_queue_sqe_fallback+0xe6/0x140 [ 32.891705][ T2] io_submit_sqes+0xd8d/0x11b0 [ 32.896476][ T2] __se_sys_io_uring_enter+0x1bd/0x1a30 [ 32.902030][ T2] __x64_sys_io_uring_enter+0x78/0x90 [ 32.907430][ T2] x64_sys_call+0x27e4/0x3000 [ 32.912110][ T2] do_syscall_64+0xca/0x2b0 [ 32.916619][ T2] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 32.922514][ T2] [ 32.924832][ T2] read to 0xffffffff86860008 of 4 bytes by task 2 on cpu 0: [ 32.932110][ T2] copy_process+0x16d4/0x1ef0 [ 32.936787][ T2] kernel_clone+0x16c/0x5c0 [ 32.941288][ T2] kernel_thread+0xad/0xe0 [ 32.945703][ T2] kthreadd+0x26c/0x340 [ 32.949869][ T2] ret_from_fork+0x149/0x290 [ 32.954464][ T2] ret_from_fork_asm+0x1a/0x30 [ 32.959232][ T2] [ 32.961549][ T2] value changed: 0x80000106 -> 0x80000105 [ 32.967255][ T2] [ 32.969575][ T2] Reported by Kernel Concurrency Sanitizer on: [ 32.975716][ T2] CPU: 0 UID: 0 PID: 2 Comm: kthreadd Not tainted syzkaller #0 PREEMPT(voluntary) [ 32.985001][ T2] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 32.995067][ T2] ================================================================== [ 33.019851][ T3504] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6'. [ 33.033211][ T3504] team0: Port device team_slave_1 removed [ 33.101036][ T3836] netlink: 'syz.1.10': attribute type 5 has an invalid length. [ 33.188446][ T3318] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.