last executing test programs: 12.611749243s ago: executing program 0 (id=154): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x9, 0x7, 0x0, 0x0, 0x0, 0x40008, 0x590, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x14c58, 0x4, 0x0, 0x0, 0x8, 0x4ac, 0xb, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x13, r0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x11, 0x10, &(0x7f00000003c0)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x4, &(0x7f0000002500)=""/4105, 0x0, 0x68}, 0x94) 12.593038604s ago: executing program 0 (id=156): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)={0xa, 0x4e26, 0x7, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x4}}, 0xa}, 0x1c, 0x0}}], 0x1, 0x200880c0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$cgroup_type(r1, &(0x7f0000000040), 0x9) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3d, 0x0, &(0x7f0000000000)) 12.576824114s ago: executing program 0 (id=157): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8080}, 0x88, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000440)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000140)=ANY=[@ANYBLOB="440000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d616376746170000400028008000500", @ANYRES32=r3], 0x44}}, 0x0) 12.548760837s ago: executing program 0 (id=159): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) setns(r2, 0x24020000) umount2(&(0x7f0000000040)='.\x00', 0x2) ioctl$TIOCGPTPEER(r0, 0x5441, 0x3ff) 12.528702957s ago: executing program 0 (id=161): faccessat(0xffffffffffffffff, 0x0, 0x5) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x10) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 12.504071779s ago: executing program 0 (id=163): sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x1}}, 0x80, 0x0, 0xfffffe08}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001800599c6d0e00009bd029ef8020ab070011000523a608463a3f"], 0xfe33) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0, 0x0, 0x0, 0x5c8}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce620300fe"], 0xfe1b) r0 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001800599c6d0eab070004000523"], 0xfe33) 1.181240001s ago: executing program 4 (id=526): socket(0x2, 0xa, 0x300) socket$kcm(0x2, 0xa, 0x2) socket$kcm(0x2, 0xa, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/190, 0xbe}], 0x1, 0x70, 0x0) 1.137618944s ago: executing program 4 (id=527): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001300)=@newtfilter={0x884, 0x2c, 0xd27, 0x70bd25, 0x2, {0x0, 0x0, 0x0, r2, {0x0, 0xc}, {0x0, 0xfff1}, {0xc, 0x4}}, [@filter_kind_options=@f_route={{0xa}, {0x854, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0xca}, @TCA_ROUTE4_POLICE={0x848, 0x5, [@TCA_POLICE_RATE={0x404, 0x2, [0x6, 0x7ff, 0xad04, 0xffffffff, 0x101, 0x9, 0x40, 0x1b12, 0x2, 0x2, 0x6, 0xe, 0x9e, 0x10001, 0x0, 0x4, 0x5, 0x1800000, 0x3, 0x0, 0x6, 0x5, 0x7fffffff, 0x3, 0x80e2b7, 0xffff, 0xffffffa9, 0x200, 0xf, 0xfffff758, 0x0, 0x2, 0x80, 0x200, 0xbe, 0x3, 0x800, 0x5, 0x100, 0x0, 0xb5, 0xb, 0x2, 0x8, 0x0, 0x6, 0x0, 0x5, 0x5, 0x200, 0x2, 0x1, 0x1ff, 0x3, 0x0, 0x4, 0xa, 0x3, 0x8, 0x7, 0x401, 0x74, 0x4, 0xfff, 0x5, 0x7, 0x7a, 0x50, 0xfffffae9, 0x8, 0x91, 0x10000, 0x9, 0x7, 0x3, 0x9, 0xfffffffe, 0x5, 0x6, 0xffffffff, 0x7, 0x2, 0x2, 0x1, 0x3, 0x3, 0x7613, 0x7ff, 0x4, 0x0, 0x9, 0x5, 0x7, 0xda5d, 0x4, 0x101, 0x7, 0xe, 0x101, 0x10, 0x5, 0x62b39d84, 0x1, 0x4, 0x4, 0x788c, 0xd7, 0xc0d9, 0x3, 0x4, 0x3, 0xffff, 0x400, 0x500000, 0x6, 0x445f, 0xffff, 0x2323da5a, 0x5, 0x3, 0x2, 0x7, 0x6, 0x9, 0x3, 0x2, 0xe, 0x5, 0x81, 0x200000, 0x81, 0x9, 0xb50, 0x9, 0x9, 0xffffff81, 0x9, 0x4, 0x1, 0x200, 0x7, 0x8, 0x4, 0x7fffffff, 0x1, 0x1, 0xb, 0x1, 0xfffffbed, 0x8, 0xffff, 0x8, 0x0, 0x1, 0x7, 0xa220, 0x0, 0x4, 0x8, 0x4, 0x9, 0xea8a, 0x54c, 0x2, 0xfffffff7, 0x7, 0x8, 0x80000000, 0x4, 0x0, 0x0, 0xb, 0x4, 0x5, 0x604, 0x0, 0xfffffff7, 0x2, 0x8, 0x5, 0xfff, 0x1, 0xf, 0x1, 0x1, 0x3, 0xef2, 0x4, 0x8001, 0xf2d8, 0x6, 0x7, 0x7, 0x62d, 0x0, 0x2555, 0x6, 0xd, 0x8, 0x32f4, 0x8, 0x6, 0x7, 0x0, 0xd981, 0x7f, 0x63, 0x1, 0x8, 0xfff, 0xffff, 0xc, 0x3ff, 0x4, 0x2, 0x1000, 0x4, 0x3ff, 0x7ff, 0x4, 0xe, 0xe, 0xffffff05, 0x4, 0x2, 0xffffffff, 0x4, 0x8, 0x5, 0x101, 0x9, 0x4, 0x5, 0xfffffffd, 0x2ae, 0x0, 0x9, 0x4, 0xffffffff, 0x2, 0xe, 0x1, 0x401, 0x3, 0x9, 0x6, 0x11, 0x7, 0x0, 0x1, 0x6, 0x1, 0x7, 0x2, 0x2, 0x1000]}, @TCA_POLICE_PEAKRATE={0x3d8, 0x3, [0x7f, 0x1, 0x1, 0x4000006, 0x5, 0x465ed2bd, 0x7, 0x98, 0x2, 0x8e, 0x7, 0x6, 0x8, 0x800, 0x2, 0x6, 0x6, 0x2, 0x3, 0x1, 0x3, 0x2, 0x4, 0x8, 0x2, 0x5, 0x0, 0x9, 0x3, 0xc8, 0x3, 0x8, 0x5, 0xfffffff9, 0x7, 0x81, 0x0, 0x2, 0x10000, 0xa, 0xfffffffe, 0x1, 0x0, 0x7fffffff, 0xfe1, 0x8001, 0x5, 0x40, 0xffffffff, 0x4, 0x7fff, 0x3ff, 0x7, 0x3, 0x8, 0x0, 0x2, 0x7, 0x27, 0x6, 0x2, 0x6, 0x6, 0xe, 0x80000001, 0x4, 0x9, 0x1, 0x1, 0x3, 0x9, 0x3, 0x9, 0x0, 0x81, 0xe585, 0x0, 0x64, 0x3, 0x800, 0x3, 0x80000001, 0x1, 0x6, 0xffffffd8, 0xffffff1e, 0x3ff, 0x0, 0x8, 0x8, 0x9, 0x2, 0xf8f9, 0x2, 0x7f, 0xfffffd43, 0xfffffffa, 0x5, 0x1, 0xffffffff, 0x5, 0x2, 0x3, 0x2, 0x9, 0x0, 0x4, 0x5, 0xffffffff, 0x6, 0x7fffffff, 0x4, 0x8, 0xa8, 0x7, 0x1, 0x6, 0x71, 0x7, 0x0, 0x10, 0x1, 0x400, 0x4, 0x100, 0xffffffec, 0x6, 0x7, 0x83, 0x101, 0x0, 0x9, 0x6, 0x80000001, 0x4, 0x4, 0x0, 0x9, 0x8, 0x2, 0x7, 0x2, 0xff, 0x7fffffff, 0x81, 0x3, 0x4, 0xd, 0x3, 0x6, 0x7fff, 0x2, 0x7ff, 0x88, 0x7, 0x5, 0x0, 0x1, 0x7, 0x8, 0x6, 0x2, 0x800, 0x9, 0x0, 0x2, 0x3, 0x0, 0x9, 0x8, 0xb0, 0x2b88, 0xfffffc00, 0x61, 0x800000, 0x2, 0x4, 0x3, 0x2, 0xfffffff8, 0x8, 0x8, 0x7, 0x1, 0x2, 0xffff, 0xec, 0x6, 0x0, 0x30a, 0x6, 0x5, 0x3, 0x1, 0xc, 0x6, 0x1, 0x5, 0x80000000, 0x0, 0x1ff, 0x0, 0xffffff7f, 0x6, 0xca9e, 0xaf0, 0x1c40, 0x7, 0x3, 0x5, 0x0, 0x1, 0x5, 0xfffffffe, 0x7, 0x80000001, 0x0, 0x6f6, 0x5, 0x98, 0x1, 0x1600, 0x80000000, 0x6, 0x0, 0x57, 0x7, 0x8, 0x24, 0x8, 0x7fff, 0x5, 0x1, 0x4, 0x1, 0x3, 0x7, 0x1, 0xffffffff, 0xa412, 0x15, 0x400, 0x0, 0xf, 0x4fd9, 0x9, 0x0, 0x4, 0x0, 0xc7, 0x0, 0x80, 0x0, 0x7fffffff, 0x1ec, 0x4]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x4, 0x2, 0x4, 0x89, 0x4, {0x10, 0x0, 0x4, 0xc, 0xf000, 0x4}, {0x6, 0x0, 0x1, 0xff4f, 0x10, 0xa}, 0x400, 0xfffffffd, 0x8}}]}]}}]}, 0x884}}, 0x0) 1.073378648s ago: executing program 4 (id=528): unshare(0x6a040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, 0x0, &(0x7f0000001480)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000c00)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x160, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@remote, @private1={0xfc, 0x1, '\x00', 0x1}, [0x0, 0xffffffff, 0xff], [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], 'gre0\x00', 'veth1_virt_wifi\x00', {0xff}, {}, 0x3c, 0x9, 0x0, 0x50}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "978888d6ee9e7a5e4bc76ccf4228733e737d402fc4a91c346e4f9a692f63"}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@private2, @private1={0xfc, 0x1, '\x00', 0x1}, [0x0, 0xffffff00, 0x0, 0xfffffefe], [0xffffff00, 0xff, 0xff, 0xff000000], 'bridge_slave_0\x00', 'ip6tnl0\x00', {}, {0xff}, 0x1, 0x2, 0x2, 0x1}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 724.244878ms ago: executing program 2 (id=532): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000001940)='./file0/file1\x00', 0x90) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000100)='./file0/file1\x00') rmdir(&(0x7f0000000000)='./file0\x00') rename(&(0x7f0000000440)='./file0/file1\x00', &(0x7f0000000480)='./file0\x00') 693.14123ms ago: executing program 3 (id=534): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001300)=@newtfilter={0x88c, 0x2c, 0xd27, 0x70bd25, 0x80002, {0x0, 0x0, 0x0, r2, {0x0, 0x1}, {}, {0x3, 0x2}}, [@filter_kind_options=@f_bpf={{0x8}, {0x860, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0xe4}, {0x4}}, @TCA_BPF_POLICE={0x848, 0x2, [@TCA_POLICE_TBF={0x3c, 0x1, {0x5, 0x2, 0x3, 0xf2, 0x6, {0x6, 0x1, 0xf, 0x6, 0xf, 0x4}, {0x7, 0x0, 0x0, 0x3, 0x4, 0xd}, 0x8fc, 0x7, 0x904}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7, 0x5, 0x1, 0x4, 0xb5, 0x2, 0x4, 0x8, 0x18cb, 0x0, 0x9, 0xfffffbff, 0x0, 0x6, 0xb11a, 0x3, 0x4, 0x2, 0xf, 0x6, 0x5e, 0x5, 0xf, 0x2, 0x9c3, 0xe2, 0x4, 0x4, 0x3, 0xe, 0x9, 0x6, 0x8, 0xa0ee, 0xcd7e, 0x7, 0x54e, 0x0, 0xb07, 0x4, 0x7254, 0x40, 0x7, 0x342, 0x7ff, 0x4, 0x0, 0x6, 0xffffffdd, 0x7, 0x3, 0x3ff, 0x7fffffff, 0x1ff, 0x800, 0xff, 0x3, 0x4, 0x81, 0x6db8, 0x4, 0x7, 0x400, 0x3, 0x4, 0x10, 0x8, 0x40, 0x81, 0x2, 0x548, 0x8, 0x7, 0x5, 0x7, 0x6, 0xfffffbff, 0x7fffffff, 0x2c, 0x0, 0x5, 0x200, 0x5, 0x200, 0x100, 0xcb, 0x1ff, 0x9a22, 0x50000, 0xfffffffd, 0x5, 0x1, 0xfffffffd, 0x73af, 0x7, 0x9, 0x4, 0x200, 0x0, 0x2, 0x4, 0xf, 0x0, 0x1, 0xfff, 0x9, 0x4, 0x10, 0x6, 0x0, 0x10, 0x3, 0x4, 0x4, 0x5, 0x4, 0x7, 0x7, 0x40, 0x80000001, 0x4f72, 0x9, 0x2, 0x9, 0x1, 0x9a98, 0x6, 0x6, 0x0, 0x8, 0x3ff, 0x8, 0x6, 0x5, 0x101, 0x3, 0x3, 0xdfffe, 0x1, 0x140, 0x2, 0x2, 0x8, 0x1, 0x2, 0x10000, 0x3, 0x10, 0x8, 0x3, 0x40, 0x1, 0x3, 0xd701, 0xb, 0x1, 0x4, 0x6, 0x0, 0x0, 0xb8, 0x7, 0x79d, 0xff, 0xffffffff, 0x7, 0xdc68, 0x7, 0xbe3, 0x2, 0x10000, 0x80c, 0x7, 0xca, 0x43, 0x40000000, 0x3, 0x8, 0x7, 0xb, 0x80000000, 0xdc, 0x10000, 0x3, 0x7, 0xffffff9d, 0x5, 0xcc, 0x5, 0x7fff, 0x0, 0x2, 0x2ed2, 0x2, 0xd497, 0x1, 0x3, 0x4, 0x1, 0x0, 0x800000, 0xecf, 0xebe8, 0x6, 0x9, 0x7, 0xfe00, 0x6, 0x26a, 0x80000000, 0x6, 0x5, 0x100, 0x3, 0xfffffff9, 0x0, 0x200, 0x0, 0x9398, 0x0, 0x5, 0xfff, 0x4c0d, 0x1, 0xff, 0x7ff, 0xbb7, 0x9, 0x8, 0xe, 0x2, 0x1, 0xfffeffff, 0x9, 0x672c, 0xfffffffd, 0x8372, 0x4, 0x4, 0xb, 0x7, 0xffffffff, 0x3ff, 0x9, 0x8, 0xe88, 0x9, 0x4, 0xffff, 0x2, 0x6, 0xffff, 0x6, 0x3, 0x41, 0x5]}, @TCA_POLICE_RATE={0x404, 0x2, [0x7ff, 0x80000001, 0xe, 0x7f, 0x9, 0x1ffc00, 0x9, 0x9, 0x5, 0x80000000, 0x1, 0xfffffffe, 0x1, 0x8, 0x2, 0x100, 0x3, 0x1, 0x8, 0x8, 0x1, 0x1, 0x100, 0x2, 0x2, 0x9, 0x2, 0x8, 0x8b, 0xd8, 0x1, 0x5, 0xbd5e, 0x3, 0x9, 0x7, 0x0, 0xb1, 0x80000001, 0xffff58a7, 0x2, 0x1, 0x31, 0xa18e, 0x8, 0xc93, 0x3, 0x1, 0x2a3, 0xb, 0x4, 0x5, 0x9, 0x1, 0x8, 0x8, 0x20000000, 0x8, 0xb8, 0xa, 0x7ac8, 0x70dc, 0x9, 0x0, 0x6, 0x4, 0x1, 0x6a, 0x7ff, 0xa, 0x4f040ab5, 0x4, 0x80000001, 0x8, 0x8, 0x4, 0x5, 0x31, 0x1, 0x200, 0x5, 0x5, 0x8, 0x32, 0x0, 0x1ff, 0x9, 0x5f8, 0x4, 0x9, 0x8, 0x4, 0x80000000, 0xfffffff8, 0x200, 0x7f, 0x6, 0x8, 0x7, 0x4, 0x8a, 0x5, 0x8, 0x6, 0x40, 0x7, 0x6, 0xbf, 0x8, 0x101, 0x2, 0x7, 0x2a, 0x9, 0x2, 0x1ff, 0x800, 0x3, 0x4, 0x9, 0x3, 0xa, 0x3, 0x2, 0x599c, 0x4, 0x9, 0x7, 0x100, 0x6, 0xc00000, 0x7, 0x9, 0x4, 0xffffffff, 0x6, 0x10001, 0x5c540000, 0x40, 0xffffb13b, 0x4, 0x8, 0x1, 0x80c, 0xd, 0x800, 0x5, 0x7, 0x3, 0x7e6, 0x8, 0x7, 0x1, 0xff01, 0x1, 0xa, 0xa, 0xffffffff, 0x4, 0x1, 0x8f35, 0x9, 0x3, 0x20, 0xfffffffa, 0xfffffffe, 0x2, 0x7000000, 0x4, 0x8, 0x8, 0x4, 0x9, 0x8001, 0x2, 0xffffffff, 0x1, 0x0, 0x7f, 0xb12, 0x9, 0x1, 0x8000, 0xfffffa5a, 0x1, 0xbe5, 0xc, 0x0, 0xc6, 0x3, 0x9, 0x80000000, 0x5, 0x9, 0x10, 0xfffffffd, 0x9, 0x6, 0x8, 0xfffffff8, 0xe5, 0x1, 0x4, 0x1, 0x4, 0x7, 0xf2, 0x8, 0x90, 0xc, 0xf2, 0x7582, 0x86, 0x6de, 0x8e, 0x8000, 0x8, 0x3e91, 0x1, 0x7, 0x80, 0x0, 0x8, 0x3, 0x2, 0x101, 0x9, 0x2, 0x2, 0x7, 0x0, 0x6, 0xffff5365, 0x3, 0xd042, 0x2, 0x8001, 0x8, 0xffffffff, 0x3, 0x0, 0x5, 0x6, 0x4, 0x7, 0xa, 0x2, 0xffffff7f, 0x7, 0x1, 0x1, 0x5, 0x6, 0x9, 0x77, 0x10001]}]}, @TCA_BPF_FLAGS={0x8, 0x8, 0x1}]}}]}, 0x88c}, 0x1, 0x0, 0x0, 0x4008081}, 0x0) 604.487455ms ago: executing program 3 (id=535): r0 = syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") openat(r0, 0x0, 0x80000, 0x80) r1 = socket$inet(0x2, 0x3, 0x100) bind$inet(r1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00') 555.793888ms ago: executing program 3 (id=536): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000180100002020692500000000002060207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r0}, 0xc) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xc, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1f, 0x11, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 510.050281ms ago: executing program 3 (id=537): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x51483}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gre={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_TYPE={0x6, 0xe, 0x1}, @IFLA_GRE_LOCAL={0x8, 0x6, @local}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmmsg$inet(r0, &(0x7f0000000880)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @empty, @multicast1}}}], 0x20}}], 0x1, 0x4880) 483.128172ms ago: executing program 4 (id=538): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f00006ec000/0x1000)=nil, &(0x7f00002c7000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000559000/0x4000)=nil, &(0x7f000008d000/0x1000)=nil, &(0x7f00005e2000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f000021a000/0x1000)=nil, &(0x7f00005e1000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x6aab, &(0x7f0000000040)={0x0, 0xc8a3, 0xc000, 0x1, 0xc1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001a"], 0x24}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)='\"', 0xfdef) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 442.861115ms ago: executing program 4 (id=540): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) setsockopt$sock_linger(r0, 0x1, 0x3d, &(0x7f0000000000)={0x0, 0xcb}, 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 416.089086ms ago: executing program 1 (id=541): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x7) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc)=0xfffffffe, 0x3, 0x801, 0x0, &(0x7f0000000040), 0xfffffffc) 214.461518ms ago: executing program 1 (id=542): setresuid(0xee01, 0xee01, 0x0) syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgid(0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000140)={0x2, r2}) sendmmsg$unix(r0, &(0x7f0000006c40)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="11", 0x1}], 0x1}}], 0x1, 0x4040011) 214.110108ms ago: executing program 3 (id=543): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3000046, &(0x7f0000000bc0)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@nojournal_checksum}, {@errors_remount}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@nombcache}, {@errors_remount}]}, 0x11, 0x553, &(0x7f0000001080)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x123242, 0x0) pwrite64(r0, &(0x7f00000005c0)='\"', 0x1, 0x4fed0) r1 = open(&(0x7f0000000240)='./file1\x00', 0x2c102, 0x66) lsetxattr(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)=@random={'security.', 'delalloc'}, &(0x7f0000000100)='data_err=abort', 0xe, 0x1) sendfile(r1, r1, 0x0, 0x800000009) 154.241252ms ago: executing program 2 (id=544): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b82, 0x0, @perf_bp={0x0, 0x1}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x6, 0x7, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) socket$nl_rdma(0x10, 0x3, 0x14) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x2002, 0x0) syz_genetlink_get_family_id$ethtool(0x0, r0) r1 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0xfc, 0x6, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x12, r1, 0xc53de000) 153.552512ms ago: executing program 1 (id=554): r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x30, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x46) write$qrtrtun(r0, &(0x7f00000006c0)="66bb0b760dc0f4ff2d", 0x9) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r2, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=[0x7], 0x0, 0x0, 0x1}}, 0x40) 129.709913ms ago: executing program 1 (id=545): unshare(0x24060400) creat(&(0x7f0000000100)='./file0\x00', 0x3c) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, 0x0, &(0x7f0000000040)) 129.043223ms ago: executing program 3 (id=556): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) remap_file_pages(&(0x7f00005fd000/0x4000)=nil, 0x4000, 0x0, 0x5, 0x20000) sync() 126.089373ms ago: executing program 2 (id=546): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000440)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x3c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@ccm_128={{0x304}, "25beb819521eb41d", "cae5e9937ba539347092dd17d39ed975", 'LP3F', "50f641306280c4e9"}, 0x28) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000080)=0xffff0000, 0x4) 102.011124ms ago: executing program 4 (id=547): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x10, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0xca02}) r1 = socket$netlink(0x10, 0x3, 0x0) preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000280)=""/162}, {&(0x7f0000000000)=""/33}, {&(0x7f0000000140)=""/44, 0x4}], 0x4e, 0x300, 0x8000) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) 84.588275ms ago: executing program 2 (id=548): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 79.539756ms ago: executing program 1 (id=549): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000240), 0x12) pread64(r2, &(0x7f0000001840)=""/4096, 0x1000, 0x6e) 38.269028ms ago: executing program 2 (id=550): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0x0) prctl$PR_SET_MM_MAP(0x22, 0xe, 0x0, 0xfffffffffffffd98) 31.394579ms ago: executing program 1 (id=551): prctl$PR_SET_SECUREBITS(0x1c, 0x25) setresuid(0xee01, 0xee01, 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x1d2) fcntl$setlease(r0, 0x400, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) cachestat(r0, &(0x7f0000000300)={0x7, 0x1}, &(0x7f00000004c0), 0x0) 0s ago: executing program 2 (id=552): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="19000000040000000800000005"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008900000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={r3, r1, 0x25, 0x0, @val=@tcx}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000200)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x1, 0xb, 0x30, 0x66, 0x0, 0x5, 0x1, 0x0, @remote, @remote}, @redirect={0x5, 0x2, 0x0, @multicast1, {0x5, 0x4, 0x0, 0x2b, 0x0, 0x67, 0x5, 0x29, 0xff, 0x40, @loopback, @dev={0xac, 0x14, 0x14, 0x2b}}}}}}}, 0x0) kernel console output (not intermixed with test programs): [ 19.990105][ T29] audit: type=1400 audit(1769643119.050:62): avc: denied { search } for pid=3195 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.012157][ T29] audit: type=1400 audit(1769643119.050:63): avc: denied { search } for pid=3195 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=477 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.035456][ T29] audit: type=1400 audit(1769643119.050:64): avc: denied { search } for pid=3195 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=481 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.059507][ T29] audit: type=1400 audit(1769643119.050:65): avc: denied { search } for pid=3195 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 20.083749][ T29] audit: type=1400 audit(1769643119.050:66): avc: denied { read open } for pid=3196 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.253' (ED25519) to the list of known hosts. [ 24.345416][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 24.345513][ T29] audit: type=1400 audit(1769643123.400:70): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.346440][ T3300] cgroup: Unknown subsys name 'net' [ 24.351760][ T29] audit: type=1400 audit(1769643123.400:71): avc: denied { mount } for pid=3300 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.403232][ T29] audit: type=1400 audit(1769643123.430:72): avc: denied { unmount } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.548693][ T3300] cgroup: Unknown subsys name 'cpuset' [ 24.554874][ T3300] cgroup: Unknown subsys name 'rlimit' [ 24.704150][ T29] audit: type=1400 audit(1769643123.760:73): avc: denied { setattr } for pid=3300 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.729032][ T29] audit: type=1400 audit(1769643123.760:74): avc: denied { create } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.749743][ T29] audit: type=1400 audit(1769643123.760:75): avc: denied { write } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.770299][ T29] audit: type=1400 audit(1769643123.760:76): avc: denied { read } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 24.777544][ T3302] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.790594][ T29] audit: type=1400 audit(1769643123.770:77): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.824129][ T29] audit: type=1400 audit(1769643123.770:78): avc: denied { mount } for pid=3300 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 24.847556][ T29] audit: type=1400 audit(1769643123.790:79): avc: denied { read } for pid=3041 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 24.889062][ T3300] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.696648][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 26.728853][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 26.786440][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.793543][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.801674][ T3315] bridge_slave_0: entered allmulticast mode [ 26.808495][ T3315] bridge_slave_0: entered promiscuous mode [ 26.816884][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.824003][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.831165][ T3315] bridge_slave_1: entered allmulticast mode [ 26.837753][ T3315] bridge_slave_1: entered promiscuous mode [ 26.849138][ T3319] chnl_net:caif_netlink_parms(): no params data found [ 26.872784][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.889215][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 26.908848][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 26.919143][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.954983][ T3315] team0: Port device team_slave_0 added [ 26.960626][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.967786][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.975252][ T3313] bridge_slave_0: entered allmulticast mode [ 26.981708][ T3313] bridge_slave_0: entered promiscuous mode [ 27.000446][ T3315] team0: Port device team_slave_1 added [ 27.006138][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.013463][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.021159][ T3313] bridge_slave_1: entered allmulticast mode [ 27.027679][ T3313] bridge_slave_1: entered promiscuous mode [ 27.072760][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.080000][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.106954][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.117886][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.125049][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.132385][ T3312] bridge_slave_0: entered allmulticast mode [ 27.139109][ T3312] bridge_slave_0: entered promiscuous mode [ 27.153819][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.167724][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.174705][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.200648][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.211537][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.218690][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.225843][ T3312] bridge_slave_1: entered allmulticast mode [ 27.232772][ T3312] bridge_slave_1: entered promiscuous mode [ 27.249043][ T3319] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.256099][ T3319] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.263442][ T3319] bridge_slave_0: entered allmulticast mode [ 27.269838][ T3319] bridge_slave_0: entered promiscuous mode [ 27.277232][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.286512][ T3319] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.293644][ T3319] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.301769][ T3319] bridge_slave_1: entered allmulticast mode [ 27.308403][ T3319] bridge_slave_1: entered promiscuous mode [ 27.325325][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.332887][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.340878][ T3314] bridge_slave_0: entered allmulticast mode [ 27.347581][ T3314] bridge_slave_0: entered promiscuous mode [ 27.367463][ T3313] team0: Port device team_slave_0 added [ 27.374690][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.384285][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.391517][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.398910][ T3314] bridge_slave_1: entered allmulticast mode [ 27.405452][ T3314] bridge_slave_1: entered promiscuous mode [ 27.412477][ T3313] team0: Port device team_slave_1 added [ 27.433789][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.444518][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.458976][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.469256][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.499696][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.517765][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.524889][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.551135][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.564019][ T3315] hsr_slave_0: entered promiscuous mode [ 27.570304][ T3315] hsr_slave_1: entered promiscuous mode [ 27.576824][ T3314] team0: Port device team_slave_0 added [ 27.583221][ T3312] team0: Port device team_slave_0 added [ 27.589611][ T3314] team0: Port device team_slave_1 added [ 27.599779][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.607004][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.633374][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.649401][ T3312] team0: Port device team_slave_1 added [ 27.670993][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.678089][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.704273][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.715827][ T3319] team0: Port device team_slave_0 added [ 27.723006][ T3319] team0: Port device team_slave_1 added [ 27.745018][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.752022][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.778468][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.805261][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.812295][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.838415][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.854111][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.861137][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.887313][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.913551][ T3313] hsr_slave_0: entered promiscuous mode [ 27.919620][ T3313] hsr_slave_1: entered promiscuous mode [ 27.925723][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 27.931925][ T3313] Cannot create hsr debugfs directory [ 27.943775][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.951125][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.977303][ T3319] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.990194][ T3314] hsr_slave_0: entered promiscuous mode [ 27.996113][ T3314] hsr_slave_1: entered promiscuous mode [ 28.002230][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 28.007957][ T3314] Cannot create hsr debugfs directory [ 28.034213][ T3319] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.041206][ T3319] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.067470][ T3319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.105209][ T3312] hsr_slave_0: entered promiscuous mode [ 28.111474][ T3312] hsr_slave_1: entered promiscuous mode [ 28.117497][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 28.123374][ T3312] Cannot create hsr debugfs directory [ 28.165403][ T3319] hsr_slave_0: entered promiscuous mode [ 28.172046][ T3319] hsr_slave_1: entered promiscuous mode [ 28.178372][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 28.184577][ T3319] Cannot create hsr debugfs directory [ 28.316495][ T3315] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 28.327442][ T3315] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 28.339012][ T3315] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 28.351155][ T3315] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 28.381589][ T3314] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 28.397345][ T3314] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 28.409912][ T3314] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 28.426799][ T3314] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 28.442215][ T3313] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 28.451034][ T3313] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 28.468764][ T3313] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 28.485966][ T3313] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 28.505014][ T3319] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 28.520225][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.527540][ T3319] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 28.541352][ T3319] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 28.556335][ T3319] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 28.577757][ T3312] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 28.591591][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.599339][ T3312] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 28.607783][ T3312] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 28.630018][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.637283][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.649169][ T3312] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 28.665945][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.673204][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.702940][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.723268][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.734959][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.754743][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.761941][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.777281][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.792474][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.799816][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.819647][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.826780][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.840360][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.847467][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.866357][ T3314] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 28.876814][ T3314] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.907203][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.922698][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.937884][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.959436][ T3319] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.984558][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.993298][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.000487][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.013742][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.020825][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.035538][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.042819][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.059716][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.066865][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.095289][ T3312] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 29.105915][ T3312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.136062][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.146590][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.195016][ T3315] veth0_vlan: entered promiscuous mode [ 29.215016][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.235792][ T3315] veth1_vlan: entered promiscuous mode [ 29.282553][ T3315] veth0_macvtap: entered promiscuous mode [ 29.293629][ T3319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.309663][ T3315] veth1_macvtap: entered promiscuous mode [ 29.340682][ T3314] veth0_vlan: entered promiscuous mode [ 29.349918][ T3314] veth1_vlan: entered promiscuous mode [ 29.358751][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.379394][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.401823][ T31] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.415143][ T3314] veth0_macvtap: entered promiscuous mode [ 29.432204][ T31] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.445563][ T31] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.455620][ T3314] veth1_macvtap: entered promiscuous mode [ 29.468649][ T3312] veth0_vlan: entered promiscuous mode [ 29.477511][ T31] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.491443][ T3313] veth0_vlan: entered promiscuous mode [ 29.510804][ T3312] veth1_vlan: entered promiscuous mode [ 29.519641][ T3313] veth1_vlan: entered promiscuous mode [ 29.529223][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.537400][ T3319] veth0_vlan: entered promiscuous mode [ 29.550218][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 29.550232][ T29] audit: type=1400 audit(1769643128.610:90): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/root/syzkaller.I6kFYt/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 29.559903][ T3313] veth0_macvtap: entered promiscuous mode [ 29.594363][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.602177][ T29] audit: type=1400 audit(1769643128.640:91): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 29.614209][ T3313] veth1_macvtap: entered promiscuous mode [ 29.624517][ T29] audit: type=1400 audit(1769643128.640:92): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/root/syzkaller.I6kFYt/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 29.635920][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.655766][ T29] audit: type=1400 audit(1769643128.650:93): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 29.669805][ T3319] veth1_vlan: entered promiscuous mode [ 29.684721][ T29] audit: type=1400 audit(1769643128.650:94): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/root/syzkaller.I6kFYt/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 29.695032][ T3312] veth0_macvtap: entered promiscuous mode [ 29.717164][ T29] audit: type=1400 audit(1769643128.650:95): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/root/syzkaller.I6kFYt/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 29.735318][ T57] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.750635][ T29] audit: type=1400 audit(1769643128.650:96): avc: denied { unmount } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 29.779518][ T29] audit: type=1400 audit(1769643128.650:97): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 29.802872][ T29] audit: type=1400 audit(1769643128.650:98): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="gadgetfs" ino=3725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 29.829153][ T3315] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 29.847409][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.856867][ T57] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.867673][ T57] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.880872][ T29] audit: type=1400 audit(1769643128.940:99): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 29.888948][ T3312] veth1_macvtap: entered promiscuous mode [ 29.917317][ T57] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.939514][ T57] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.952259][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.961420][ T3482] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2'. [ 29.979208][ T3319] veth0_macvtap: entered promiscuous mode [ 29.985663][ T57] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.994653][ T57] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.013956][ T3319] veth1_macvtap: entered promiscuous mode [ 30.033364][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.047878][ T57] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.058184][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.080660][ T3319] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.089883][ T57] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.134958][ T57] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.164105][ T3494] loop1: detected capacity change from 0 to 128 [ 30.167033][ T57] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.181404][ T57] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.202187][ T3494] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 30.230499][ T3494] ext4 filesystem being mounted at /3/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 30.241077][ T57] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.283356][ T57] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.317518][ T57] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.344847][ T3505] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3'. [ 30.369849][ T57] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.382581][ T3505] netlink: 'syz.2.3': attribute type 1 has an invalid length. [ 30.382773][ T3315] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 30.390278][ T3505] netlink: 'syz.2.3': attribute type 2 has an invalid length. [ 30.390291][ T3505] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3'. [ 30.444750][ T3514] Zero length message leads to an empty skb [ 30.484094][ T3520] syz.2.15 uses obsolete (PF_INET,SOCK_PACKET) [ 30.525204][ T3526] loop4: detected capacity change from 0 to 1024 [ 30.551190][ T3530] loop7: detected capacity change from 0 to 16384 [ 30.551897][ T3526] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 30.621474][ T3526] EXT4-fs warning (device loop4): ext4_expand_extra_isize_ea:2858: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 30.665083][ T3543] netlink: 20 bytes leftover after parsing attributes in process `syz.0.25'. [ 30.731415][ T3313] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 30.769744][ T3549] Illegal XDP return value 4294967274 on prog (id 5) dev N/A, expect packet loss! [ 30.860513][ T3560] process 'syz.0.31' launched './file0' with NULL argv: empty string added [ 30.989443][ T3569] af_packet: tpacket_rcv: packet too big, clamped from 26 to 4294967272. macoff=96 [ 30.999021][ T3569] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 1303 [ 31.094586][ T3574] loop2: detected capacity change from 0 to 512 [ 31.114299][ T3574] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 31.127519][ T3574] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 31.202700][ T3574] EXT4-fs (loop2): 1 truncate cleaned up [ 31.209061][ T3574] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 31.363389][ T3583] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3583 comm=syz.4.42 [ 31.383751][ T3312] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.485713][ T3591] loop2: detected capacity change from 0 to 1024 [ 31.498961][ T3591] EXT4-fs: Ignoring removed orlov option [ 31.547534][ T3591] EXT4-fs (loop2): stripe (5) is not aligned with cluster size (16), stripe is disabled [ 31.596944][ T3601] loop4: detected capacity change from 0 to 512 [ 31.617969][ T3601] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 31.633157][ T3607] netlink: 8 bytes leftover after parsing attributes in process `syz.1.54'. [ 31.642161][ T3607] netlink: 8 bytes leftover after parsing attributes in process `syz.1.54'. [ 31.658117][ T3591] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 31.707825][ T3591] syz.2.44 (3591) used greatest stack depth: 9296 bytes left [ 31.730968][ T3312] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.742101][ T3601] EXT4-fs error (device loop4): ext4_free_branches:1023: inode #16: comm syz.4.51: invalid indirect mapped block 4294967295 (level 0) [ 31.757091][ T3617] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 31.771052][ T3601] EXT4-fs error (device loop4): ext4_free_branches:1023: inode #16: comm syz.4.51: invalid indirect mapped block 4294967295 (level 1) [ 31.820412][ T3601] EXT4-fs (loop4): 1 orphan inode deleted [ 31.821796][ T3622] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 31.826474][ T3601] EXT4-fs (loop4): 1 truncate cleaned up [ 31.851574][ T3601] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 31.894068][ T3627] loop1: detected capacity change from 0 to 128 [ 31.931252][ T3627] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 31.955926][ T3627] ext4 filesystem being mounted at /17/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 31.995799][ T3315] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 32.005486][ T3313] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.082091][ T3631] SELinux: failed to load policy [ 32.296169][ T3664] SELinux: Context ñ is not valid (left unmapped). [ 32.331970][ T3657] loop4: detected capacity change from 0 to 8192 [ 32.340230][ T3657] ======================================================= [ 32.340230][ T3657] WARNING: The mand mount option has been deprecated and [ 32.340230][ T3657] and is ignored by this kernel. Remove the mand [ 32.340230][ T3657] option from the mount to silence this warning. [ 32.340230][ T3657] ======================================================= [ 32.532121][ T3687] netlink: 20 bytes leftover after parsing attributes in process `syz.1.86'. [ 32.543014][ T3687] netlink: 20 bytes leftover after parsing attributes in process `syz.1.86'. [ 32.552288][ T3687] netlink: 20 bytes leftover after parsing attributes in process `syz.1.86'. [ 32.608713][ T3691] netlink: 'syz.1.87': attribute type 12 has an invalid length. [ 32.616432][ T3691] netlink: 'syz.1.87': attribute type 29 has an invalid length. [ 32.624239][ T3691] netlink: 148 bytes leftover after parsing attributes in process `syz.1.87'. [ 32.633244][ T3691] netlink: 'syz.1.87': attribute type 1 has an invalid length. [ 32.694539][ C1] hrtimer: interrupt took 72619 ns [ 32.943749][ T3721] netlink: 'syz.0.100': attribute type 19 has an invalid length. [ 32.956150][ T3721] netlink: 'syz.0.100': attribute type 19 has an invalid length. [ 32.958109][ T12] netdevsim netdevsim0 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 32.987949][ T12] netdevsim netdevsim0 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 33.010025][ T12] netdevsim netdevsim0 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 33.025386][ T12] netdevsim netdevsim0 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 33.329134][ T3748] netlink: 'syz.0.110': attribute type 2 has an invalid length. [ 33.500449][ T3765] netlink: 'syz.0.117': attribute type 4 has an invalid length. [ 33.664069][ T3782] team0 (unregistering): Port device team_slave_0 removed [ 33.666241][ T3781] Process accounting resumed [ 33.677888][ T3782] team0 (unregistering): Port device team_slave_1 removed [ 34.185821][ T12] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 34.205233][ T12] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 34.217341][ T12] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 34.229666][ T12] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 34.559495][ T29] kauditd_printk_skb: 299 callbacks suppressed [ 34.559511][ T29] audit: type=1400 audit(1769643133.620:399): avc: denied { create } for pid=3875 comm="syz.1.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 34.605193][ T29] audit: type=1400 audit(1769643133.660:400): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.695104][ T29] audit: type=1400 audit(1769643133.690:401): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.720842][ T29] audit: type=1400 audit(1769643133.690:402): avc: denied { mounton } for pid=3880 comm="syz.4.172" path="/proc/60/task" dev="proc" ino=6418 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=0 [ 34.744347][ T29] audit: type=1400 audit(1769643133.700:403): avc: denied { associate } for pid=3884 comm="syz.4.172" name="core" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=0 [ 34.772337][ T29] audit: type=1400 audit(1769643133.710:404): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.797826][ T29] audit: type=1400 audit(1769643133.710:405): avc: denied { open } for pid=3885 comm="syz.4.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 34.818793][ T29] audit: type=1400 audit(1769643133.710:406): avc: denied { prog_load } for pid=3885 comm="syz.4.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 34.838174][ T29] audit: type=1400 audit(1769643133.740:407): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 34.863096][ T29] audit: type=1400 audit(1769643133.750:408): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 35.202717][ T3922] __nla_validate_parse: 7 callbacks suppressed [ 35.202733][ T3922] netlink: 8 bytes leftover after parsing attributes in process `syz.3.190'. [ 35.574619][ T3963] netlink: 12 bytes leftover after parsing attributes in process `syz.3.208'. [ 35.589097][ T3963] xfrm1: entered promiscuous mode [ 35.594868][ T3963] xfrm1: entered allmulticast mode [ 35.602538][ T3963] netlink: 12 bytes leftover after parsing attributes in process `syz.3.208'. [ 36.003428][ T4010] netlink: 'syz.4.230': attribute type 4 has an invalid length. [ 36.126022][ T4016] bond1: up delay (9) is not a multiple of miimon (100), value rounded to 0 ms [ 36.137928][ T4020] bond1: (slave lo): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 36.150801][ T4020] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 36.484810][ T4047] netlink: 8 bytes leftover after parsing attributes in process `syz.4.244'. [ 36.494091][ T4047] netlink: 20 bytes leftover after parsing attributes in process `syz.4.244'. [ 38.293497][ T4127] x_tables: arp_tables: CLASSIFY target: used from hooks INPUT, but only usable from FORWARD/OUTPUT [ 38.419404][ T4139] netlink: 'syz.4.283': attribute type 7 has an invalid length. [ 38.432551][ T4139] netlink: 'syz.4.283': attribute type 7 has an invalid length. [ 38.529604][ T4148] netlink: 8 bytes leftover after parsing attributes in process `syz.2.287'. [ 38.548460][ T4150] netlink: 4 bytes leftover after parsing attributes in process `syz.3.288'. [ 38.588507][ T3572] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 38.661301][ T4157] mmap: syz.1.291 (4157) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 39.792283][ T29] kauditd_printk_skb: 377 callbacks suppressed [ 39.792302][ T29] audit: type=1400 audit(1769643138.810:786): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.883780][ T29] audit: type=1400 audit(1769643138.910:787): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.909059][ T29] audit: type=1400 audit(1769643138.930:788): avc: denied { create } for pid=4230 comm="syz.3.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 39.929898][ T29] audit: type=1400 audit(1769643138.930:789): avc: denied { create } for pid=4230 comm="syz.3.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 39.953873][ T29] audit: type=1400 audit(1769643138.950:790): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.979836][ T29] audit: type=1400 audit(1769643138.960:791): avc: denied { prog_load } for pid=4233 comm="syz.3.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 39.998953][ T29] audit: type=1400 audit(1769643138.960:792): avc: denied { mounton } for pid=4233 comm="syz.3.326" path="/66/file0" dev="tmpfs" ino=359 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 40.023438][ T29] audit: type=1400 audit(1769643138.980:793): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 40.049908][ T29] audit: type=1400 audit(1769643139.010:794): avc: denied { create } for pid=4229 comm="syz.2.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 40.097769][ T29] audit: type=1400 audit(1769643139.010:795): avc: denied { create } for pid=4229 comm="syz.2.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 40.361648][ T4271] netlink: 8 bytes leftover after parsing attributes in process `syz.1.344'. [ 40.371559][ T4271] netlink: 8 bytes leftover after parsing attributes in process `syz.1.344'. [ 40.488106][ T4287] netlink: 'syz.1.352': attribute type 1 has an invalid length. [ 40.505128][ T4287] 8021q: adding VLAN 0 to HW filter on device bond2 [ 40.577540][ T4287] bond2: (slave geneve2): making interface the new active one [ 40.608882][ T4287] bond2: (slave geneve2): Enslaving as an active interface with an up link [ 40.961950][ T4312] A link change request failed with some changes committed already. Interface gre1 may have been left with an inconsistent configuration, please check. [ 42.058640][ T4361] netlink: 12 bytes leftover after parsing attributes in process `syz.4.388'. [ 42.940403][ T4425] tls_set_device_offload: netdev not found [ 43.412234][ T4469] serio: Serial port ttyS3 [ 43.649323][ T4497] netlink: 4 bytes leftover after parsing attributes in process `syz.4.449'. [ 43.702608][ T4500] netlink: 8 bytes leftover after parsing attributes in process `syz.3.450'. [ 43.711598][ T4500] netlink: 'syz.3.450': attribute type 30 has an invalid length. [ 43.725734][ T52] netdevsim netdevsim3 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 43.734968][ T52] netdevsim netdevsim3 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 43.755434][ T52] netdevsim netdevsim3 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 43.778260][ T52] netdevsim netdevsim3 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 44.121988][ T4536] capability: warning: `syz.3.467' uses deprecated v2 capabilities in a way that may be insecure [ 44.258560][ T4548] netlink: 8 bytes leftover after parsing attributes in process `syz.3.472'. [ 44.297239][ T4548] 8021q: adding VLAN 0 to HW filter on device bond1 [ 44.799467][ T29] kauditd_printk_skb: 490 callbacks suppressed [ 44.799498][ T29] audit: type=1400 audit(1769643143.860:1286): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.857896][ T29] audit: type=1400 audit(1769643143.860:1287): avc: denied { open } for pid=4589 comm="syz.3.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 44.877516][ T29] audit: type=1400 audit(1769643143.870:1288): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.902844][ T29] audit: type=1400 audit(1769643143.880:1289): avc: denied { create } for pid=4591 comm="syz.3.492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 44.927100][ T29] audit: type=1400 audit(1769643143.890:1290): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 44.953133][ T29] audit: type=1400 audit(1769643143.890:1291): avc: denied { mount } for pid=4587 comm="syz.2.490" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=0 [ 44.977389][ T29] audit: type=1400 audit(1769643143.920:1292): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.002319][ T29] audit: type=1400 audit(1769643143.940:1293): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 45.027006][ T29] audit: type=1400 audit(1769643143.960:1294): avc: denied { open } for pid=4595 comm="syz.2.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 45.046490][ T29] audit: type=1400 audit(1769643143.960:1295): avc: denied { prog_load } for pid=4595 comm="syz.2.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 45.210022][ T4620] netlink: 60 bytes leftover after parsing attributes in process `syz.3.507'. [ 45.243467][ T4620] netlink: 60 bytes leftover after parsing attributes in process `syz.3.507'. [ 46.780831][ T4716] ================================================================== [ 46.789419][ T4716] BUG: KCSAN: data-race in __xa_clear_mark / xas_find_marked [ 46.797625][ T4716] [ 46.800146][ T4716] read-write to 0xffff8881076c7d90 of 8 bytes by task 12 on cpu 1: [ 46.809711][ T4716] __xa_clear_mark+0xf5/0x1e0 [ 46.814906][ T4716] __folio_end_writeback+0xf4/0x360 [ 46.820169][ T4716] folio_end_writeback_no_dropbehind+0x6d/0x1d0 [ 46.826529][ T4716] folio_end_writeback+0x1c/0x70 [ 46.831499][ T4716] ext4_finish_bio+0x459/0x8b0 [ 46.836476][ T4716] ext4_release_io_end+0x9f/0x1f0 [ 46.841834][ T4716] ext4_end_io_end+0x18d/0x240 [ 46.846734][ T4716] ext4_end_io_rsv_work+0x15b/0x1f0 [ 46.852090][ T4716] process_scheduled_works+0x4cd/0x9d0 [ 46.857570][ T4716] worker_thread+0x6bc/0x8b0 [ 46.862251][ T4716] kthread+0x488/0x510 [ 46.866428][ T4716] ret_from_fork+0x148/0x280 [ 46.871036][ T4716] ret_from_fork_asm+0x1a/0x30 [ 46.875903][ T4716] [ 46.878226][ T4716] read to 0xffff8881076c7d90 of 8 bytes by task 4716 on cpu 0: [ 46.885775][ T4716] xas_find_marked+0x213/0x620 [ 46.890732][ T4716] filemap_get_folios_tag+0xfa/0x510 [ 46.896033][ T4716] filemap_fdatawait_keep_errors+0x6c/0x190 [ 46.901944][ T4716] sync_inodes_sb+0x40e/0x4c0 [ 46.906739][ T4716] sync_inodes_one_sb+0x3d/0x50 [ 46.911593][ T4716] __iterate_supers+0x110/0x220 [ 46.916571][ T4716] iterate_supers+0x1f/0x30 [ 46.921190][ T4716] ksys_sync+0x5c/0xe0 [ 46.925620][ T4716] __ia32_sys_sync+0xe/0x20 [ 46.930480][ T4716] x64_sys_call+0x29b2/0x3000 [ 46.935253][ T4716] do_syscall_64+0xc0/0x2a0 [ 46.939770][ T4716] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 46.945670][ T4716] [ 46.948103][ T4716] value changed: 0x000007ffffffffff -> 0x000007fffffe0000 [ 46.955208][ T4716] [ 46.957527][ T4716] Reported by Kernel Concurrency Sanitizer on: [ 46.963692][ T4716] CPU: 0 UID: 0 PID: 4716 Comm: syz.3.556 Not tainted syzkaller #0 PREEMPT(voluntary) [ 46.973769][ T4716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 46.984008][ T4716] ==================================================================