last executing test programs: 5.160117908s ago: executing program 0 (id=1): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x10, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) unshare(0x4020400) socket$igmp(0x2, 0x3, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x8d67, 0x10, 0x4}, &(0x7f0000000300)=0x0, &(0x7f0000000380)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) io_uring_register$IORING_UNREGISTER_PBUF_RING(r0, 0x17, &(0x7f0000000480)={&(0x7f0000001000), 0x0, 0x2}, 0x1) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200006d963e008000"/23, @ANYRES32, @ANYBLOB="a600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x62, 0x11cfa, 0x0, 0x8000008, 0x3, 0x4, 0x1, 0x0, 0x7cce8c743ee810df}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x40505330, &(0x7f00000001c0)={0x800000, 0x90, 0x0, 0x4, 0x3ffd, 0x7}) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0xb8a, @mcast2, 0x3}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x40505330, &(0x7f0000000300)={0x800080, 0x7ff, 0x2, 0xfff, 0xfd, 0x4}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r5}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_io_uring_submit(r1, r2, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x49, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r0, 0x6e2, 0x3900, 0x3, 0x0, 0x0) clock_nanosleep(0x2, 0x1000000, 0x0, 0x0) 5.139692359s ago: executing program 2 (id=15): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080000000000000010000009400000007ad4160850000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) set_mempolicy(0x3, &(0x7f0000000600)=0xfffffffffffffffd, 0x4) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x4, 0xfd, 0x2, 0x0, 0x0, 0x100, 0x52420, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={0x0, 0x3}, 0x100002, 0x0, 0x4, 0x4, 0x3f62}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) r0 = socket$netlink(0x10, 0x3, 0x14) (async) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x50) creat(0x0, 0x0) (async) r2 = getpid() (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0xfffffffffffffe75, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r3, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x1], 0x0, 0x0, 0x4f, 0x1, r2}}, 0x40) (async) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) (async) r5 = syz_io_uring_setup(0x1104, &(0x7f0000000300)={0x0, 0x0, 0x400, 0x0, 0x8000021e}, &(0x7f0000000400)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) (async) syz_io_uring_submit(r6, r7, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x1}) io_uring_enter(r5, 0x47fa, 0x37f9, 0x0, 0x0, 0x0) (async) r8 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000540)='.pending_reads\x00', 0x1a10c1, 0x9c37611dc13d0db7) fchown(r8, 0x0, 0xee01) (async) fchown(0xffffffffffffffff, 0x0, 0xee01) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='kfree\x00', r9}, 0x18) (async) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_SEND={0x1a, 0x20, 0x0, r4, 0x0, 0x0, 0x0, 0x64040011, 0x1}) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="54ba7f03d6c5f637634f4881120642207a441f6df2560fedb8703e5cacca72bba996663478a9", @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x40, 0x0}, 0x8) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100003}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r11}, 0x10) (async) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8844) (async) syz_usb_connect$hid(0x2, 0x3f, 0x0, &(0x7f0000000280)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x200, 0x1, 0x2, 0x9, 0x20, 0x5}, 0x0, 0x0, 0x2, [{0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x43e}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x500a}}]}) (async) fsopen(&(0x7f0000000440)='hpfs\x00', 0x1) 4.947255217s ago: executing program 0 (id=17): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80080a, &(0x7f0000001c80)={[{@barrier_val}, {@resuid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xffff}}, {@usrjquota}]}, 0x1, 0x79b, &(0x7f0000000180)="$eJzs3c1rHGUYAPBnNp9Nq40g2HppTloo3bQ1tgqCEQ8iWCjo2TZstiFmky3ZTWlCDhYRBBG0eBD04tmPevMqevZv8CIiLVXTYsWDrMx+JNtsvptN2ub3g0neZ/adfeeZ2Zl5d+dlN4A9ayD9k4k4HBEfJxEH6/OTiOiqljojhmv17i7M59IpiUrlzT+Tap07C/O5aFomtb8eHIqIH9+POJZpbbc0OzcxUijkp+vxYHny0mBpdu74+OTIWH4sP3X65NDQqTPPnzm9fbn+/fPcgZufvPbst8P/vvfU9Y9+SmI4DtQfa85juwzEQH2bdKWb8B6vbndjuyzZ7RVgS9JDs6N2lMfhOBgd1RIA8ChLr/8VAGCPSVz/AWCPaXwOcGdhPteYdvcTiZ1165WI6K3l37i/WXuks37Prrd6H7TvThKd9TuisY33uwYi4ovv3/46naJN9yEBVvLu1Yi40D/Qev5PWsYsbNaJDdQZWBY7/8HO+SHt/7ywUv8vs9j/icX+z5KeFY7drRiI6G6OW4//zI0VF3x5Gxqv9/9eqo1tSxNt6v8tDlrr76hHj6XBkYgYL+TTc9vjEXE0unoujhfyJ9do4+jt/26v9lhz/++va+98lbaf/l+qkbnR2XPvMqMj5ZH7ybnZrasRT3cuje2723L+7632dZfv/3TeubWe+MhS8fUXP/h8tWpp/mm+jak1//aqfBnxTKycf0Oy5vjEwXT3n6j9XbmN7379rG+19pv3fzql7TfeC6yie+vZtkr3f9/a+fcnzeM1S9vZ+kbyX/n13528VS03NsaVkXJ5+mREd/JG6/xTS8s24kb9NP9apsvzz6z5+k/fCV7YYI6dN//4Zuv5L2rLEMs0/9FN7f/NF67fnejYev7p/h+qlo7W52zk/LfRFbyfbQcAAAAAAAAAAAAAAAAAAAAAAAAAG5WJiAORZLKL5Uwmm639hveT0ZcpFEvlYxeLM1OjUf2t7P7oyjS+6vJgLU4a33/a3xSfWhY/FxFPRMSnPfuqcTZXLIzudvIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAULd/ld//T/3es9trBwC0Te+6NW7n7wkrlUqljesDALTf+td/AOBRs8b1f99OrgcAsHO8/weAvcf1HwD2Htd/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2uzc2bPpVPlnYT6XxqOXZ2cmipePj+ZLE9nJmVw2V5y+lB0rFscK+WyuOLne8xWKxUtDMTVzZbCcL5UHS7Nz5yeLM1Pl8+OTI2P58/muHckKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADanNDs3MVIo5KcficKHEfEArEY7Ckk8EKuxK4Xfjv9yaK0619Z5GQ8/EFk8ZIXdPjMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPBz+DwAA//8CzCWs") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x1dc) r1 = socket$igmp(0x2, 0x3, 0x2) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000180)=r3, 0x4) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000002280), 0x68c01, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r8 = socket(0x400000000010, 0x3, 0x0) r9 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r10, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xb, 0x4}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=@newtfilter={0x70, 0x2c, 0xd27, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, r10, {0xfff3, 0x7}, {}, {0xfff3, 0xfff2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x40, 0x2, [@TCA_CGROUP_EMATCHES={0x3c, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x2c, 0x1, 0x0, 0x0, {{0xe37, 0x9, 0x4}, [@TCA_EM_IPT_MATCH_DATA={0xfffffffffffffe42}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x1}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x5}]}}]}]}]}}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000080}, 0x40010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) r11 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x9}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r12 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r12, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) close_range(r11, 0xffffffffffffffff, 0x0) write$binfmt_format(r4, &(0x7f0000006240)='-1\x00', 0x3) getsockopt$MRT(r1, 0x0, 0xcf, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), r0) openat$sndseq(0xffffffffffffff9c, &(0x7f000009ddc0), 0x20100) 4.719979087s ago: executing program 2 (id=18): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000040)=ANY=[], 0x118) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r2, 0x1, 0x23, &(0x7f0000000000)=0x2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x22, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r3}, 0x10) bind$inet(r2, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) (fail_nth: 1) 4.689798578s ago: executing program 2 (id=19): r0 = socket$inet(0x2, 0x2, 0x1) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) 4.671421929s ago: executing program 2 (id=20): syz_usb_connect(0x6, 0xb43, 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = pidfd_getfd(r1, r1, 0x0) setns(r2, 0x66020000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8c}, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) syz_usb_connect(0x3, 0x3d9, &(0x7f0000000a00)={{0x12, 0x1, 0x210, 0x6f, 0xbe, 0x4, 0x8, 0x2013, 0x8461, 0x70fa, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3c7, 0x1, 0x70, 0x5, 0x20, 0x6, [{{0x9, 0x4, 0xa5, 0xf, 0x9, 0xdc, 0x52, 0x2, 0x0, [], [{{0x9, 0x5, 0x0, 0x0, 0x400, 0x3, 0x6, 0xc, [@generic={0x72, 0x5, "4f7b6a1e80b50b0b4520c8f182f14ded48fe70995151ef939367accc1ee1a166473a91b72c9ed4fcae6f073bbc22f9e30dc6db88a7eaaea915853d3ce9ab48fa5b875be51337881b4a590b84558056ff00289e558401a2cafd6894f4ae6d1978629b78efb60a6beaaee209c42e5005bc"}]}}, {{0x9, 0x5, 0x9, 0x4, 0x10, 0x4, 0x4, 0x8}}, {{0x9, 0x5, 0x3, 0x4, 0x8, 0x1, 0x4, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x6, 0x1, 0x638}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x90, 0x5}]}}, {{0x9, 0x5, 0x3, 0x0, 0x10, 0x6, 0x1, 0xec, [@generic={0x6a, 0x30, "fca28bf765169c3c97be8e5557ca6a04a0e3c9ec4e9357c9c7f9015450e19654e07a7b885563d016639b40de6948739d46f16fb5b14b57c7e717f605db7721e8558cf716cca55a4808fce4522d151577502ac4b49254c5f61e4664336808622009802d4c76f1a067"}, @uac_iso={0x7, 0x25, 0x1, 0x1, 0x6, 0x8}]}}, {{0x9, 0x5, 0x7, 0x0, 0x40, 0xf0, 0xd8, 0xf, [@generic={0xef, 0x4, "8c635aadd77f26114f380d1fae2283ef73bbd0efb526fd81d6ebdd72a19a1b1706753811fa1fb0e90afcc0cfab412e6a0b34e5e633fa11495f6fb24f41c9b3cf407007bdbc9adab50108db688e6e5f4564c3b80426ceaf8d8a8d8a89e22a6812526990ec7ab31a0399465730d973100ab1640140e1eb5168685068e201d7bf40efbe5f7ffa5e381ea8ab33e39a6acf33df8e1531de729460c709277caad27c5e66f02fc857bf931c1a6da92fe97bf01643dafce0e4e737c4077810fac44f5af7d0896e087d96e09d8788172b15c64d14687492b4b7975f985efa6eef7df8dbc1f209cb2864bbcf46d37bb40af7"}, @generic={0x26, 0x23, "7641f3009344e4ad8d0f3e9f51ef2fcd5b814511aa8e25f5302658fde1e4b0add8a7c467"}]}}, {{0x9, 0x5, 0x6, 0x3, 0x20, 0x0, 0x8, 0x7}}, {{0x9, 0x5, 0x3, 0x10, 0x200, 0x9, 0x40, 0x8, [@generic={0x60, 0xb, "49f07f4045890bea5a4f8724c6fd992ca21451b7f71defa7c46e38a2af20ae26070a49b4b5212f5037a0e834dbbfd588c71f6e8e15d9f503aab80c7376af42f982447da2cc82a18a2275b574a5667dd8bbc801b4b206170d0f3b930b710b"}]}}, {{0x9, 0x5, 0x5, 0x3, 0x40, 0x56, 0x5, 0x9, [@generic={0x37, 0x7, "a79d1bb1e57fd72df59501a80cfc41605f32aa2718baf0e31f69974667bbd141010de50de61daae99d2ba4560877e46fa8621f6403"}]}}, {{0x9, 0x5, 0x3, 0x0, 0x3ff, 0x7, 0x4, 0x6, [@generic={0xc7, 0x0, "016b209e7d1c33118ca7886140e2e962ef9a292eb8e462a8dc3f9c22108e05140ccac8b332929d0f68e60b6d4961220b32f147ba63f7476381fe9eee670cfb5e162077daedfb1b038df1c459923906ad39a7499dcfd1983003cb1960f64f9a5c6b86cf68d5d01ee837d1bed0df8dc4441bc0ca30108af7fb8a20e5303ae2e7eee52dba9a74150b6249538a96dc6e2a6079cc808525267b4b8d8c6d43c0cbeb916bb4c053a7c1a1a75297ee1acc83f18dabae194ac642f08f6c67bf03fc76d1fb3ffab0b6a0"}]}}]}}]}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x110, 0x5, 0x9, 0xf, 0x8, 0xe4}, 0x43, &(0x7f0000000240)={0x5, 0xf, 0x43, 0x4, [@ssp_cap={0x1c, 0x10, 0xa, 0xb0, 0x4, 0x6, 0xf00, 0x0, [0xc0, 0xc0c0, 0xff00c0, 0xfe8000]}, @ext_cap={0x7, 0x10, 0x2, 0xc, 0x5, 0xd, 0x8}, @ext_cap={0x7, 0x10, 0x2, 0x4, 0x0, 0x7, 0x4}, @ss_container_id={0x14, 0x10, 0x4, 0x4, "aa9a1f24c98cbfc5350c0e3442a48799"}]}, 0x4, [{0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x1419}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x1c1d}}, {0x100, &(0x7f0000000380)=@string={0x100, 0x3, "6ec810d71fb7e80e365a5defa98a3edaa8bfb436d32679510567f0513b8d64b80df8cd1879f88db1b56d4226d97e70b1b3edf093cac25e82b38d5fb556dcaec6ef2d4950e0da2190cbacd085d03bd6338e95d33c7ee16e055e424488b284994ab3ca2f5c9e16f55ad3866d66264ba1dd86fb26c1fe341ae67a0493714f7d0b2e9ffbeb342fe166d0623609b724481ad3f10b785d4a4e252d98349c6a8e4c25b90894ac8755e718bacd7c37845357ede5e1b44fa44510785adce28d306d40e2ba4a72cc7d3151ada339df0e6d6e13490965504818c093d4b18c56d4144a6a6550355384ba5055f23f6e248b767e746b4e132c3fdb8e1256fbc2ed2ea16598"}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x404}}]}) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4000000}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) syz_clone(0x498144ee5f62e149, 0x0, 0x17, 0x0, 0x0, 0x0) 4.021246997s ago: executing program 0 (id=27): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x10, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) unshare(0x4020400) r0 = socket$igmp(0x2, 0x3, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x8d67, 0x10, 0x4}, &(0x7f0000000300)=0x0, &(0x7f0000000380)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) io_uring_register$IORING_UNREGISTER_PBUF_RING(r1, 0x17, &(0x7f0000000480)={&(0x7f0000001000), 0x0, 0x2}, 0x1) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200006d963e008000"/23, @ANYRES32, @ANYBLOB="a600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r5, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x62, 0x11cfa, 0x0, 0x8000008, 0x3, 0x4, 0x1, 0x0, 0x7cce8c743ee810df}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0x40505330, &(0x7f00000001c0)={0x800000, 0x90, 0x0, 0x4, 0x3ffd, 0x7}) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0xb8a, @mcast2, 0x3}, 0x1c) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_io_uring_submit(r2, r3, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x49, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r1, 0x6e2, 0x3900, 0x3, 0x0, 0x0) clock_nanosleep(0x2, 0x1000000, &(0x7f0000000000)={0x77359400}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000080)=0x300, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x8, @local, 0x8, 0x3}, 0x80, &(0x7f0000000080)=[{&(0x7f00000005c0)='l', 0x1}], 0x1}}], 0x1, 0x40000050) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 3.977818739s ago: executing program 4 (id=28): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001800", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xaf, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000001240)}}], 0x1, 0x4004040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r0}, 0x10) socketpair(0xa, 0x2, 0x9, &(0x7f0000001300)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000140)='.\x00', &(0x7f0000000180), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRESHEX=r3, @ANYBLOB=',wf', @ANYRESHEX]) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a40)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0x9}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=@newtfilter={0x30, 0x2c, 0xd27, 0x70bd27, 0x25dfdbff, {0x0, 0x0, 0x0, r5, {}, {}, {0xffe0, 0x5}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000010}, 0x20048850) socket$nl_route(0x10, 0x3, 0x0) 3.892204582s ago: executing program 4 (id=30): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002500)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 3.852573265s ago: executing program 4 (id=32): syz_usb_connect(0x6, 0xb43, 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = pidfd_getfd(r1, r1, 0x0) setns(r2, 0x66020000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8c}, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r3 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4000000}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) syz_clone(0x400a1400, 0x0, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000009c0)="010000000037a788a11d1f0000000000", 0x10, 0x0) r7 = syz_clone(0x498144ee5f62e149, 0x0, 0x17, 0x0, 0x0, 0x0) sched_getattr(r7, &(0x7f00000000c0)={0x38}, 0x38, 0x0) 3.686025641s ago: executing program 3 (id=35): setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, '\x00', 0x11}, 0x7}, @in6={0xa, 0x4e23, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0xaf}], 0x38) r0 = socket(0x10, 0x3, 0x9) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001640)=@mangle={'mangle\x00', 0x44, 0x6, 0x408, 0x2a8, 0x98, 0x2a8, 0x130, 0x1f0, 0x370, 0x370, 0x370, 0x370, 0x370, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11, 0x0, 0x69}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28}, {0x2, 0xa}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'syzkaller0\x00', 'dvmrp1\x00', {}, {}, 0x6}, 0x0, 0x70, 0xb8}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x1, 0x3, {0x5}}}}, {{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0x18}, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x98, 0xc8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x468) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000000)='bridge_slave_1\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x64) syz_io_uring_setup(0x5ec5, &(0x7f0000000340)={0x0, 0x8a7e, 0x200, 0x4}, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000080)=0x7bdec2f6) sendmsg$nl_route_sched(r3, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f0000000500)=@deltaction={0x178, 0x31, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@TCA_ACT_TAB={0x28, 0x1, [{0x10, 0x18, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}]}, @TCA_ACT_TAB={0x18, 0x1, [{0x14, 0xf, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x44, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x38}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x401}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @TCA_ACT_TAB={0x30, 0x1, [{0x10, 0x18, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}, @TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}]}, @TCA_ACT_TAB={0x40, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0xf, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x4, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0xc, 0x4, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1d}}]}, @TCA_ACT_TAB={0x54, 0x1, [{0x10, 0x1d, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x14, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}]}]}, 0x178}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, &(0x7f0000000340), &(0x7f0000000300)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r6}, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f00000007c0)={0x400000000000000, 0x0, &(0x7f0000000700)={&(0x7f0000001900)=ANY=[@ANYBLOB="020f000015000000000000000000000005000500000000000a00000000000000000000000000000000432e0000000000000000000000000008001200000002000000f1edc4ea00000600000000000000000000000000000000000000000000000000000000000000fc01000000000000000000000000810005000600000000000a00000000000000ff0200000000000000000000000000010000000000000000010018"], 0xa8}}, 0x40080) sendfile(r0, r1, 0x0, 0x7fffffffffffffff) 2.821379829s ago: executing program 1 (id=36): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000800000000000070000000900010073797a30000000007c000000090a010400000000000000000700000008000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d38001280140001800c000100636f756e7465720004000280200001800e000100636f6e6e6c696d69740000000c0002800800014000000008080003400000"], 0xc4}, 0x1, 0x0, 0x0, 0x801}, 0x20050890) 2.818171519s ago: executing program 3 (id=37): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="29178a677a348bfcff818971070b7dd9c5e8b518498fce48d743d9cca46df1803ba0f495a92f1c228179e8dd1f506e163bda5bb0c21faec3dd8db4a44033f16365edcdaf96bb6b305091bdbeb63dfece847f22446cdbdd1846a2082630ddee92ecbbef5520691168c9fe596fd2e67ce1a594774374e2f18da52740b3c6ffd10efa295bb09c0d6635e3614127012771ebe2f0b807eef7918285b0d8acec578c611febdd932b4d6b0ec549e7cde4ac9e33b06f5861b1f88b3e9db43111059735ae257a6e9c61cae43321fb728b97af1bfe20acf11d61b0651ec70cabecf7ff71fc2c6dc18d8c826b7abb909d2a0d287e37940ec35ceced", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000001c0)='mm_vmscan_lru_isolate\x00', r0, 0x0, 0x7fffffffffffffff}, 0xffffffffffffff50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r1}, 0x10) gettid() r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0}, 0x18) unshare(0x62040200) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x2a, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000480), 0x10}, 0x8084, 0x14000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000009}, 0x0, 0xf, 0xffffffffffffffff, 0x2) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) 2.749821942s ago: executing program 1 (id=38): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB, @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000001c0)='mm_vmscan_lru_isolate\x00', r0, 0x0, 0x7fffffffffffffff}, 0xffffffffffffff50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r1}, 0x10) gettid() r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = getpid() sched_setscheduler(r3, 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0}, 0x18) unshare(0x62040200) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x2a, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000480), 0x10}, 0x8084, 0x14000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000009}, 0x0, 0xf, 0xffffffffffffffff, 0x2) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.666615885s ago: executing program 1 (id=39): setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, '\x00', 0x11}, 0x7}, @in6={0xa, 0x4e23, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0xaf}], 0x38) r0 = socket(0x10, 0x3, 0x9) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001640)=@mangle={'mangle\x00', 0x44, 0x6, 0x408, 0x2a8, 0x98, 0x2a8, 0x130, 0x1f0, 0x370, 0x370, 0x370, 0x370, 0x370, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11, 0x0, 0x69}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28}, {0x2, 0xa}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'syzkaller0\x00', 'dvmrp1\x00', {}, {}, 0x6}, 0x0, 0x70, 0xb8}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x1, 0x3, {0x5}}}}, {{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0x18}, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x98, 0xc8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x468) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x64) syz_io_uring_setup(0x5ec5, &(0x7f0000000340)={0x0, 0x8a7e, 0x200, 0x4}, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000080)=0x7bdec2f6) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\a\x00\x00'], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x7a, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000340), &(0x7f0000000300)=r4}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00'}, 0x10) sendfile(r0, r1, 0x0, 0x7fffffffffffffff) 2.633570137s ago: executing program 3 (id=40): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x10, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) unshare(0x4020400) r0 = socket$igmp(0x2, 0x3, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, 0x0}) r1 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x8d67, 0x10, 0x4}, &(0x7f0000000300)=0x0, &(0x7f0000000380)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) io_uring_register$IORING_UNREGISTER_PBUF_RING(r1, 0x17, &(0x7f0000000480)={&(0x7f0000001000), 0x0, 0x2}, 0x1) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYBLOB="a600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r5, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x62, 0x11cfa, 0x0, 0x8000008, 0x3, 0x4, 0x1, 0x0, 0x7cce8c743ee810df}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0x40505330, &(0x7f00000001c0)={0x800000, 0x90, 0x0, 0x4, 0x3ffd, 0x7}) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0xb8a, @mcast2, 0x3}, 0x1c) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_io_uring_submit(r2, r3, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x49, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r1, 0x6e2, 0x3900, 0x3, 0x0, 0x0) clock_nanosleep(0x2, 0x1000000, &(0x7f0000000000)={0x77359400}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000140)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffff001}, 0x18) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000080)=0x300, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x8, @local, 0x8, 0x3}, 0x80, &(0x7f0000000080)=[{&(0x7f00000005c0)='l', 0x1}], 0x1}}], 0x1, 0x40000050) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 2.363752368s ago: executing program 0 (id=41): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sched_setscheduler(0x0, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000005c0)=r3}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0), 0x0, 0x0) r5 = syz_genetlink_get_family_id$team(&(0x7f00000044c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000004700)={'team0\x00', 0x0}) openat$random(0xffffffffffffff9c, 0x0, 0x101c00, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000004b80)={&(0x7f0000000100)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="050427bd7000fedbdf250100000008000100", @ANYRES32=r6, @ANYBLOB="4400028040000100240001006d6f6465000000000000000000000000000000000000d3e14c6e04d3f33b41a4000000000000000000000500030005000000100004006c6f"], 0x60}, 0x1, 0x0, 0x0, 0x4000431}, 0x4040084) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x300000c, 0x50032, 0xffffffffffffffff, 0x0) 2.363354958s ago: executing program 32 (id=41): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sched_setscheduler(0x0, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000005c0)=r3}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0), 0x0, 0x0) r5 = syz_genetlink_get_family_id$team(&(0x7f00000044c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000004700)={'team0\x00', 0x0}) openat$random(0xffffffffffffff9c, 0x0, 0x101c00, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000004b80)={&(0x7f0000000100)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="050427bd7000fedbdf250100000008000100", @ANYRES32=r6, @ANYBLOB="4400028040000100240001006d6f6465000000000000000000000000000000000000d3e14c6e04d3f33b41a4000000000000000000000500030005000000100004006c6f"], 0x60}, 0x1, 0x0, 0x0, 0x4000431}, 0x4040084) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x300000c, 0x50032, 0xffffffffffffffff, 0x0) 1.369303571s ago: executing program 1 (id=43): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x62, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x81}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mount$bind(&(0x7f0000000840)='./file0\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000b80)={&(0x7f00000006c0)={0x38, 0x1410, 0x24, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_STAT_AUTO_MODE_MASK={0x8, 0x4c, 0x1}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) clock_gettime(0x6, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x1c, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc004800}, 0x24040090) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000240)) semtimedop(0x0, &(0x7f0000000040)=[{0x1, 0x1}, {0x1, 0x3, 0x1000}], 0x2, &(0x7f00000001c0)) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x1f00}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000880)={r5, r4, 0x25, 0x2, @val=@netkit}, 0x1c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x5}, 0x2004c000) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x4, &(0x7f0000000180)=[{0x2d, 0x0, 0x2}, {0xf}, {}, {0x6, 0x0, 0x0, 0x8000000}]}) mlock2(&(0x7f00005af000/0x4000)=nil, 0x4000, 0x0) syz_open_dev$evdev(&(0x7f0000000000), 0x3, 0x44000) 1.367723211s ago: executing program 2 (id=44): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000010000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='netlink_extack\x00', r0}, 0x10) r1 = socket(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x9, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x154}}, 0x0) bind$inet6(r1, 0x0, 0x0) socket(0xa, 0x1, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000180)='wg1\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="240000001d00070f0002000000000000070000", @ANYRES32=r5, @ANYBLOB='\x00\x00g\x00\b\x00\b\x00', @ANYRES64=r3], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) 1.367184441s ago: executing program 3 (id=45): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00"/13], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000007000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) syz_open_dev$usbfs(0x0, 0x6ac, 0x20081) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000002400)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r4, 0x0, 0xfffffffffffffffe}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x40ead000) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/xfrm_stat\x00') r6 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDFONTOP_SET(r6, 0x4b72, &(0x7f0000000040)={0x0, 0x4000000, 0x8, 0xd, 0x200, &(0x7f0000001500)="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"}) preadv(r5, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/233, 0xe9}, {&(0x7f0000000000)=""/17, 0x11}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000080)=""/2, 0x2}], 0x4, 0xfff, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000024c0)=ANY=[@ANYBLOB="180000000000000000000000feffffff18110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000500000000b7030000000000008500000083000000bf0900000000000055090100513bb6a2a3f7a824ac000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000210081044e81f782db44b90402000000008000000000150010001400259070f409000d2000000a000e4006000000036010fab94dcf5c0468c1d67f6f94007134cf6ee05e6756cfb39b0590b4800089e408e8d8ef52b49816277cf4090000001fb791643a5e08001b14d6d930dfe1d9db22fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db701000000eafad95667e006dcdf969b3ef35ce3", 0xa2}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cf84ded40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c86e00f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec231fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895012f1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c3405000000000000003871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d37261774cc5a3bf6b466cb72812da518ff602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d50a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a31b16ac5fb73fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953f88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a5fe1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9d66ebbc8bab4ea81232fbef665f6212f875b2a00000000000000aceb111b66a500ca52fd8f848088c67ee65dfdcc4c580e9bc18c1699dca07d019bf1bf9dd3da480d6c155d7e60674ce88ab5ae07a9d16e22792d99986b531ab4e592ab5925da779e700cf20309a2137877690dc5c07956fc82d7b3bb46d3138041af18508938c9be4e5d0a98073463a5cff6c146d020743da474cb81677a6f389f0e00c33b70b7f8bab95435c27167f365a29fb09cbf35bf192f6a65616fa2ad9a6c7ca3a3ecd96aaecd993e8badb40e7eb8a22b0015e70c885cd519e28448168c6d914265998bff74ea1b0e651a6cae9419096248a0e41573827ad60fafce6e6540734c1f23f75337d836c31497e8112969a039d65aa297e2b046b5f4d11116a89f9f65693d4dc3e70fbfe0b2044fdb3f87e887d1daae8e38a0c19f668f776e19a02bb2449ee4384f6536879c85d7e41bc0276ee2b125d41ff358323311703ec01d64a573bdeb75bdcc87d01de38365ab9222713d2d1640a742d62fefb5403b2ed9969c32a0841e8c36b0107bb888eb14ac62e6d4bdfaeb9ee7436b97bf3825a19d6c8997ce285edf1d277ed703f560460417bfe702af833e83c5b987befb6d1fcf765ab7ea537d9dafb622a1ba8686cb9b1c63b84470364942e90d1cf856cead864f5e38c83b9ed86cc5725a20299ce512b165"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0xffffffffffffff22}, 0x2e) r10 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073797a32000000000800410073697700140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8040, 0x0) ioctl$PPPIOCATTCHAN(r11, 0x40047438, &(0x7f0000001480)=0x3) sendmsg$RDMA_NLDEV_CMD_DELLINK(r10, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x671ec167a4b72164}, 0x0) r12 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r12, 0x29, 0x2e, &(0x7f0000000180)={0x8, {{0xa, 0x4e21, 0xa3f, @mcast1, 0xbfd}}, {{0xa, 0x4e20, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}}}, 0x108) 1.366153991s ago: executing program 4 (id=46): r0 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@gettaction={0x50, 0x32, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@action_gd=@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x20, 0x1, [{0x10, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x4048801) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=@newqdisc={0x34, 0x24, 0x4, 0x80000000, 0x0, {0x0, 0x0, 0x0, 0x0, {0x9, 0x3}, {0xffe0, 0x2}, {0x0, 0x9}}, [@qdisc_kind_options=@q_fq_pie={{0xb}, {0x4, 0x8002}}]}, 0x34}}, 0x20004055) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="0300000000000000280012"], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000b40)={{0x14}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3}, 0x18) prctl$PR_SET_SECUREBITS(0x1c, 0x1d) setresgid(0x0, 0xee00, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) 740.909878ms ago: executing program 1 (id=47): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) r3 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r3, &(0x7f0000000200)={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0xc) r4 = syz_io_uring_setup(0x497, &(0x7f0000000540)={0x0, 0x4660, 0x400, 0x3, 0x285}, &(0x7f00000004c0)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, 0x0, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}) io_uring_enter(r4, 0x3498, 0x969, 0x0, 0x0, 0x0) dup3(r4, r2, 0x80000) 740.400948ms ago: executing program 2 (id=48): setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, '\x00', 0x11}, 0x7}, @in6={0xa, 0x4e23, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0xaf}], 0x38) r0 = socket(0x10, 0x3, 0x9) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001640)=@mangle={'mangle\x00', 0x44, 0x6, 0x408, 0x2a8, 0x98, 0x2a8, 0x130, 0x1f0, 0x370, 0x370, 0x370, 0x370, 0x370, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11, 0x0, 0x69}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28}, {0x2, 0xa}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'syzkaller0\x00', 'dvmrp1\x00', {}, {}, 0x6}, 0x0, 0x70, 0xb8}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x1, 0x3, {0x5}}}}, {{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0x18}, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x98, 0xc8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x468) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000000)='bridge_slave_1\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x64) syz_io_uring_setup(0x5ec5, &(0x7f0000000340)={0x0, 0x8a7e, 0x200, 0x4}, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000080)=0x7bdec2f6) sendmsg$nl_route_sched(r3, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f0000000500)=@deltaction={0x178, 0x31, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@TCA_ACT_TAB={0x28, 0x1, [{0x10, 0x18, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}]}, @TCA_ACT_TAB={0x18, 0x1, [{0x14, 0xf, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x44, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x38}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x20, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x401}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @TCA_ACT_TAB={0x30, 0x1, [{0x10, 0x18, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}]}, @TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}]}, @TCA_ACT_TAB={0x40, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0xf, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x4, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0xc, 0x4, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1d}}]}, @TCA_ACT_TAB={0x54, 0x1, [{0x10, 0x1d, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x14, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}]}]}, 0x178}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, &(0x7f0000000340), &(0x7f0000000300)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r6}, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f00000007c0)={0x400000000000000, 0x0, &(0x7f0000000700)={&(0x7f0000001900)=ANY=[@ANYBLOB="020f000015000000000000000000000005000500000000000a00000000000000000000000000000000432e0000000000000000000000000008001200000002000000f1edc4ea00000600000000000000000000000000000000000000000000000000000000000000fc01000000000000000000000000810005000600000000000a00000000000000ff0200000000000000000000000000010000000000000000010018"], 0xa8}}, 0x40080) sendfile(r0, r1, 0x0, 0x7fffffffffffffff) 740.067298ms ago: executing program 3 (id=49): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[], 0x48) accept4(0xffffffffffffffff, &(0x7f00000003c0)=@l2tp6={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @empty}}, &(0x7f0000000200)=0x80, 0x80000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x13, 0x4, 0x6, 0x26, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703", @ANYRES32=r0], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x18) r2 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x40001, 0x1) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020a07b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a99985000000040000"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x4000000}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) connect$bt_l2cap(r2, &(0x7f0000000a00)={0x1f, 0x100, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x2}, 0xe) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f000000000000000002000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4005}, 0x11) sendmmsg(r4, &(0x7f0000000000), 0x4000000000001f2, 0x0) 739.781738ms ago: executing program 4 (id=50): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB, @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000001c0)='mm_vmscan_lru_isolate\x00', r0, 0x0, 0x7fffffffffffffff}, 0xffffffffffffff50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r1}, 0x10) gettid() r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = getpid() sched_setscheduler(r3, 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0}, 0x18) unshare(0x62040200) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x2a, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000480), 0x10}, 0x8084, 0x14000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000009}, 0x0, 0xf, 0xffffffffffffffff, 0x2) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 707.20262ms ago: executing program 3 (id=51): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x10, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) unshare(0x4020400) r0 = socket$igmp(0x2, 0x3, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x8d67, 0x10, 0x4}, &(0x7f0000000300)=0x0, &(0x7f0000000380)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) io_uring_register$IORING_UNREGISTER_PBUF_RING(r1, 0x17, &(0x7f0000000480)={&(0x7f0000001000), 0x0, 0x2}, 0x1) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200006d963e008000"/23, @ANYRES32, @ANYBLOB="a600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r5, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x62, 0x11cfa, 0x0, 0x8000008, 0x3, 0x4, 0x1, 0x0, 0x7cce8c743ee810df}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0x40505330, &(0x7f00000001c0)={0x800000, 0x90, 0x0, 0x4, 0x3ffd, 0x7}) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0xb8a, @mcast2, 0x3}, 0x1c) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_io_uring_submit(r2, r3, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x49, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r1, 0x6e2, 0x3900, 0x3, 0x0, 0x0) clock_nanosleep(0x2, 0x1000000, &(0x7f0000000000)={0x77359400}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000080)=0x300, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x8, @local, 0x8, 0x3}, 0x80, &(0x7f0000000080)=[{&(0x7f00000005c0)='l', 0x1}], 0x1}}], 0x1, 0x40000050) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 1.65498ms ago: executing program 1 (id=52): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="29178a677a348bfcff818971070b7dd9c5e8b518498fce48d743d9cca46df1803ba0f495a92f1c228179e8dd1f506e163bda5bb0c21faec3dd8db4a44033f16365edcdaf96bb6b305091bdbeb63dfece847f22446cdbdd1846a2082630ddee92ecbbef5520691168c9fe596fd2e67ce1a594774374e2f18da52740b3c6ffd10efa295bb09c0d6635e3614127012771ebe2f0b807eef7918285b0d8acec578c611febdd932b4d6b0ec549e7cde4ac9e33b06f5861b1f88b3e9db43111059735ae257a6e9c61cae43321fb728b97af1bfe20acf11d61b0651ec70cabecf7ff71fc2c6dc18d8c826b7abb909d2a0d287e37940ec35cecedf9cf6f8d", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000001c0)='mm_vmscan_lru_isolate\x00', r0, 0x0, 0x7fffffffffffffff}, 0xffffffffffffff50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='locks_get_lock_context\x00', r1}, 0x10) gettid() r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0}, 0x18) unshare(0x62040200) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x2a, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000480), 0x10}, 0x8084, 0x14000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000009}, 0x0, 0xf, 0xffffffffffffffff, 0x2) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) 0s ago: executing program 4 (id=53): setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, '\x00', 0x11}, 0x7}, @in6={0xa, 0x4e23, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0xaf}], 0x38) r0 = socket(0x10, 0x3, 0x9) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001640)=@mangle={'mangle\x00', 0x44, 0x6, 0x408, 0x2a8, 0x98, 0x2a8, 0x130, 0x1f0, 0x370, 0x370, 0x370, 0x370, 0x370, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11, 0x0, 0x69}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28}, {0x2, 0xa}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'syzkaller0\x00', 'dvmrp1\x00', {}, {}, 0x6}, 0x0, 0x70, 0xb8}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x1, 0x3, {0x5}}}}, {{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0x18}, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x98, 0xc8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x468) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x64) syz_io_uring_setup(0x5ec5, &(0x7f0000000340)={0x0, 0x8a7e, 0x200, 0x4}, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000080)=0x7bdec2f6) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\a\x00\x00'], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x7a, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000340), &(0x7f0000000300)=r4}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00'}, 0x10) sendfile(r0, r1, 0x0, 0x7fffffffffffffff) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.170' (ED25519) to the list of known hosts. [ 24.879709][ T29] audit: type=1400 audit(1764211143.664:62): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.903039][ T29] audit: type=1400 audit(1764211143.684:63): avc: denied { mount } for pid=3300 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.903737][ T3300] cgroup: Unknown subsys name 'net' [ 24.931068][ T29] audit: type=1400 audit(1764211143.714:64): avc: denied { unmount } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.065227][ T3300] cgroup: Unknown subsys name 'cpuset' [ 25.071515][ T3300] cgroup: Unknown subsys name 'rlimit' [ 25.180485][ T29] audit: type=1400 audit(1764211143.964:65): avc: denied { setattr } for pid=3300 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.205156][ T29] audit: type=1400 audit(1764211143.964:66): avc: denied { create } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.226252][ T29] audit: type=1400 audit(1764211143.964:67): avc: denied { write } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.247948][ T29] audit: type=1400 audit(1764211143.964:68): avc: denied { read } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.268885][ T29] audit: type=1400 audit(1764211143.994:69): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 25.294598][ T29] audit: type=1400 audit(1764211143.994:70): avc: denied { mount } for pid=3300 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 25.324104][ T3305] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.333219][ T29] audit: type=1400 audit(1764211144.124:71): avc: denied { relabelto } for pid=3305 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.376621][ T3300] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.575792][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 26.593709][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 26.658120][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 26.680869][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 26.718034][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 26.732621][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.739950][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.747156][ T3313] bridge_slave_0: entered allmulticast mode [ 26.753365][ T3313] bridge_slave_0: entered promiscuous mode [ 26.774692][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.781914][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.789120][ T3313] bridge_slave_1: entered allmulticast mode [ 26.795675][ T3313] bridge_slave_1: entered promiscuous mode [ 26.802150][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.809535][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.817068][ T3321] bridge_slave_0: entered allmulticast mode [ 26.823450][ T3321] bridge_slave_0: entered promiscuous mode [ 26.832291][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.839505][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.846725][ T3321] bridge_slave_1: entered allmulticast mode [ 26.853078][ T3321] bridge_slave_1: entered promiscuous mode [ 26.904854][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.923423][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 26.937060][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.944311][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.951651][ T3314] bridge_slave_0: entered allmulticast mode [ 26.958256][ T3314] bridge_slave_0: entered promiscuous mode [ 26.965646][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 26.974837][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.981997][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.989288][ T3314] bridge_slave_1: entered allmulticast mode [ 26.995836][ T3314] bridge_slave_1: entered promiscuous mode [ 27.002232][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.009419][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.016605][ T3315] bridge_slave_0: entered allmulticast mode [ 27.022900][ T3315] bridge_slave_0: entered promiscuous mode [ 27.030182][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.039381][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.046593][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.053892][ T3315] bridge_slave_1: entered allmulticast mode [ 27.060420][ T3315] bridge_slave_1: entered promiscuous mode [ 27.071637][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.078890][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.086120][ T3312] bridge_slave_0: entered allmulticast mode [ 27.092768][ T3312] bridge_slave_0: entered promiscuous mode [ 27.120590][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.127875][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.135238][ T3312] bridge_slave_1: entered allmulticast mode [ 27.141971][ T3312] bridge_slave_1: entered promiscuous mode [ 27.162975][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.178082][ T3313] team0: Port device team_slave_0 added [ 27.189130][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.199409][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.209101][ T3321] team0: Port device team_slave_0 added [ 27.215491][ T3321] team0: Port device team_slave_1 added [ 27.222035][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.236382][ T3313] team0: Port device team_slave_1 added [ 27.242887][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.257561][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.296451][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.303442][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.329874][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.346174][ T3314] team0: Port device team_slave_0 added [ 27.352161][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.359239][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.385271][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.402165][ T3315] team0: Port device team_slave_0 added [ 27.408512][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.415622][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.441807][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.453206][ T3314] team0: Port device team_slave_1 added [ 27.459538][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.466530][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.492654][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.503945][ T3312] team0: Port device team_slave_0 added [ 27.510435][ T3315] team0: Port device team_slave_1 added [ 27.530308][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.537298][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.563614][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.575103][ T3312] team0: Port device team_slave_1 added [ 27.595108][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.602192][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.628357][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.639406][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.646484][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.672698][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.699492][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.706732][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.733031][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.746512][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.753889][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.780223][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.804756][ T3313] hsr_slave_0: entered promiscuous mode [ 27.810752][ T3313] hsr_slave_1: entered promiscuous mode [ 27.823654][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.830699][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.857182][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.885743][ T3314] hsr_slave_0: entered promiscuous mode [ 27.892019][ T3314] hsr_slave_1: entered promiscuous mode [ 27.898115][ T3314] debugfs: 'hsr0' already exists in 'hsr' [ 27.903836][ T3314] Cannot create hsr debugfs directory [ 27.914024][ T3321] hsr_slave_0: entered promiscuous mode [ 27.920278][ T3321] hsr_slave_1: entered promiscuous mode [ 27.926349][ T3321] debugfs: 'hsr0' already exists in 'hsr' [ 27.932099][ T3321] Cannot create hsr debugfs directory [ 27.951354][ T3315] hsr_slave_0: entered promiscuous mode [ 27.957505][ T3315] hsr_slave_1: entered promiscuous mode [ 27.963617][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 27.969624][ T3315] Cannot create hsr debugfs directory [ 28.025547][ T3312] hsr_slave_0: entered promiscuous mode [ 28.031825][ T3312] hsr_slave_1: entered promiscuous mode [ 28.038060][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 28.043796][ T3312] Cannot create hsr debugfs directory [ 28.202889][ T3321] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 28.211735][ T3321] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 28.220155][ T3321] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 28.230903][ T3321] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 28.254482][ T3313] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 28.268554][ T3313] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 28.277394][ T3313] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 28.287212][ T3313] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 28.311775][ T3314] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 28.321358][ T3314] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 28.330466][ T3314] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 28.341278][ T3314] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 28.387578][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.395664][ T3312] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 28.407320][ T3312] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 28.416569][ T3312] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 28.426468][ T3312] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 28.446957][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.466641][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.473808][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.482806][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.489989][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.511679][ T3315] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 28.522393][ T3315] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 28.531831][ T3315] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 28.541979][ T3315] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 28.567022][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.590507][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.601255][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.614102][ T1583] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.621200][ T1583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.654792][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.661994][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.681935][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.696849][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.704009][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.726675][ T1583] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.733874][ T1583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.767268][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.776531][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.796041][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 28.810483][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.830813][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.837962][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.851808][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 28.865670][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.872742][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.881634][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.888954][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.903155][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.910245][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.942192][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 28.958503][ T3315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 28.996772][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.006629][ T3321] veth0_vlan: entered promiscuous mode [ 29.019558][ T3321] veth1_vlan: entered promiscuous mode [ 29.057281][ T3321] veth0_macvtap: entered promiscuous mode [ 29.068400][ T3321] veth1_macvtap: entered promiscuous mode [ 29.098282][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.133836][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.158311][ T31] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.172254][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.182454][ T39] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.192146][ T3314] veth0_vlan: entered promiscuous mode [ 29.202265][ T39] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.218459][ T3314] veth1_vlan: entered promiscuous mode [ 29.229814][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.238787][ T39] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.263852][ T3313] veth0_vlan: entered promiscuous mode [ 29.281157][ T3314] veth0_macvtap: entered promiscuous mode [ 29.305368][ T3313] veth1_vlan: entered promiscuous mode [ 29.324103][ T3314] veth1_macvtap: entered promiscuous mode [ 29.330239][ T3321] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 29.341258][ T3313] veth0_macvtap: entered promiscuous mode [ 29.356976][ T3315] veth0_vlan: entered promiscuous mode [ 29.367147][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.375618][ T3313] veth1_macvtap: entered promiscuous mode [ 29.389105][ T3315] veth1_vlan: entered promiscuous mode [ 29.410922][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.427492][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.446250][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.457715][ T39] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.467203][ T3315] veth0_macvtap: entered promiscuous mode [ 29.490673][ T39] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.501720][ T3315] veth1_macvtap: entered promiscuous mode [ 29.509765][ T3312] veth0_vlan: entered promiscuous mode [ 29.518001][ T39] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.541876][ T3312] veth1_vlan: entered promiscuous mode [ 29.552672][ T39] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.565964][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.580320][ T39] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.596960][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.606374][ T39] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.634053][ T3312] veth0_macvtap: entered promiscuous mode [ 29.659717][ T3486] loop1: detected capacity change from 0 to 128 [ 29.666247][ T3490] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5'. [ 29.674096][ T3312] veth1_macvtap: entered promiscuous mode [ 29.718740][ T39] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.808390][ T39] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.827456][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.843348][ T3496] loop4: detected capacity change from 0 to 1024 [ 29.861552][ T39] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.874340][ T3496] ======================================================= [ 29.874340][ T3496] WARNING: The mand mount option has been deprecated and [ 29.874340][ T3496] and is ignored by this kernel. Remove the mand [ 29.874340][ T3496] option from the mount to silence this warning. [ 29.874340][ T3496] ======================================================= [ 29.909826][ T3496] EXT4-fs: Ignoring removed oldalloc option [ 29.913804][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.926445][ T29] kauditd_printk_skb: 137 callbacks suppressed [ 29.926460][ T29] audit: type=1400 audit(1764211148.714:209): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 29.935356][ T2304] kworker/u8:6: attempt to access beyond end of device [ 29.935356][ T2304] loop1: rw=1, sector=145, nr_sectors = 8 limit=128 [ 29.956131][ T3496] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 29.966653][ T2304] kworker/u8:6: attempt to access beyond end of device [ 29.966653][ T2304] loop1: rw=1, sector=161, nr_sectors = 8 limit=128 [ 29.981242][ T29] audit: type=1400 audit(1764211148.764:210): avc: denied { mount } for pid=3495 comm="syz.4.9" name="/" dev="loop4" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 29.992204][ T2304] kworker/u8:6: attempt to access beyond end of device [ 29.992204][ T2304] loop1: rw=1, sector=177, nr_sectors = 8 limit=128 [ 30.017798][ T39] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.040267][ T39] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.049645][ T3498] tap0: tun_chr_ioctl cmd 1074025677 [ 30.055243][ T2304] kworker/u8:6: attempt to access beyond end of device [ 30.055243][ T2304] loop1: rw=1, sector=193, nr_sectors = 8 limit=128 [ 30.062670][ T3498] tap0: linktype set to 778 [ 30.070167][ T2304] kworker/u8:6: attempt to access beyond end of device [ 30.070167][ T2304] loop1: rw=1, sector=209, nr_sectors = 8 limit=128 [ 30.075600][ T3313] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 30.088236][ T39] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.104769][ T2304] kworker/u8:6: attempt to access beyond end of device [ 30.104769][ T2304] loop1: rw=1, sector=225, nr_sectors = 8 limit=128 [ 30.118472][ T39] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.143365][ T2304] kworker/u8:6: attempt to access beyond end of device [ 30.143365][ T2304] loop1: rw=1, sector=241, nr_sectors = 8 limit=128 [ 30.146056][ T3507] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 30.169072][ T2304] kworker/u8:6: attempt to access beyond end of device [ 30.169072][ T2304] loop1: rw=1, sector=257, nr_sectors = 8 limit=128 [ 30.172334][ T29] audit: type=1400 audit(1764211148.924:211): avc: denied { write } for pid=3506 comm="syz.3.4" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.183998][ T2304] kworker/u8:6: attempt to access beyond end of device [ 30.183998][ T2304] loop1: rw=1, sector=273, nr_sectors = 8 limit=128 [ 30.205708][ T29] audit: type=1400 audit(1764211148.924:212): avc: denied { ioctl } for pid=3506 comm="syz.3.4" path="/dev/raw-gadget" dev="devtmpfs" ino=142 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 30.208378][ T3509] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12'. [ 30.219583][ T3507] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 30.248428][ T29] audit: type=1400 audit(1764211148.994:213): avc: denied { mounton } for pid=3508 comm="syz.4.12" path="/3/bus" dev="tmpfs" ino=34 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 30.261492][ T39] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.283752][ T2304] kworker/u8:6: attempt to access beyond end of device [ 30.283752][ T2304] loop1: rw=1, sector=289, nr_sectors = 8 limit=128 [ 30.335197][ T3512] netlink: 360 bytes leftover after parsing attributes in process `syz.1.11'. [ 30.366559][ T39] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.378261][ T3514] Zero length message leads to an empty skb [ 30.402477][ T39] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.415026][ T29] audit: type=1400 audit(1764211149.184:214): avc: denied { tracepoint } for pid=3515 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.484591][ T29] audit: type=1400 audit(1764211149.224:215): avc: denied { create } for pid=3519 comm="syz.2.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 30.504935][ T29] audit: type=1400 audit(1764211149.224:216): avc: denied { allowed } for pid=3519 comm="syz.2.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 30.524111][ T29] audit: type=1400 audit(1764211149.224:217): avc: denied { create } for pid=3519 comm="syz.2.15" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 30.545245][ T29] audit: type=1400 audit(1764211149.224:218): avc: denied { map } for pid=3519 comm="syz.2.15" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3894 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 30.626660][ T3527] loop0: detected capacity change from 0 to 2048 [ 30.638608][ T3532] FAULT_INJECTION: forcing a failure. [ 30.638608][ T3532] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 30.652102][ T3532] CPU: 1 UID: 0 PID: 3532 Comm: syz.2.18 Not tainted syzkaller #0 PREEMPT(voluntary) [ 30.652176][ T3532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 30.652190][ T3532] Call Trace: [ 30.652199][ T3532] [ 30.652208][ T3532] __dump_stack+0x1d/0x30 [ 30.652233][ T3532] dump_stack_lvl+0xe8/0x140 [ 30.652256][ T3532] dump_stack+0x15/0x1b [ 30.652340][ T3532] should_fail_ex+0x265/0x280 [ 30.652358][ T3532] should_fail+0xb/0x20 [ 30.652377][ T3532] should_fail_usercopy+0x1a/0x20 [ 30.652396][ T3532] _copy_from_user+0x1c/0xb0 [ 30.652419][ T3532] __sys_sendto+0x19e/0x330 [ 30.652663][ T3532] __x64_sys_sendto+0x76/0x90 [ 30.652689][ T3532] x64_sys_call+0x2d14/0x3000 [ 30.652715][ T3532] do_syscall_64+0xd2/0x200 [ 30.652742][ T3532] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 30.652782][ T3532] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 30.652861][ T3532] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 30.652933][ T3532] RIP: 0033:0x7f2103c0f749 [ 30.652952][ T3532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 30.652970][ T3532] RSP: 002b:00007f210266f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 30.652992][ T3532] RAX: ffffffffffffffda RBX: 00007f2103e65fa0 RCX: 00007f2103c0f749 [ 30.653007][ T3532] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 30.653020][ T3532] RBP: 00007f210266f090 R08: 0000200000000200 R09: 0000000000000010 [ 30.653035][ T3532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 30.653048][ T3532] R13: 00007f2103e66038 R14: 00007f2103e65fa0 R15: 00007ffc7b4bab98 [ 30.653143][ T3532] [ 30.876871][ T3527] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 30.906139][ T3507] can0: slcan on ttyS3. [ 30.965064][ T3527] netlink: 32 bytes leftover after parsing attributes in process `syz.0.17'. [ 30.978757][ T3540] capability: warning: `syz.3.4' uses deprecated v2 capabilities in a way that may be insecure [ 31.014512][ T3507] can0 (unregistered): slcan off ttyS3. [ 31.525303][ T3312] EXT4-fs error (device loop0): ext4_find_extent:939: inode #2: comm syz-executor: pblk 1 bad header/extent: invalid magic - magic 2, entries 0, max 3(0), depth 0(4) [ 31.602462][ T3312] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 31.868064][ T3576] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 31.880334][ T3576] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 32.694525][ T3529] Bluetooth: hci0: command 0x1003 tx timeout [ 32.694639][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 32.889637][ T3586] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 33.169669][ T3502] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 33.407279][ T3502] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 33.467275][ T3502] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 33.537968][ T3502] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 33.619093][ T3502] bridge_slave_1: left allmulticast mode [ 33.625275][ T3502] bridge_slave_1: left promiscuous mode [ 33.631003][ T3502] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.642110][ T3502] bridge_slave_0: left allmulticast mode [ 33.647982][ T3502] bridge_slave_0: left promiscuous mode [ 33.653670][ T3502] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.787032][ T3502] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 33.806868][ T3502] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 33.816796][ T3502] bond0 (unregistering): Released all slaves [ 33.858569][ T3502] hsr_slave_0: left promiscuous mode [ 33.864276][ T3502] hsr_slave_1: left promiscuous mode [ 33.870175][ T3502] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 33.877664][ T3502] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 33.885520][ T3502] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 33.892934][ T3502] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 33.905108][ T3502] veth1_macvtap: left promiscuous mode [ 33.910736][ T3502] veth0_macvtap: left promiscuous mode [ 33.917862][ T3502] veth1_vlan: left promiscuous mode [ 33.923222][ T3502] veth0_vlan: left promiscuous mode [ 33.995905][ T3502] team0 (unregistering): Port device team_slave_1 removed [ 34.007142][ T3502] team0 (unregistering): Port device team_slave_0 removed [ 34.189936][ T3600] netlink: 8 bytes leftover after parsing attributes in process `wg1'. [ 34.820818][ T3612] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 34.935060][ T29] kauditd_printk_skb: 11310 callbacks suppressed [ 34.935077][ T29] audit: type=1400 audit(1764211153.724:11115): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 34.973461][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 34.976901][ T29] audit: type=1400 audit(1764211153.724:11116): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 34.980194][ T3043] audit: audit_lost=139 audit_rate_limit=0 audit_backlog_limit=64 [ 35.001477][ T29] audit: type=1400 audit(1764211153.724:11117): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 35.009379][ T3043] audit: backlog limit exceeded [ 35.030692][ T29] audit: type=1400 audit(1764211153.724:11118): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 35.056796][ T29] audit: type=1400 audit(1764211153.724:11119): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 35.065266][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 35.078208][ T29] audit: type=1400 audit(1764211153.724:11120): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 35.548350][ T3620] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 36.187487][ T3043] ================================================================== [ 36.195728][ T3043] BUG: KCSAN: data-race in audit_log_start / audit_receive [ 36.203116][ T3043] [ 36.205538][ T3043] write to 0xffffffff88e91480 of 8 bytes by task 3620 on cpu 0: [ 36.213185][ T3043] audit_receive+0x200f/0x2180 [ 36.218086][ T3043] netlink_unicast+0x5c0/0x690 [ 36.222875][ T3043] netlink_sendmsg+0x58b/0x6b0 [ 36.227653][ T3043] __sock_sendmsg+0x145/0x180 [ 36.232389][ T3043] sock_sendmsg+0xc1/0x130 [ 36.236815][ T3043] splice_to_socket+0x5f3/0x990 [ 36.241708][ T3043] direct_splice_actor+0x156/0x2a0 [ 36.246854][ T3043] splice_direct_to_actor+0x312/0x680 [ 36.252333][ T3043] do_splice_direct+0xda/0x150 [ 36.257113][ T3043] do_sendfile+0x380/0x650 [ 36.261639][ T3043] __x64_sys_sendfile64+0x105/0x150 [ 36.266855][ T3043] x64_sys_call+0x2bb4/0x3000 [ 36.271567][ T3043] do_syscall_64+0xd2/0x200 [ 36.276178][ T3043] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.282106][ T3043] [ 36.284612][ T3043] read to 0xffffffff88e91480 of 8 bytes by task 3043 on cpu 1: [ 36.292352][ T3043] audit_log_start+0x106/0x720 [ 36.297322][ T3043] common_lsm_audit+0x66/0x230 [ 36.302193][ T3043] slow_avc_audit+0x104/0x140 [ 36.306900][ T3043] avc_has_perm+0x13a/0x180 [ 36.311419][ T3043] selinux_socket_recvmsg+0x175/0x1b0 [ 36.316818][ T3043] security_socket_recvmsg+0x50/0x90 [ 36.322116][ T3043] sock_recvmsg+0x38/0x170 [ 36.326654][ T3043] ____sys_recvmsg+0xf5/0x280 [ 36.331426][ T3043] ___sys_recvmsg+0x11f/0x370 [ 36.336202][ T3043] __x64_sys_recvmsg+0xd1/0x160 [ 36.341063][ T3043] x64_sys_call+0x2b46/0x3000 [ 36.345854][ T3043] do_syscall_64+0xd2/0x200 [ 36.350376][ T3043] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.356289][ T3043] [ 36.358636][ T3043] value changed: 0xffff888109c3d280 -> 0x0000000000000000 [ 36.365757][ T3043] [ 36.368125][ T3043] Reported by Kernel Concurrency Sanitizer on: [ 36.374378][ T3043] CPU: 1 UID: 0 PID: 3043 Comm: dhcpcd Not tainted syzkaller #0 PREEMPT(voluntary) [ 36.383957][ T3043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 36.394218][ T3043] ================================================================== [ 37.455021][ T3315] syz-executor (3315) used greatest stack depth: 10672 bytes left [ 37.470811][ T3502] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 37.566236][ T3502] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 37.618526][ T3502] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 37.687508][ T3502] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 37.754933][ T3502] bridge_slave_1: left allmulticast mode [ 37.760689][ T3502] bridge_slave_1: left promiscuous mode [ 37.766579][ T3502] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.775159][ T3502] bridge_slave_0: left allmulticast mode [ 37.780934][ T3502] bridge_slave_0: left promiscuous mode [ 37.786668][ T3502] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.885202][ T3321] syz-executor (3321) used greatest stack depth: 10608 bytes left [ 37.916283][ T3502] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 37.926456][ T3502] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 37.936683][ T3502] bond0 (unregistering): Released all slaves [ 37.998521][ T3502] hsr_slave_0: left promiscuous mode [ 38.004804][ T3502] hsr_slave_1: left promiscuous mode [ 38.010591][ T3502] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 38.018235][ T3502] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 38.026566][ T3502] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 38.034053][ T3502] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 38.044752][ T3502] veth1_macvtap: left promiscuous mode [ 38.050605][ T3502] veth0_macvtap: left promiscuous mode [ 38.057014][ T3502] veth1_vlan: left promiscuous mode [ 38.062694][ T3502] veth0_vlan: left promiscuous mode [ 38.133492][ T3502] team0 (unregistering): Port device team_slave_1 removed [ 38.148755][ T3502] team0 (unregistering): Port device team_slave_0 removed [ 38.461104][ T3502] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.509421][ T3502] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.567731][ T3502] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.627933][ T3502] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.697152][ T3502] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.758296][ T3502] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.829026][ T3502] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.887891][ T3502] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 38.978971][ T3502] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 39.037503][ T3502] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 39.097305][ T3502] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 39.157714][ T3502] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 39.234124][ T3502] bridge_slave_1: left allmulticast mode [ 39.240050][ T3502] bridge_slave_1: left promiscuous mode [ 39.245784][ T3502] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.255524][ T3502] bridge_slave_0: left allmulticast mode [ 39.261192][ T3502] bridge_slave_0: left promiscuous mode [ 39.266888][ T3502] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.276165][ T3502] bridge_slave_1: left allmulticast mode [ 39.282004][ T3502] bridge_slave_1: left promiscuous mode [ 39.287698][ T3502] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.296210][ T3502] bridge_slave_0: left allmulticast mode [ 39.301868][ T3502] bridge_slave_0: left promiscuous mode [ 39.307759][ T3502] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.316654][ T3502] bridge_slave_1: left allmulticast mode [ 39.322488][ T3502] bridge_slave_1: left promiscuous mode [ 39.328405][ T3502] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.336545][ T3502] bridge_slave_0: left allmulticast mode [ 39.342355][ T3502] bridge_slave_0: left promiscuous mode [ 39.348097][ T3502] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.477102][ T3502] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 39.487331][ T3502] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 39.497151][ T3502] bond0 (unregistering): Released all slaves [ 39.547330][ T3502] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 39.557575][ T3502] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 39.567650][ T3502] bond0 (unregistering): Released all slaves [ 39.617797][ T3502] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 39.627763][ T3502] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 39.637743][ T3502] bond0 (unregistering): Released all slaves [ 39.690402][ T3502] hsr_slave_0: left promiscuous mode [ 39.696182][ T3502] hsr_slave_1: left promiscuous mode [ 39.702007][ T3502] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 39.709626][ T3502] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 39.717388][ T3502] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 39.724843][ T3502] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 39.733796][ T3502] hsr_slave_0: left promiscuous mode [ 39.739864][ T3502] hsr_slave_1: left promiscuous mode [ 39.745419][ T3502] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 39.753321][ T3502] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 39.761178][ T3502] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 39.768615][ T3502] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 39.777801][ T3502] hsr_slave_0: left promiscuous mode [ 39.783433][ T3502] hsr_slave_1: left promiscuous mode [ 39.789159][ T3502] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 39.796729][ T3502] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 39.804472][ T3502] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 39.811862][ T3502] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 39.827207][ T3502] veth1_macvtap: left promiscuous mode [ 39.832725][ T3502] veth0_macvtap: left promiscuous mode [ 39.838628][ T3502] veth1_vlan: left promiscuous mode [ 39.843960][ T3502] veth0_vlan: left promiscuous mode [ 39.849860][ T3502] veth1_macvtap: left promiscuous mode [ 39.855489][ T3502] veth0_macvtap: left promiscuous mode [ 39.861098][ T3502] veth1_vlan: left promiscuous mode [ 39.866837][ T3502] veth0_vlan: left promiscuous mode [ 39.872470][ T3502] veth1_vlan: left promiscuous mode [ 39.878202][ T3502] veth0_vlan: left promiscuous mode [ 39.944468][ T29] kauditd_printk_skb: 46934 callbacks suppressed [ 39.944486][ T29] audit: type=1400 audit(1764211158.724:49638): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 39.979317][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 39.984470][ T29] audit: type=1400 audit(1764211158.764:49639): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 39.985908][ T3043] audit: audit_lost=2946 audit_rate_limit=0 audit_backlog_limit=64 [ 40.007274][ T29] audit: type=1400 audit(1764211158.764:49640): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 40.007296][ T29] audit: type=1400 audit(1764211158.764:49641): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 40.015304][ T3043] audit: backlog limit exceeded [ 40.016115][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 40.036724][ T29] audit: type=1400 audit(1764211158.764:49642): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 40.057941][ T3043] audit: audit_lost=2947 audit_rate_limit=0 audit_backlog_limit=64 [ 40.124645][ T3502] team0 (unregistering): Port device team_slave_1 removed [ 40.134279][ T3502] team0 (unregistering): Port device team_slave_0 removed [ 40.204644][ T3502] team0 (unregistering): Port device team_slave_1 removed [ 40.213909][ T3502] team0 (unregistering): Port device team_slave_0 removed [ 40.268898][ T3502] team0 (unregistering): Port device team_slave_1 removed [ 40.279023][ T3502] team0 (unregistering): Port device team_slave_0 removed [ 44.954486][ T29] kauditd_printk_skb: 51325 callbacks suppressed [ 44.954503][ T29] audit: type=1400 audit(1764211163.734:98948): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 44.961360][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 44.982289][ T29] audit: type=1400 audit(1764211163.744:98949): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 44.988724][ T3043] audit: audit_lost=3621 audit_rate_limit=0 audit_backlog_limit=64 [ 44.988738][ T3043] audit: backlog limit exceeded [ 44.988865][ T3043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 45.010203][ T29] audit: type=1400 audit(1764211163.744:98950): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 45.018321][ T3043] audit: audit_lost=3622 audit_rate_limit=0 audit_backlog_limit=64 [ 45.018336][ T3043] audit: backlog limit exceeded [ 45.023185][ T29] audit: type=1400 audit(1764211163.744:98951): avc: denied { read } for pid=3043 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0