last executing test programs: 1m11.852325864s ago: executing program 1 (id=85): getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) capset(&(0x7f0000000040)={0x20071026, r0}, &(0x7f0000000080)={0x3, 0x8000000}) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) socket$inet_sctp(0x2, 0x1, 0x84) readv(r1, &(0x7f0000000b40), 0x0) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c000000140011f225bd7000fddbcf250284", @ANYRES32=r1], 0x4c}, 0x1, 0x0, 0x0, 0x48000}, 0x40) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x87, 0xffffffff, 0x2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x153, 0x0, &(0x7f0000000300)="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", 0x0, 0x405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) syz_open_dev$sg(0x0, 0x6f5e, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r2 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) fsmount(r2, 0x0, 0x82) fchdir(r1) r3 = socket$inet6(0x10, 0x3, 0x0) fsconfig$FSCONFIG_SET_BINARY(r2, 0x2, &(0x7f0000000040)='\x00', &(0x7f00000001c0)="2251321b1f8e9e660c641b6f8eaff11b43b83c45159176de1d7575096ec4a8949f1f556df7f3471f693bd9d1daee733a40a6d4f4ec05e82369c48112a66655f5cc", 0x41) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400c000}, 0x2004c0a0) socket$packet(0x11, 0x3, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7}, 0x4) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000000)=0x9, 0x4) sendto$inet6(r3, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 1m11.73862601s ago: executing program 1 (id=86): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = fsopen(&(0x7f00000014c0)='proc\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x1, 0xa) fchdir(r2) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x101000, 0x108) getdents64(r3, &(0x7f0000000f80)=""/4096, 0x1000) 1m11.708618252s ago: executing program 1 (id=88): r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f0000000180)={[{@debug}]}, 0x0, 0x236, &(0x7f0000000300)="$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") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x5, 0x8, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e22, @local}}, 0x1, 0x4, 0x9, 0x0, 0x27, 0x7fffffff, 0x6}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) writev(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {0x0}, {&(0x7f0000000540)}], 0x3) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)={0x14, 0x0, 0x301, 0x1, 0x0, {{}, {@val={0x8, 0x1, 0x6c}, @val={0x8}, @void}}}, 0x24}}, 0x20000004) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r4, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x0, 0x0, 0x130, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty=0xffffff7f, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'veth0_to_bridge\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x100, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000002c0)={'tunl0\x00', &(0x7f0000000200)={'gretap0\x00', 0x0, 0x8, 0x40, 0x4, 0x5, {{0x8, 0x4, 0x0, 0x32, 0x20, 0x65, 0x0, 0x6, 0x6d, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, {[@generic={0x44, 0x7, "24877c5151"}, @ra={0x94, 0x4}]}}}}}) sendmsg$nl_route(r6, &(0x7f0000000600)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000005c0)={0x0}}, 0x53a0312486921888) ioctl$sock_bt_hci(r5, 0x400448e0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r7 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610408000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) recvmsg$can_bcm(r6, &(0x7f0000000780)={&(0x7f0000000640)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000006c0)=""/106, 0x6a}], 0x1, &(0x7f00000008c0)=""/4096, 0x1000}, 0x121) sendmsg$nl_route(r7, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000018c0)=ANY=[@ANYBLOB="2c0000001a00010000000000000000000a000000000000000000000008001900c18a3775bcf732adf9855812430a6306511f707e3750e7ac820e339a8b6bbf363dfcde0095575d7b325eaa86fd189377b810979b627a28c3d0b7b8e95da15cad8f8e4f06d5ba395e8f82a6b71fcfefc9d1c3eb61bf9cdea980c9ccbdb99a58e81a11ee9f1c4702c1dd23cf53daa4dfc40f2ec6a7cddb003c0959786129018d4391f203a90067c42aa9c09cf9c9a422fe91653b7b24b7145986ddf5efdee6718c2e26277a4675431f275b78cf073e2183b46615ad29", @ANYRES32=0x0, @ANYBLOB="0800100000000000"], 0x2c}}, 0x0) 1m11.343596303s ago: executing program 1 (id=91): open$dir(&(0x7f0000000000)='./file0\x00', 0x8400, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x48100, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000002c0)=0x8) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000100)=0xab) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_mount_image$ext4(&(0x7f00000004c0)='ext3\x00', &(0x7f0000000400)='./file0\x00', 0x490, &(0x7f0000000440)={[], [{@smackfshat}, {@seclabel}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '@&]-@+'}}]}, 0x6, 0x514, &(0x7f0000001400)="$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") lchown(&(0x7f0000000080)='./file1\x00', 0xee01, 0xffffffffffffffff) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x2, &(0x7f00000001c0)=[{0x6, 0x0, 0x1, 0x4}, {0x0, 0xf8, 0x8, 0x401}]}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e20}, 0x6e) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x2, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000140)={&(0x7f0000000880)={0x2, 0x4e1c, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32, @ANYBLOB="ac1417bb008000000000000038000000000000000000000007000000070e43aa5889c23ef593ae6bcd1844187c8073b5c9e00000000600000003000000080000000900001400000000000000000000000100000005000000000000001400000000000000000000000700000001000000000000001400000000000000000000000100000003000000000000001c000000000000000000000008"], 0xc0}, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)=0x7d) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000013c0)=0x11) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYRES8=r1, @ANYRES64=r3, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYRES32=r2], 0x50) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="020100be800ec101c0923a00000000000010000034f4a5cefdea74eccb8a97868d31f5f2ee01effb34932a20fd2e9d8da1c20672509f3861bfbf94d8c330b4a6f81eb7329812fe5d7d830ecf487c925d79f961cdd11ead5c3f92a48b91e1d92c126413d513bf5fedb5ba04261c10a472ed7e2b6a279f52c5b18da07aa9420183b41c5100dfaae89dfe833a09df3b61", @ANYRES32, @ANYBLOB="ffff00"/18, @ANYRES32=0x0, @ANYRES16, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000007200000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x4, &(0x7f0000ffe000/0x2000)=nil) 1m11.116487957s ago: executing program 1 (id=93): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x2a, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000540)='./bus\x00', 0x8800, &(0x7f0000000280)={[{@errors_remount}, {@usrquota}, {@minixdf}, {@nombcache}]}, 0x1, 0x51a, &(0x7f0000000f00)="$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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c1002, 0x0) write(r2, &(0x7f0000004200), 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) r5 = dup(0xffffffffffffffff) ioctl$BTRFS_IOC_RM_DEV(r5, 0x5000940b, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000040)={0x3, 0x0, 0x7, r4, 0x401}, 0xc) setsockopt$MRT6_FLUSH(r6, 0x29, 0xd4, &(0x7f0000000080)=0xc, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xb) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000080)={@remote, @multicast2}, &(0x7f00000000c0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14) sendmsg$NL80211_CMD_GET_INTERFACE(r6, 0x0, 0x44010) sendmsg$nl_generic(r5, 0x0, 0x50) 1m10.844892022s ago: executing program 1 (id=97): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) recvfrom$x25(r1, 0x0, 0x0, 0x40002001, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x4e24, 0xff, @mcast1, 0x7}]}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001700)={0x14, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x1c, 0xd601, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x5}, 0x0) r3 = syz_io_uring_setup(0x304, &(0x7f0000000300)={0x0, 0x8006d85, 0x400, 0x2, 0x200118}, &(0x7f00000000c0)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, 0x0, 0x0, 0x4) syz_io_uring_submit(r4, 0x0, &(0x7f00000004c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x8, 0x0, r2, 0x0, 0x0, 0x0, 0x100}) io_uring_enter(r3, 0x8aa, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000040)={r5, 0x9}, 0x8) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000001740)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xfffa}, {}, {0x1c, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0x10, 0x2, [@TCA_FLOWER_ACT={0x4}, @TCA_FLOWER_KEY_IP_TTL={0x5, 0x4b, 0x7}]}}, @TCA_RATE={0x6, 0x5, {0x13, 0x6}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000004}, 0x24000000) r6 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r6, 0x0, 0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) lseek(0xffffffffffffffff, 0x8000000000000000, 0x3) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000080)={'bond0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x4c, 0x10, 0xffffffffffffffff, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x1ba20, 0x40a38}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_LINKMODE={0x5, 0x11, 0x1}]}, 0x4c}}, 0x8000002) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="2e00000011008b88040f80ee59acbc04130800480f0000005e2900421803001825800000000000000280000c0012", 0x2e}], 0x1}, 0x0) 1m2.96863056s ago: executing program 0 (id=156): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000005c0), 0x12) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x8d8, &(0x7f0000000080), 0x3, 0x42f, &(0x7f0000000940)="$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") perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffffffff, 0xfc}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0xcb, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x1) r2 = open(&(0x7f0000000000)='./file1\x00', 0x143142, 0x80) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) stat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r3, 0xffffffffffffffff, r4) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000000140)="d800000010008104687da3aa7143a0b8c81d080b25000000e8fe5500000000120800030043000040a8002b000a00034006000dc3036010fab94dcf5c046109d67f6f94007134cf66e08000a0e408e8d8ef52a9d7c7c0b7a196e6f66112c88a2ddddbbb219c6ce06bbace80177ccbec4c2ee5a7cef4260027836b0d17a58af5d6d93424841f468430dfe1d9d322fe7c0aaa16b8ddc64193071e9f8775730d16a4683f7a5025ccc89e00360db70100000040fad95667e006dcdf63951f215ce3bb14feb9f5742d75c1b21770e7460e8ae6848fa45a1721c2db", 0xd8}], 0x1}, 0x20000080) sendfile(r2, r2, 0x0, 0x1000000201005) r6 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x50) sendfile(r6, r6, 0x0, 0x800000009) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) 1m2.712514185s ago: executing program 0 (id=160): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f00000000c0)={[{@fat=@time_offset={'time_offset', 0x3d, 0x3bf}}, {@shortname_winnt}, {@numtail}, {@fat=@nfs_nostale_ro}, {@uni_xlate}, {@uni_xlateno}, {@fat=@nfs_stale_rw}, {@fat=@discard}, {@fat=@debug}, {@shortname_mixed}, {@fat=@sys_immutable}, {@utf8no}, {@shortname_win95}]}, 0x0, 0x2a5, &(0x7f0000000540)="$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") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) io_setup(0x60, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000001400)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f0000000200)={0x1d, r4, 0x0, {0x0, 0x1, 0x4}, 0x1}, 0x18) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/fscreate\x00') fcntl$setstatus(r5, 0x4, 0x40800) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x4000, @fd=r5, 0x792, &(0x7f00000004c0)=[{&(0x7f00000006c0)=""/144, 0x90}], 0x1}) io_uring_enter(0xffffffffffffffff, 0x567, 0x1000a387, 0x0, 0x0, 0x0) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000540)="81b641f1f3843704b6", 0x9}], 0x1}, 0x4048081) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x64, 0x30, 0x871a15abc695fb3d, 0x0, 0x25dfdbfe, {}, [{0x50, 0x1, [@m_mpls={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x8a1, 0x2, 0x2, 0x4, 0x207}, 0x4}}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8002, &(0x7f00000000c0), 0xff, 0x4b4, &(0x7f0000000c80)="$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") r6 = creat(&(0x7f0000000040)='./bus\x00', 0x100) io_setup(0x1ff, &(0x7f00000001c0)=0x0) io_submit(r7, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x22, 0x1, 0x0, r6, &(0x7f0000000000), 0x4000, 0xa00}]) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, 0x1, 0x7}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfe33) setsockopt$SO_J1939_FILTER(r3, 0x6b, 0x1, &(0x7f0000000380)=[{0x3, 0x3, {0x2, 0x1, 0x4}, {0x1, 0xb25f81e830ee96fb, 0x1}, 0x0, 0xfe}, {0x5, 0x1, {0x1, 0xff}, {0x2, 0x1}, 0x1, 0x1}], 0x40) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=@newtfilter={0x24, 0x11, 0x1, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x74, r4, {0xfff3, 0x10}, {0xfff1, 0x9}, {0x2, 0x8}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x48040}, 0x20000050) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') pread64(r9, &(0x7f0000001900)=""/4079, 0xfef, 0x66) 1m2.395391694s ago: executing program 0 (id=161): r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcdb) r1 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) close(r0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x1a1) fcntl$setlease(r2, 0x400, 0x1) r3 = memfd_create(&(0x7f00000002c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9\xd6\x1c\x1b*\x9a!?\x7f\xa5\xad\x9a,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{&\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x80\x1ch\x89\xe7\xdd]q\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+\x02\x00\x00\x00\x00\x00\x00\x00\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xad\b\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc00x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) r5 = dup(0xffffffffffffffff) ioctl$BTRFS_IOC_RM_DEV(r5, 0x5000940b, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000040)={0x3, 0x0, 0x7, r4, 0x401}, 0xc) setsockopt$MRT6_FLUSH(r6, 0x29, 0xd4, &(0x7f0000000080)=0xc, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xb) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000080)={@remote, @multicast2}, &(0x7f00000000c0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14) sendmsg$NL80211_CMD_GET_INTERFACE(r6, 0x0, 0x44010) sendmsg$nl_generic(r5, 0x0, 0x50) 1m1.333902685s ago: executing program 0 (id=172): recvfrom$inet(0xffffffffffffffff, &(0x7f0000000200)=""/127, 0x7f, 0x2, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff7f, 0x0, 0x0, 0x58}, 0x52) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) ioctl$sock_SIOCBRDELBR(r3, 0x89a2, &(0x7f0000000000)='bridge0\x00') socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000003c0)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xf}, @val={@val={0x88a8, 0x4}, {0x8035, 0x7, 0x0, 0x3}}, {@canfd={0xd, {{0x3, 0x1}, 0x19, 0x0, 0x0, 0x0, "185dbb1cd7b284fee8cba2a31982503227a0ff346406455075b841f871b84b9dff1af3ba0a3fbfba7671ea11278096e5abfb374f6a01ec216cdde1aba35ee5e3"}}}}, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) unshare(0x64000600) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, 0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x44080, 0x20) 1m0.693630072s ago: executing program 4 (id=177): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x8d8, &(0x7f0000000080), 0x3, 0x42f, &(0x7f0000000940)="$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") fallocate(0xffffffffffffffff, 0x3, 0x6, 0xa4f) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffffffff, 0xfc}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0xcb, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x1) r0 = open(&(0x7f0000000000)='./file1\x00', 0x143142, 0x80) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) stat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r1, 0xffffffffffffffff, r2) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000000140)="d800000010008104687da3aa7143a0b8c81d080b25000000e8fe5500000000120800030043000040a8002b000a00034006000dc3036010fab94dcf5c046109d67f6f94007134cf66e08000a0e408e8d8ef52a9d7c7c0b7a196e6f66112c88a2ddddbbb219c6ce06bbace80177ccbec4c2ee5a7cef4260027836b0d17a58af5d6d93424841f468430dfe1d9d322fe7c0aaa16b8ddc64193071e9f8775730d16a4683f7a5025ccc89e00360db70100000040fad95667e006dcdf63951f215ce3bb14feb9f5742d75c1b21770e7460e8ae6848fa45a1721c2db", 0xd8}], 0x1}, 0x20000080) sendfile(r0, r0, 0x0, 0x1000000201005) r4 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x50) sendfile(r4, r4, 0x0, 0x800000009) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) 1m0.453719706s ago: executing program 4 (id=179): socket(0x28, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x80, 0x2, 0x7ffc1ffb}]}) socket$nl_generic(0x10, 0x3, 0x10) flistxattr(0xffffffffffffffff, &(0x7f0000000280)=""/183, 0xb7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$netlink(r3, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfd, 0x400}, 0xc) getsockname$packet(r3, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r2, &(0x7f0000024c80)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000024d40)=ANY=[@ANYBLOB="4400000010000d042abd7000077bf70000000000", @ANYRES32=r4, @ANYBLOB="01000000000000002400128009000100626f6e6400"], 0x44}, 0x1, 0x0, 0x0, 0x40040}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000e00)=ANY=[@ANYBLOB="44000000100001042abd70000000000000000000", @ANYRES32=r1, @ANYBLOB="0028000000000000140012800c0001006d6163766c616e00", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) socket(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = fsopen(&(0x7f0000000180)='debugfs\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x41, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fsmount(r9, 0x0, 0x1) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) ioctl$sock_SIOCBRDELBR(r8, 0x89a2, &(0x7f0000000000)='bridge0\x00') r10 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000000314230c2abd7000ff05df250900020073797a310000000008004100727865001400330073797a5f74756e"], 0x38}, 0x1, 0x0, 0x0, 0x48845}, 0x4000) ioperm(0x0, 0xd, 0x4000000000000020) 1m0.179736542s ago: executing program 4 (id=182): ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) r1 = memfd_secret(0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280)={r2, r1, 0x2e, 0x4608, @void}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000009c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20080, 0x80e1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r3, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) r5 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) io_setup(0x5, &(0x7f0000000540)=0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)={0xd2f0, 0x2000, 0x8, 0xadea}) sendmsg(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{}], 0x1, 0x0, 0x0, 0x11000000}, 0x0) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="0700000000ecffff0700000074bb284be36b2b6e75c1df7b3a331aee002c7341c4d434f4324f42c5a700185bc3b6f1287d0c6b0132ca81444b75b21975513aaf84de3d50c20a488cb1290c36838f8dbf12553298bca9d1cfd7ae1ff8e15eaae6bfdcba126c1186952f8e6ce2df9d768fe2ae1c7c3e0b79f2fb343d", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x50) close(0x3) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xe, 0x4, 0x8, 0x8001, 0x4}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000480850000002d00000018110000", @ANYRES32=r8, @ANYRES32=r9], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r10}, 0xc) ptrace(0x10, r7) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000540)) ptrace$cont(0x20, r7, 0x0, 0x0) io_submit(r6, 0x1, &(0x7f00000003c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0xe, r5, &(0x7f00000000c0)='\f\v', 0x2, 0x0, 0x0, 0x4}]) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r8}, &(0x7f0000000140), &(0x7f00000001c0)=r10}, 0x20) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) 59.70098357s ago: executing program 4 (id=183): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x5, 0x7, 0x7ffc0001}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0xcf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x7, 0x6}, 0x1004, 0x0, 0x10000, 0x0, 0x2, 0x80004001, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x40000c0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="1400000052004f030e789e7ee2", 0xd) recvmmsg(r0, 0x0, 0x0, 0x10122, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x62181) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000001c0)={0x8, 0x0, 0x0, 'queue0\x00', 0x3}) write$sndseq(r1, &(0x7f0000000000), 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.state\x00', 0x275a, 0x0) fcntl$lock(r2, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x8, 0x6}) fcntl$lock(r2, 0x24, &(0x7f0000000080)={0x2, 0x2, 0x7, 0x4000000008}) 59.513653901s ago: executing program 4 (id=184): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x2a, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000540)='./bus\x00', 0x8800, &(0x7f0000000280)={[{@errors_remount}, {@usrquota}, {@minixdf}, {@nombcache}]}, 0x1, 0x51a, &(0x7f0000000f00)="$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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x1c1840, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x1c1002, 0x0) write(r2, &(0x7f0000004200), 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) r5 = dup(0xffffffffffffffff) ioctl$BTRFS_IOC_RM_DEV(r5, 0x5000940b, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000040)={0x3, 0x0, 0x7, r4, 0x401}, 0xc) setsockopt$MRT6_FLUSH(r6, 0x29, 0xd4, &(0x7f0000000080)=0xc, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xb) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000080)={@remote, @multicast2}, &(0x7f00000000c0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14) sendmsg$NL80211_CMD_GET_INTERFACE(r6, 0x0, 0x44010) sendmsg$nl_generic(r5, 0x0, 0x50) 59.200469599s ago: executing program 4 (id=187): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) 55.798610897s ago: executing program 32 (id=97): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) recvfrom$x25(r1, 0x0, 0x0, 0x40002001, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x4e24, 0xff, @mcast1, 0x7}]}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001700)={0x14, 0x19, 0x1, 0x70bd2a, 0x25dfdbfb, {0x1c, 0xd601, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x5}, 0x0) r3 = syz_io_uring_setup(0x304, &(0x7f0000000300)={0x0, 0x8006d85, 0x400, 0x2, 0x200118}, &(0x7f00000000c0)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, 0x0, 0x0, 0x4) syz_io_uring_submit(r4, 0x0, &(0x7f00000004c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x8, 0x0, r2, 0x0, 0x0, 0x0, 0x100}) io_uring_enter(r3, 0x8aa, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000040)={r5, 0x9}, 0x8) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000001740)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xfffa}, {}, {0x1c, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0x10, 0x2, [@TCA_FLOWER_ACT={0x4}, @TCA_FLOWER_KEY_IP_TTL={0x5, 0x4b, 0x7}]}}, @TCA_RATE={0x6, 0x5, {0x13, 0x6}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000004}, 0x24000000) r6 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r6, 0x0, 0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) lseek(0xffffffffffffffff, 0x8000000000000000, 0x3) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000080)={'bond0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x4c, 0x10, 0xffffffffffffffff, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x1ba20, 0x40a38}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}]}}}, @IFLA_LINK={0x8, 0x5, r9}, @IFLA_LINKMODE={0x5, 0x11, 0x1}]}, 0x4c}}, 0x8000002) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="2e00000011008b88040f80ee59acbc04130800480f0000005e2900421803001825800000000000000280000c0012", 0x2e}], 0x1}, 0x0) 46.072080212s ago: executing program 33 (id=172): recvfrom$inet(0xffffffffffffffff, &(0x7f0000000200)=""/127, 0x7f, 0x2, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff7f, 0x0, 0x0, 0x58}, 0x52) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) ioctl$sock_SIOCBRDELBR(r3, 0x89a2, &(0x7f0000000000)='bridge0\x00') socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000003c0)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xf}, @val={@val={0x88a8, 0x4}, {0x8035, 0x7, 0x0, 0x3}}, {@canfd={0xd, {{0x3, 0x1}, 0x19, 0x0, 0x0, 0x0, "185dbb1cd7b284fee8cba2a31982503227a0ff346406455075b841f871b84b9dff1af3ba0a3fbfba7671ea11278096e5abfb374f6a01ec216cdde1aba35ee5e3"}}}}, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) unshare(0x64000600) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, 0x1c) openat$dir(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x44080, 0x20) 44.014652441s ago: executing program 34 (id=187): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) 35.890267494s ago: executing program 3 (id=243): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, 0x0, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 32.360137469s ago: executing program 3 (id=249): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005000a00000005000400010000000500010007000000"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 25.80612669s ago: executing program 3 (id=257): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$eJzs3c9v2+Ydx/EPXbt2NSAbtiEIAid9mmyAA7gqJTcOjJ446pHMViIFkmrtUxE0cmFE7opkAxZftlyyDdj+iF5333XYfdf9G8V6GnbTQFKy5ehXfjiRE7xfQvI8Ir/k86Us6Ava4kMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA5fs11K46aQdjZM9P5tThqjS/WslR0Bm6daWaMKznZP62t6Uqx6MrPT1dfzv67ofXi2brWsmZNxz+6/JNPfra8NNx+RsKvxcNHx/fv9nrdB4tOZEEaNgySKGh5DWuCJDI770narSemHjRtsp+ktmX82HppFJsN/5ap7OxsGVvejzpho+Y17XDhnQ+rrrttPi23rRcnUfjRp+XE3w2azSBs5DHZ6izmTvZG/CxITWq9ljEHh73u1rwks6DKswRV5wVV3Wq1UqlWK9u3d27fcd3lsQXuKUeu62osYvFvWizWOX+CAy9uaVD/1VSgUB3tyUx8+KopVqTWlPUDw/r/y4/szHFH639e5ftav3K6+qry+n+9eHZ9Wv2fksuMx0q2o+fe6unHu8N9PNQjHeu+7qqnnrp6cBqzeS4jXfBHQ1ahAiWKFKglL19iBkuMdrStbbn6UruqK5FRXYGaskq0r0SpbP6O8hVrVZ5SRYpltCFft2RUUX91R1sysiprX5E6CtVQTV6+lwMd5q/71owcT4IqM4K+GL7zqjOCnqv+50Y3+Rf1H9R/XCT9Yf1/2juLyAYAAAAAALwKTv7b9+z8f0XXpBVH9aBp3UWnBQAAAAAAzlH+l//1rMm/GXdNDuf/AAAAAAC8bZz8GjtHUknvF73h5VKDXwL0f7zoHAEAAAAAwMvJ//5/PWtKWe99OU+f/wMAAAAAgDfdn6bNsf9PqT+YFnDV+cd/FMcrzuP23i+cIy9b5h0NJggcmycwrV91Lg12kjfby4Nnvl13BrNfnkyC+f2gOZg3179zDgnoL/qgiPngXtHeG64pRinVg6Yt+1Hzk4o879JSavfS335z+Dvlh//nsHXJ+eHgsNctf/Xr3r08l8fZXh4fDV6psXkUZ+TyG10rYq5NPuKV/EKMwbglR9m47ujxLxWbLz3HmE90o4i5USra0tnjX8vGrJSnHX2RxaqklzryJ7pZxNzcuFk0E7KozsmiWx19/V/otXiGLLZmZbF62OtuvWQWALAoB7OrUO6ds3X3BT7lXk91f6KNImbjav7Bunx1wie6O6+uuBPq+trJ8MvDLPq/n5LF38bugTStxmbj/vVk3Eo+7nfZBt9NrapJs+po7dv/9vtH3+ryw0fHHx4e3f26+3X3m2p1a9v92HVvV7WSH8agofYAACaYf4+duRHOx3POqn968pWCsr6S/tfv39NmfrVB/o2DiXst5dv8kH8NYXPOWWtp5A4vm3PO6k5jq88Ru/UafhIAALw+N+bU4en13xnexc/ZnHPeXRr5SuHm6Nnxuxo7Ox6t5QAA4NWw8fdOKf2jE8dB+8vKzk7FS3etiSP/MxMHtYY1QZja2N/1woY17ThKIz9qZp3Pg5pNTNJpt6M4NfUoNu0oCfbyO7+bwa3fE9vywjTwk3bTeok1fhSmnp+aWpD4pt35VTNIdm2cb5y0rR/UA99Lgyg0SdSJfVs2JrF2JDCo2TAN6kHWDU07DlpevG8+j5qdljU1m/hx0E6jYofDsYKwHsWtfLflRb/YAABcEA8fHd+/2+t1Hww7zvLTS166s+hjBAAAZ1GlAQAAAAAAAAAAAAAAAAAAAAC4+M7tIr+3qrP6Kvb8hV5Fqu9Jmh3z75I0uqTff9Yhli7Cz+JMZzjp9IyYv09YJekPi0/+zepM+rQYm48awBvs/wEAAP//j/NUaA==") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 25.667013658s ago: executing program 6 (id=259): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 22.70947832s ago: executing program 6 (id=263): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005000a00000005000400010000000500010007000000"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) 22.130022244s ago: executing program 3 (id=265): r0 = getpid() r1 = socket$kcm(0x10, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_DEL(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000380)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="13005fa09d15fb0ba083080000000e0001006e657464655e0388c8bfba7673696d0000000002000000000000657673696d306c9361312b29603add63958800000800"], 0x3c}}, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f00000009c0), 0xff, 0x55c, &(0x7f0000000440)="$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") poll(0x0, 0x0, 0xfffffffa) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x183042, 0x15) mremap(&(0x7f0000008000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000000000/0x4000)=nil) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000002c0)={'macvlan0\x00'}) socket$nl_route(0x10, 0x3, 0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f000013f000/0x1000)=nil, 0x1000, 0x0, 0x4010, 0xffffffffffffffff, 0xef592000) mount$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='nr']) creat(&(0x7f0000000080)='./bus\x00', 0x154) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x8c, &(0x7f0000000440)='trans=rdma,') sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="d8000000150081044e81f782db44b9040a78080206000000040000a118000300ff05000006000e1208000f0100810401a80016eaa400010000005f54c92011148ed08734843cb12b00000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5e835913b06218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f52eb4edbb57a5025ccca9e00360d8bcc00400040fad95667e00600000000d5e1cace81b341139fe3cd4032e8edb12d1d2eb0c0ed0bfffdccf85df947e5e0", 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) r5 = syz_pidfd_open(r0, 0x0) setns(r5, 0x24020000) r6 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = syz_pidfd_open(r6, 0x0) setns(r7, 0x24020000) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff8000}]}) close_range(r8, 0xffffffffffffffff, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x701100, 0x0) clock_settime(0xfffffffb, &(0x7f0000000280)={0x0, 0x989680}) 21.371583958s ago: executing program 3 (id=266): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e657400000000090002007379"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 21.114975213s ago: executing program 3 (id=267): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8949, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\xe0\xff\xff\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x410a4400, 0x0, 0xfffffffffffffd56, 0x0, 0x0, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe49, 0x2, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x68c01, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) 21.114454983s ago: executing program 35 (id=267): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8949, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\xe0\xff\xff\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x410a4400, 0x0, 0xfffffffffffffd56, 0x0, 0x0, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe49, 0x2, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x68c01, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) 20.236349723s ago: executing program 5 (id=271): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$eJzs3c9v2+Ydx/EPXbt2NSAbtiEIAid9mmyAA7gqJTcOjJ446pHMViIFkmrtUxE0cmFE7opkAxZftlyyDdj+iF5333XYfdf9G8V6GnbTQFKy5ehXfjiRE7xfQvI8Ir/k86Us6Ava4kMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA5fs11K46aQdjZM9P5tThqjS/WslR0Bm6daWaMKznZP62t6Uqx6MrPT1dfzv67ofXi2brWsmZNxz+6/JNPfra8NNx+RsKvxcNHx/fv9nrdB4tOZEEaNgySKGh5DWuCJDI770narSemHjRtsp+ktmX82HppFJsN/5ap7OxsGVvejzpho+Y17XDhnQ+rrrttPi23rRcnUfjRp+XE3w2azSBs5DHZ6izmTvZG/CxITWq9ljEHh73u1rwks6DKswRV5wVV3Wq1UqlWK9u3d27fcd3lsQXuKUeu62osYvFvWizWOX+CAy9uaVD/1VSgUB3tyUx8+KopVqTWlPUDw/r/y4/szHFH639e5ftav3K6+qry+n+9eHZ9Wv2fksuMx0q2o+fe6unHu8N9PNQjHeu+7qqnnrp6cBqzeS4jXfBHQ1ahAiWKFKglL19iBkuMdrStbbn6UruqK5FRXYGaskq0r0SpbP6O8hVrVZ5SRYpltCFft2RUUX91R1sysiprX5E6CtVQTV6+lwMd5q/71owcT4IqM4K+GL7zqjOCnqv+50Y3+Rf1H9R/XCT9Yf1/2juLyAYAAAAAALwKTv7b9+z8f0XXpBVH9aBp3UWnBQAAAAAAzlH+l//1rMm/GXdNDuf/AAAAAAC8bZz8GjtHUknvF73h5VKDXwL0f7zoHAEAAAAAwMvJ//5/PWtKWe99OU+f/wMAAAAAgDfdn6bNsf9PqT+YFnDV+cd/FMcrzuP23i+cIy9b5h0NJggcmycwrV91Lg12kjfby4Nnvl13BrNfnkyC+f2gOZg3179zDgnoL/qgiPngXtHeG64pRinVg6Yt+1Hzk4o879JSavfS335z+Dvlh//nsHXJ+eHgsNctf/Xr3r08l8fZXh4fDV6psXkUZ+TyG10rYq5NPuKV/EKMwbglR9m47ujxLxWbLz3HmE90o4i5USra0tnjX8vGrJSnHX2RxaqklzryJ7pZxNzcuFk0E7KozsmiWx19/V/otXiGLLZmZbF62OtuvWQWALAoB7OrUO6ds3X3BT7lXk91f6KNImbjav7Bunx1wie6O6+uuBPq+trJ8MvDLPq/n5LF38bugTStxmbj/vVk3Eo+7nfZBt9NrapJs+po7dv/9vtH3+ryw0fHHx4e3f26+3X3m2p1a9v92HVvV7WSH8agofYAACaYf4+duRHOx3POqn968pWCsr6S/tfv39NmfrVB/o2DiXst5dv8kH8NYXPOWWtp5A4vm3PO6k5jq88Ru/UafhIAALw+N+bU4en13xnexc/ZnHPeXRr5SuHm6Nnxuxo7Ox6t5QAA4NWw8fdOKf2jE8dB+8vKzk7FS3etiSP/MxMHtYY1QZja2N/1woY17ThKIz9qZp3Pg5pNTNJpt6M4NfUoNu0oCfbyO7+bwa3fE9vywjTwk3bTeok1fhSmnp+aWpD4pt35VTNIdm2cb5y0rR/UA99Lgyg0SdSJfVs2JrF2JDCo2TAN6kHWDU07DlpevG8+j5qdljU1m/hx0E6jYofDsYKwHsWtfLflRb/YAABcEA8fHd+/2+t1Hww7zvLTS166s+hjBAAAZ1GlAQAAAAAAAAAAAAAAAAAAAAC4+M7tIr+3qrP6Kvb8hV5Fqu9Jmh3z75I0uqTff9Yhli7Cz+JMZzjp9IyYv09YJekPi0/+zepM+rQYm48awBvs/wEAAP//j/NUaA==") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 17.796067145s ago: executing program 5 (id=272): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$eJzs3c9v2+Ydx/EPXbt2NSAbtiEIAid9mmyAA7gqJTcOjJ446pHMViIFkmrtUxE0cmFE7opkAxZftlyyDdj+iF5333XYfdf9G8V6GnbTQFKy5ehXfjiRE7xfQvI8Ir/k86Us6Ava4kMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA5fs11K46aQdjZM9P5tThqjS/WslR0Bm6daWaMKznZP62t6Uqx6MrPT1dfzv67ofXi2brWsmZNxz+6/JNPfra8NNx+RsKvxcNHx/fv9nrdB4tOZEEaNgySKGh5DWuCJDI770narSemHjRtsp+ktmX82HppFJsN/5ap7OxsGVvejzpho+Y17XDhnQ+rrrttPi23rRcnUfjRp+XE3w2azSBs5DHZ6izmTvZG/CxITWq9ljEHh73u1rwks6DKswRV5wVV3Wq1UqlWK9u3d27fcd3lsQXuKUeu62osYvFvWizWOX+CAy9uaVD/1VSgUB3tyUx8+KopVqTWlPUDw/r/y4/szHFH639e5ftav3K6+qry+n+9eHZ9Wv2fksuMx0q2o+fe6unHu8N9PNQjHeu+7qqnnrp6cBqzeS4jXfBHQ1ahAiWKFKglL19iBkuMdrStbbn6UruqK5FRXYGaskq0r0SpbP6O8hVrVZ5SRYpltCFft2RUUX91R1sysiprX5E6CtVQTV6+lwMd5q/71owcT4IqM4K+GL7zqjOCnqv+50Y3+Rf1H9R/XCT9Yf1/2juLyAYAAAAAALwKTv7b9+z8f0XXpBVH9aBp3UWnBQAAAAAAzlH+l//1rMm/GXdNDuf/AAAAAAC8bZz8GjtHUknvF73h5VKDXwL0f7zoHAEAAAAAwMvJ//5/PWtKWe99OU+f/wMAAAAAgDfdn6bNsf9PqT+YFnDV+cd/FMcrzuP23i+cIy9b5h0NJggcmycwrV91Lg12kjfby4Nnvl13BrNfnkyC+f2gOZg3179zDgnoL/qgiPngXtHeG64pRinVg6Yt+1Hzk4o879JSavfS335z+Dvlh//nsHXJ+eHgsNctf/Xr3r08l8fZXh4fDV6psXkUZ+TyG10rYq5NPuKV/EKMwbglR9m47ujxLxWbLz3HmE90o4i5USra0tnjX8vGrJSnHX2RxaqklzryJ7pZxNzcuFk0E7KozsmiWx19/V/otXiGLLZmZbF62OtuvWQWALAoB7OrUO6ds3X3BT7lXk91f6KNImbjav7Bunx1wie6O6+uuBPq+trJ8MvDLPq/n5LF38bugTStxmbj/vVk3Eo+7nfZBt9NrapJs+po7dv/9vtH3+ryw0fHHx4e3f26+3X3m2p1a9v92HVvV7WSH8agofYAACaYf4+duRHOx3POqn968pWCsr6S/tfv39NmfrVB/o2DiXst5dv8kH8NYXPOWWtp5A4vm3PO6k5jq88Ru/UafhIAALw+N+bU4en13xnexc/ZnHPeXRr5SuHm6Nnxuxo7Ox6t5QAA4NWw8fdOKf2jE8dB+8vKzk7FS3etiSP/MxMHtYY1QZja2N/1woY17ThKIz9qZp3Pg5pNTNJpt6M4NfUoNu0oCfbyO7+bwa3fE9vywjTwk3bTeok1fhSmnp+aWpD4pt35VTNIdm2cb5y0rR/UA99Lgyg0SdSJfVs2JrF2JDCo2TAN6kHWDU07DlpevG8+j5qdljU1m/hx0E6jYofDsYKwHsWtfLflRb/YAABcEA8fHd+/2+t1Hww7zvLTS166s+hjBAAAZ1GlAQAAAAAAAAAAAAAAAAAAAAC4+M7tIr+3qrP6Kvb8hV5Fqu9Jmh3z75I0uqTff9Yhli7Cz+JMZzjp9IyYv09YJekPi0/+zepM+rQYm48awBvs/wEAAP//j/NUaA==") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 17.405363358s ago: executing program 8 (id=268): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005000a00000005000400010000000500010007000000"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 14.902924694s ago: executing program 6 (id=273): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005000a00000005000400"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) 12.571133369s ago: executing program 7 (id=275): socket(0x28, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x80, 0x2, 0x7ffc1ffb}]}) socket$nl_generic(0x10, 0x3, 0x10) flistxattr(0xffffffffffffffff, &(0x7f0000000280)=""/183, 0xb7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfd, 0x400}, 0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r2, &(0x7f0000024c80)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000024d40)=ANY=[@ANYBLOB="4400000010000d042abd7000077bf70000000000", @ANYRES32=r3, @ANYBLOB="01000000000000002400128009000100626f6e6400"], 0x44}, 0x1, 0x0, 0x0, 0x40040}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000e00)=ANY=[@ANYBLOB="44000000100001042abd70000000000000000000", @ANYRES32=r1, @ANYBLOB="0028000000000000140012800c0001006d6163766c616e00", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) socket(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = fsopen(&(0x7f0000000180)='debugfs\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x41, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fsconfig$FSCONFIG_CMD_CREATE(r8, 0x6, 0x0, 0x0, 0x0) fsmount(r8, 0x0, 0x1) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) ioctl$sock_SIOCBRDELBR(r7, 0x89a2, &(0x7f0000000000)='bridge0\x00') r9 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000000314230c2abd7000ff05df250900020073797a310000000008004100727865001400330073797a5f74756e"], 0x38}, 0x1, 0x0, 0x0, 0x48845}, 0x4000) ioperm(0x0, 0xd, 0x4000000000000020) 12.316143464s ago: executing program 2 (id=276): socket(0x28, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x80, 0x2, 0x7ffc1ffb}]}) socket$nl_generic(0x10, 0x3, 0x10) flistxattr(0xffffffffffffffff, &(0x7f0000000280)=""/183, 0xb7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$netlink(r3, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfd, 0x400}, 0xc) getsockname$packet(r3, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r2, &(0x7f0000024c80)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000024d40)=ANY=[@ANYBLOB="4400000010000d042abd7000077bf70000000000", @ANYRES32=r4, @ANYBLOB="01000000000000002400128009000100626f6e6400"], 0x44}, 0x1, 0x0, 0x0, 0x40040}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000e00)=ANY=[@ANYBLOB="44000000100001042abd70000000000000000000", @ANYRES32=r1, @ANYBLOB="0028000000000000140012800c0001006d6163766c616e00", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) socket(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = fsopen(&(0x7f0000000180)='debugfs\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x41, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fsconfig$FSCONFIG_CMD_CREATE(r9, 0x6, 0x0, 0x0, 0x0) fsmount(r9, 0x0, 0x1) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCBRDELBR(r8, 0x89a2, &(0x7f0000000000)='bridge0\x00') r10 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000000314230c2abd7000ff05df250900020073797a310000000008004100727865001400330073797a5f74756e"], 0x38}, 0x1, 0x0, 0x0, 0x48845}, 0x4000) ioperm(0x0, 0xd, 0x4000000000000020) 12.155535123s ago: executing program 2 (id=277): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x10}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0x8}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r7) r8 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000022c0)=@newtfilter={0x94, 0x2c, 0xd27, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x0, 0xe}, {}, {0x8, 0x4}}, [@filter_kind_options=@f_flow={{0x9}, {0x64, 0x2, [@TCA_FLOW_MODE={0x8, 0x2, 0x1}, @TCA_FLOW_KEYS={0x8, 0x1, 0x1e3a9}, @TCA_FLOW_ACT={0x50, 0x9, 0x0, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x3d1, 0x3, 0x2, 0x6, 0x6}, 0x17}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}]}}]}, 0x94}}, 0x2) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) sendmmsg$inet(r4, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @dev={0xac, 0x14, 0x14, 0x41}, @empty}}}], 0x20}}], 0x40000000000016c, 0x0) r9 = socket(0x400000000010, 0x3, 0x0) r10 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@gettfilter={0x24, 0x2e, 0x205, 0x70bd2c, 0x25dfdafd, {0x0, 0x0, 0x0, r11, {0xc, 0xc}, {0x0, 0xfff1}}}, 0x24}, 0x1, 0x0, 0x0, 0x20000801}, 0x4041080) 12.079805668s ago: executing program 7 (id=278): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r4, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r5, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005000a00000005000400010000000500010007000000"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 12.064462089s ago: executing program 2 (id=279): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005000a00000005000400010000000500010007000000"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 9.644260589s ago: executing program 5 (id=280): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 9.590864163s ago: executing program 8 (id=281): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8949, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\xe0\xff\xff\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x410a4400, 0x0, 0xfffffffffffffd56, 0x0, 0x0, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x68c01, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) 9.024627015s ago: executing program 7 (id=282): r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="05000000040000000400000004000000000000"], 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002080)=@generic={&(0x7f0000003d00)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r2}, 0x18) r3 = gettid() r4 = syz_clone(0x11, 0x0, 0xb, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, 0xffffffffffffffff, 0x0) rt_tgsigqueueinfo(r3, r4, 0x27, &(0x7f00000002c0)={0x17, 0x3, 0x6c3}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x5, 0x54}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x75}, 0x94) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x80000000) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000100), 0x0) setreuid(0xee01, 0x0) setreuid(0xee00, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x58, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x1c, 0x11, 0x0, 0x1, @meta={{0x9}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x1a}]}}}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x2}}}, 0xa0}}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x4, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xae}]}, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@gettaction={0x70, 0x32, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@action_gd=@TCA_ACT_TAB={0x54, 0x1, [{0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x14, 0x1e, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0xc, 0x5, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8000}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xa7}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x6}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000004}, 0x10) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000940)=@newtaction={0x60, 0x30, 0x1, 0x70bd29, 0x25dfdbfc, {}, [{0x4c, 0x1, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x2000000, 0x0, 0x80}}}]}, {0x1}, {0xc, 0x7, {0x2000000}}, {0xc}}}]}]}, 0x60}}, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@broadcast, @dev, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x8100, 0x2, 0x0, [0xb09a], "7f49"}, {0x0, 0x0, 0x0, 0x0, 0x11}, {}, {0xdd86}, {0x8, 0x22eb, 0x1, {{}, 0x2, {0x0, 0xfffd}}}}}}}}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.state\x00', 0x275a, 0x0) fcntl$lock(r8, 0x24, &(0x7f0000000080)={0x2, 0x2, 0x7, 0x4000000008}) sendmmsg$inet6(r6, &(0x7f0000000080)=[{{&(0x7f0000000100)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000180)="aabbcc", 0x3}], 0x1}}, {{&(0x7f00000001c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000240)="aabbcc", 0x3}], 0x1}}], 0x2, 0x0) 8.850399675s ago: executing program 7 (id=283): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$eJzs3c9v2+Ydx/EPXbt2NSAbtiEIAid9mmyAA7gqJTcOjJ446pHMViIFkmrtUxE0cmFE7opkAxZftlyyDdj+iF5333XYfdf9G8V6GnbTQFKy5ehXfjiRE7xfQvI8Ir/k86Us6Ava4kMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA5fs11K46aQdjZM9P5tThqjS/WslR0Bm6daWaMKznZP62t6Uqx6MrPT1dfzv67ofXi2brWsmZNxz+6/JNPfra8NNx+RsKvxcNHx/fv9nrdB4tOZEEaNgySKGh5DWuCJDI770narSemHjRtsp+ktmX82HppFJsN/5ap7OxsGVvejzpho+Y17XDhnQ+rrrttPi23rRcnUfjRp+XE3w2azSBs5DHZ6izmTvZG/CxITWq9ljEHh73u1rwks6DKswRV5wVV3Wq1UqlWK9u3d27fcd3lsQXuKUeu62osYvFvWizWOX+CAy9uaVD/1VSgUB3tyUx8+KopVqTWlPUDw/r/y4/szHFH639e5ftav3K6+qry+n+9eHZ9Wv2fksuMx0q2o+fe6unHu8N9PNQjHeu+7qqnnrp6cBqzeS4jXfBHQ1ahAiWKFKglL19iBkuMdrStbbn6UruqK5FRXYGaskq0r0SpbP6O8hVrVZ5SRYpltCFft2RUUX91R1sysiprX5E6CtVQTV6+lwMd5q/71owcT4IqM4K+GL7zqjOCnqv+50Y3+Rf1H9R/XCT9Yf1/2juLyAYAAAAAALwKTv7b9+z8f0XXpBVH9aBp3UWnBQAAAAAAzlH+l//1rMm/GXdNDuf/AAAAAAC8bZz8GjtHUknvF73h5VKDXwL0f7zoHAEAAAAAwMvJ//5/PWtKWe99OU+f/wMAAAAAgDfdn6bNsf9PqT+YFnDV+cd/FMcrzuP23i+cIy9b5h0NJggcmycwrV91Lg12kjfby4Nnvl13BrNfnkyC+f2gOZg3179zDgnoL/qgiPngXtHeG64pRinVg6Yt+1Hzk4o879JSavfS335z+Dvlh//nsHXJ+eHgsNctf/Xr3r08l8fZXh4fDV6psXkUZ+TyG10rYq5NPuKV/EKMwbglR9m47ujxLxWbLz3HmE90o4i5USra0tnjX8vGrJSnHX2RxaqklzryJ7pZxNzcuFk0E7KozsmiWx19/V/otXiGLLZmZbF62OtuvWQWALAoB7OrUO6ds3X3BT7lXk91f6KNImbjav7Bunx1wie6O6+uuBPq+trJ8MvDLPq/n5LF38bugTStxmbj/vVk3Eo+7nfZBt9NrapJs+po7dv/9vtH3+ryw0fHHx4e3f26+3X3m2p1a9v92HVvV7WSH8agofYAACaYf4+duRHOx3POqn968pWCsr6S/tfv39NmfrVB/o2DiXst5dv8kH8NYXPOWWtp5A4vm3PO6k5jq88Ru/UafhIAALw+N+bU4en13xnexc/ZnHPeXRr5SuHm6Nnxuxo7Ox6t5QAA4NWw8fdOKf2jE8dB+8vKzk7FS3etiSP/MxMHtYY1QZja2N/1woY17ThKIz9qZp3Pg5pNTNJpt6M4NfUoNu0oCfbyO7+bwa3fE9vywjTwk3bTeok1fhSmnp+aWpD4pt35VTNIdm2cb5y0rR/UA99Lgyg0SdSJfVs2JrF2JDCo2TAN6kHWDU07DlpevG8+j5qdljU1m/hx0E6jYofDsYKwHsWtfLflRb/YAABcEA8fHd+/2+t1Hww7zvLTS166s+hjBAAAZ1GlAQAAAAAAAAAAAAAAAAAAAAC4+M7tIr+3qrP6Kvb8hV5Fqu9Jmh3z75I0uqTff9Yhli7Cz+JMZzjp9IyYv09YJekPi0/+zepM+rQYm48awBvs/wEAAP//j/NUaA==") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 6.495889963s ago: executing program 5 (id=284): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x71d73e48) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005000a00000005000400010000000500010007000000"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 5.880592778s ago: executing program 2 (id=285): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$eJzs3c9v2+Ydx/EPXbt2NSAbtiEIAid9mmyAA7gqJTcOjJ446pHMViIFkmrtUxE0cmFE7opkAxZftlyyDdj+iF5333XYfdf9G8V6GnbTQFKy5ehXfjiRE7xfQvI8Ir/k86Us6Ava4kMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA5fs11K46aQdjZM9P5tThqjS/WslR0Bm6daWaMKznZP62t6Uqx6MrPT1dfzv67ofXi2brWsmZNxz+6/JNPfra8NNx+RsKvxcNHx/fv9nrdB4tOZEEaNgySKGh5DWuCJDI770narSemHjRtsp+ktmX82HppFJsN/5ap7OxsGVvejzpho+Y17XDhnQ+rrrttPi23rRcnUfjRp+XE3w2azSBs5DHZ6izmTvZG/CxITWq9ljEHh73u1rwks6DKswRV5wVV3Wq1UqlWK9u3d27fcd3lsQXuKUeu62osYvFvWizWOX+CAy9uaVD/1VSgUB3tyUx8+KopVqTWlPUDw/r/y4/szHFH639e5ftav3K6+qry+n+9eHZ9Wv2fksuMx0q2o+fe6unHu8N9PNQjHeu+7qqnnrp6cBqzeS4jXfBHQ1ahAiWKFKglL19iBkuMdrStbbn6UruqK5FRXYGaskq0r0SpbP6O8hVrVZ5SRYpltCFft2RUUX91R1sysiprX5E6CtVQTV6+lwMd5q/71owcT4IqM4K+GL7zqjOCnqv+50Y3+Rf1H9R/XCT9Yf1/2juLyAYAAAAAALwKTv7b9+z8f0XXpBVH9aBp3UWnBQAAAAAAzlH+l//1rMm/GXdNDuf/AAAAAAC8bZz8GjtHUknvF73h5VKDXwL0f7zoHAEAAAAAwMvJ//5/PWtKWe99OU+f/wMAAAAAgDfdn6bNsf9PqT+YFnDV+cd/FMcrzuP23i+cIy9b5h0NJggcmycwrV91Lg12kjfby4Nnvl13BrNfnkyC+f2gOZg3179zDgnoL/qgiPngXtHeG64pRinVg6Yt+1Hzk4o879JSavfS335z+Dvlh//nsHXJ+eHgsNctf/Xr3r08l8fZXh4fDV6psXkUZ+TyG10rYq5NPuKV/EKMwbglR9m47ujxLxWbLz3HmE90o4i5USra0tnjX8vGrJSnHX2RxaqklzryJ7pZxNzcuFk0E7KozsmiWx19/V/otXiGLLZmZbF62OtuvWQWALAoB7OrUO6ds3X3BT7lXk91f6KNImbjav7Bunx1wie6O6+uuBPq+trJ8MvDLPq/n5LF38bugTStxmbj/vVk3Eo+7nfZBt9NrapJs+po7dv/9vtH3+ryw0fHHx4e3f26+3X3m2p1a9v92HVvV7WSH8agofYAACaYf4+duRHOx3POqn968pWCsr6S/tfv39NmfrVB/o2DiXst5dv8kH8NYXPOWWtp5A4vm3PO6k5jq88Ru/UafhIAALw+N+bU4en13xnexc/ZnHPeXRr5SuHm6Nnxuxo7Ox6t5QAA4NWw8fdOKf2jE8dB+8vKzk7FS3etiSP/MxMHtYY1QZja2N/1woY17ThKIz9qZp3Pg5pNTNJpt6M4NfUoNu0oCfbyO7+bwa3fE9vywjTwk3bTeok1fhSmnp+aWpD4pt35VTNIdm2cb5y0rR/UA99Lgyg0SdSJfVs2JrF2JDCo2TAN6kHWDU07DlpevG8+j5qdljU1m/hx0E6jYofDsYKwHsWtfLflRb/YAABcEA8fHd+/2+t1Hww7zvLTS166s+hjBAAAZ1GlAQAAAAAAAAAAAAAAAAAAAAC4+M7tIr+3qrP6Kvb8hV5Fqu9Jmh3z75I0uqTff9Yhli7Cz+JMZzjp9IyYv09YJekPi0/+zepM+rQYm48awBvs/wEAAP//j/NUaA==") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005000a00000005000400010000000500010007000000"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 5.860663649s ago: executing program 6 (id=286): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005000a00000005000400010000000500010007000000"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 5.33734435s ago: executing program 8 (id=287): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005000a00000005000400010000000500010007000000"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 4.833065209s ago: executing program 7 (id=288): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005000a00000005000400010000000500010007000000"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 3.495066097s ago: executing program 5 (id=289): socket(0x28, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x80, 0x2, 0x7ffc1ffb}]}) socket$nl_generic(0x10, 0x3, 0x10) flistxattr(0xffffffffffffffff, &(0x7f0000000280)=""/183, 0xb7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$netlink(r3, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfd, 0x400}, 0xc) getsockname$packet(r3, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r2, &(0x7f0000024c80)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000024d40)=ANY=[@ANYBLOB="4400000010000d042abd7000077bf7000000", @ANYRES32=r4, @ANYBLOB="01000000000000002400128009000100626f6e6400"], 0x44}, 0x1, 0x0, 0x0, 0x40040}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000e00)=ANY=[@ANYBLOB="44000000100001042abd70000000000000000000", @ANYRES32=r1, @ANYBLOB="0028000000000000140012800c0001006d6163766c616e00", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) socket(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = fsopen(&(0x7f0000000180)='debugfs\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x41, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fsconfig$FSCONFIG_CMD_CREATE(r9, 0x6, 0x0, 0x0, 0x0) fsmount(r9, 0x0, 0x1) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) ioctl$sock_SIOCBRDELBR(r8, 0x89a2, &(0x7f0000000000)='bridge0\x00') r10 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000000314230c2abd7000ff05df250900020073797a310000000008004100727865001400330073797a5f74756e"], 0x38}, 0x1, 0x0, 0x0, 0x48845}, 0x4000) ioperm(0x0, 0xd, 0x4000000000000020) 3.063603092s ago: executing program 6 (id=290): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$eJzs3c9v2+Ydx/EPXbt2NSAbtiEIAid9mmyAA7gqJTcOjJ446pHMViIFkmrtUxE0cmFE7opkAxZftlyyDdj+iF5333XYfdf9G8V6GnbTQFKy5ehXfjiRE7xfQvI8Ir/k86Us6Ava4kMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA5fs11K46aQdjZM9P5tThqjS/WslR0Bm6daWaMKznZP62t6Uqx6MrPT1dfzv67ofXi2brWsmZNxz+6/JNPfra8NNx+RsKvxcNHx/fv9nrdB4tOZEEaNgySKGh5DWuCJDI770narSemHjRtsp+ktmX82HppFJsN/5ap7OxsGVvejzpho+Y17XDhnQ+rrrttPi23rRcnUfjRp+XE3w2azSBs5DHZ6izmTvZG/CxITWq9ljEHh73u1rwks6DKswRV5wVV3Wq1UqlWK9u3d27fcd3lsQXuKUeu62osYvFvWizWOX+CAy9uaVD/1VSgUB3tyUx8+KopVqTWlPUDw/r/y4/szHFH639e5ftav3K6+qry+n+9eHZ9Wv2fksuMx0q2o+fe6unHu8N9PNQjHeu+7qqnnrp6cBqzeS4jXfBHQ1ahAiWKFKglL19iBkuMdrStbbn6UruqK5FRXYGaskq0r0SpbP6O8hVrVZ5SRYpltCFft2RUUX91R1sysiprX5E6CtVQTV6+lwMd5q/71owcT4IqM4K+GL7zqjOCnqv+50Y3+Rf1H9R/XCT9Yf1/2juLyAYAAAAAALwKTv7b9+z8f0XXpBVH9aBp3UWnBQAAAAAAzlH+l//1rMm/GXdNDuf/AAAAAAC8bZz8GjtHUknvF73h5VKDXwL0f7zoHAEAAAAAwMvJ//5/PWtKWe99OU+f/wMAAAAAgDfdn6bNsf9PqT+YFnDV+cd/FMcrzuP23i+cIy9b5h0NJggcmycwrV91Lg12kjfby4Nnvl13BrNfnkyC+f2gOZg3179zDgnoL/qgiPngXtHeG64pRinVg6Yt+1Hzk4o879JSavfS335z+Dvlh//nsHXJ+eHgsNctf/Xr3r08l8fZXh4fDV6psXkUZ+TyG10rYq5NPuKV/EKMwbglR9m47ujxLxWbLz3HmE90o4i5USra0tnjX8vGrJSnHX2RxaqklzryJ7pZxNzcuFk0E7KozsmiWx19/V/otXiGLLZmZbF62OtuvWQWALAoB7OrUO6ds3X3BT7lXk91f6KNImbjav7Bunx1wie6O6+uuBPq+trJ8MvDLPq/n5LF38bugTStxmbj/vVk3Eo+7nfZBt9NrapJs+po7dv/9vtH3+ryw0fHHx4e3f26+3X3m2p1a9v92HVvV7WSH8agofYAACaYf4+duRHOx3POqn968pWCsr6S/tfv39NmfrVB/o2DiXst5dv8kH8NYXPOWWtp5A4vm3PO6k5jq88Ru/UafhIAALw+N+bU4en13xnexc/ZnHPeXRr5SuHm6Nnxuxo7Ox6t5QAA4NWw8fdOKf2jE8dB+8vKzk7FS3etiSP/MxMHtYY1QZja2N/1woY17ThKIz9qZp3Pg5pNTNJpt6M4NfUoNu0oCfbyO7+bwa3fE9vywjTwk3bTeok1fhSmnp+aWpD4pt35VTNIdm2cb5y0rR/UA99Lgyg0SdSJfVs2JrF2JDCo2TAN6kHWDU07DlpevG8+j5qdljU1m/hx0E6jYofDsYKwHsWtfLflRb/YAABcEA8fHd+/2+t1Hww7zvLTS166s+hjBAAAZ1GlAQAAAAAAAAAAAAAAAAAAAAC4+M7tIr+3qrP6Kvb8hV5Fqu9Jmh3z75I0uqTff9Yhli7Cz+JMZzjp9IyYv09YJekPi0/+zepM+rQYm48awBvs/wEAAP//j/NUaA==") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 2.908641861s ago: executing program 2 (id=291): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x10}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0x8}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r7) r8 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000380)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000022c0)=@newtfilter={0x24, 0x2c, 0xd27, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r9, {0x0, 0xe}, {}, {0x8, 0x4}}}, 0x24}}, 0x2) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) sendmmsg$inet(r4, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @dev={0xac, 0x14, 0x14, 0x41}, @empty}}}], 0x20}}], 0x40000000000016c, 0x0) r10 = socket(0x400000000010, 0x3, 0x0) r11 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r10, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@gettfilter={0x24, 0x2e, 0x205, 0x70bd2c, 0x25dfdafd, {0x0, 0x0, 0x0, r12, {0xc, 0xc}, {0x0, 0xfff1}}}, 0x24}, 0x1, 0x0, 0x0, 0x20000801}, 0x4041080) 2.676515024s ago: executing program 2 (id=292): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) shmget(0x1, 0xffffffffff000, 0x200, &(0x7f0000ffb000/0x3000)=nil) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005000a00000005000400010000000500010007000000"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 1.867655402s ago: executing program 8 (id=293): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e657400000000090002007379"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 1.238255878s ago: executing program 7 (id=294): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x500, 0x14) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e6574000000000900020073797a31000000000c000780080012400ffffffc050005000a00000005000400010000000500010007000000"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 440.909444ms ago: executing program 5 (id=295): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="58000000020603000000000000000000000000001100030068617365742c6e657400000000090002007379"], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 0s ago: executing program 6 (id=296): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4042, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x2, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20010006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0x6, 0x3, 0x2, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x8, 0x81, 0x1ac08736}}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', r2, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000240)='./file0\x00', 0x4000, &(0x7f00000004c0)=ANY=[], 0x3, 0x58f, &(0x7f0000000800)="$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") r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x9}, 0x6000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$incfs(0xffffffffffffff9c, 0x0, 0x149240, 0x0) lseek(r6, 0x0, 0x1) syz_clone(0x40002000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\b\x00'], 0x71d73e48) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[], 0x58}}, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYRES32=r1], 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) kernel console output (not intermixed with test programs): [ 19.623411][ T29] audit: type=1400 audit(1770263619.841:62): avc: denied { search } for pid=3191 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.645386][ T29] audit: type=1400 audit(1770263619.841:63): avc: denied { search } for pid=3191 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=477 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.668043][ T29] audit: type=1400 audit(1770263619.841:64): avc: denied { search } for pid=3191 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=481 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.690947][ T29] audit: type=1400 audit(1770263619.841:65): avc: denied { search } for pid=3191 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 19.713909][ T29] audit: type=1400 audit(1770263619.841:66): avc: denied { read open } for pid=3192 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.1.55' (ED25519) to the list of known hosts. [ 25.455053][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 25.455068][ T29] audit: type=1400 audit(1770263625.671:70): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 25.484007][ T29] audit: type=1400 audit(1770263625.701:71): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.484808][ T3297] cgroup: Unknown subsys name 'net' [ 25.511660][ T29] audit: type=1400 audit(1770263625.731:72): avc: denied { unmount } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 25.652040][ T3297] cgroup: Unknown subsys name 'cpuset' [ 25.658143][ T3297] cgroup: Unknown subsys name 'rlimit' [ 25.847571][ T29] audit: type=1400 audit(1770263626.061:73): avc: denied { setattr } for pid=3297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 25.877413][ T29] audit: type=1400 audit(1770263626.061:74): avc: denied { create } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.898177][ T29] audit: type=1400 audit(1770263626.061:75): avc: denied { write } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.918796][ T29] audit: type=1400 audit(1770263626.061:76): avc: denied { read } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 25.939072][ T29] audit: type=1400 audit(1770263626.071:77): avc: denied { read } for pid=3038 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 25.946595][ T3301] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 25.960083][ T29] audit: type=1400 audit(1770263626.081:78): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 25.993603][ T29] audit: type=1400 audit(1770263626.081:79): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.034722][ T3297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.163737][ T3307] chnl_net:caif_netlink_parms(): no params data found [ 27.203415][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 27.259865][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 27.285730][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.293021][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.300160][ T3315] bridge_slave_0: entered allmulticast mode [ 27.306570][ T3315] bridge_slave_0: entered promiscuous mode [ 27.315137][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.322279][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.329361][ T3315] bridge_slave_1: entered allmulticast mode [ 27.335675][ T3315] bridge_slave_1: entered promiscuous mode [ 27.348610][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.355673][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.362762][ T3307] bridge_slave_0: entered allmulticast mode [ 27.369268][ T3307] bridge_slave_0: entered promiscuous mode [ 27.379885][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.386978][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.394280][ T3307] bridge_slave_1: entered allmulticast mode [ 27.400606][ T3307] bridge_slave_1: entered promiscuous mode [ 27.407127][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 27.424212][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 27.465864][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.476109][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.486309][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.496536][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.545895][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.553032][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.560135][ T3313] bridge_slave_0: entered allmulticast mode [ 27.566603][ T3313] bridge_slave_0: entered promiscuous mode [ 27.573993][ T3307] team0: Port device team_slave_0 added [ 27.579580][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.586672][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.593959][ T3313] bridge_slave_1: entered allmulticast mode [ 27.600254][ T3313] bridge_slave_1: entered promiscuous mode [ 27.612024][ T3315] team0: Port device team_slave_0 added [ 27.620595][ T3307] team0: Port device team_slave_1 added [ 27.633670][ T3315] team0: Port device team_slave_1 added [ 27.670874][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 27.684816][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.691793][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.717790][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.732882][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.739937][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.747174][ T3318] bridge_slave_0: entered allmulticast mode [ 27.753655][ T3318] bridge_slave_0: entered promiscuous mode [ 27.760014][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.767090][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 27.774431][ T3311] bridge_slave_0: entered allmulticast mode [ 27.780904][ T3311] bridge_slave_0: entered promiscuous mode [ 27.788243][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 27.797420][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.804508][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.811706][ T3311] bridge_slave_1: entered allmulticast mode [ 27.818018][ T3311] bridge_slave_1: entered promiscuous mode [ 27.824760][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.831758][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.857704][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 27.868916][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 27.875946][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.901983][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 27.912734][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.919783][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.926941][ T3318] bridge_slave_1: entered allmulticast mode [ 27.933326][ T3318] bridge_slave_1: entered promiscuous mode [ 27.955297][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 27.962255][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 27.988342][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.012850][ T3313] team0: Port device team_slave_0 added [ 28.019393][ T3313] team0: Port device team_slave_1 added [ 28.034133][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.044461][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.055219][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.068931][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.075917][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.101807][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.113674][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.137466][ T3307] hsr_slave_0: entered promiscuous mode [ 28.143401][ T3307] hsr_slave_1: entered promiscuous mode [ 28.149587][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.156619][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.182490][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.233997][ T3318] team0: Port device team_slave_0 added [ 28.241724][ T3313] hsr_slave_0: entered promiscuous mode [ 28.247780][ T3313] hsr_slave_1: entered promiscuous mode [ 28.253697][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 28.259413][ T3313] Cannot create hsr debugfs directory [ 28.265611][ T3311] team0: Port device team_slave_0 added [ 28.272019][ T3311] team0: Port device team_slave_1 added [ 28.279611][ T3315] hsr_slave_0: entered promiscuous mode [ 28.285700][ T3315] hsr_slave_1: entered promiscuous mode [ 28.291614][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 28.297309][ T3315] Cannot create hsr debugfs directory [ 28.303374][ T3318] team0: Port device team_slave_1 added [ 28.331109][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.338054][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.363947][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.379111][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.386088][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.412188][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.431859][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.438824][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.464776][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.499323][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.506287][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 28.532248][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.583182][ T3311] hsr_slave_0: entered promiscuous mode [ 28.589042][ T3311] hsr_slave_1: entered promiscuous mode [ 28.595083][ T3311] debugfs: 'hsr0' already exists in 'hsr' [ 28.600789][ T3311] Cannot create hsr debugfs directory [ 28.631847][ T3318] hsr_slave_0: entered promiscuous mode [ 28.637799][ T3318] hsr_slave_1: entered promiscuous mode [ 28.643644][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 28.649343][ T3318] Cannot create hsr debugfs directory [ 28.760643][ T3307] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 28.778355][ T3307] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 28.794208][ T3307] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 28.809937][ T3307] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 28.825088][ T3313] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 28.834339][ T3313] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 28.845569][ T3313] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 28.862612][ T3313] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 28.882199][ T3315] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 28.896938][ T3315] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 28.905682][ T3315] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 28.918192][ T3315] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 28.952121][ T3318] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 28.962523][ T3318] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 28.979652][ T3318] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 28.990079][ T3318] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 29.011369][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.038137][ T3307] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.045318][ T3311] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.053954][ T3311] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.062331][ T3311] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.070825][ T3311] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.093595][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.100636][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.110495][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.117661][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.150335][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.166800][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.187785][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.204847][ T3332] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.211975][ T3332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.226183][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.242383][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.253919][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 29.268623][ T3332] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.275695][ T3332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.284912][ T3332] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.291978][ T3332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.300464][ T3332] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.308256][ T3332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.332466][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.352261][ T1692] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.359293][ T1692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.372347][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 29.383922][ T3332] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.390984][ T3332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.407600][ T3332] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.414716][ T3332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.428719][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.442226][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 29.455307][ T1692] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.462434][ T1692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.570969][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.588083][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.613615][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.666795][ T3307] veth0_vlan: entered promiscuous mode [ 29.677440][ T3307] veth1_vlan: entered promiscuous mode [ 29.728196][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 29.744876][ T3307] veth0_macvtap: entered promiscuous mode [ 29.763963][ T3307] veth1_macvtap: entered promiscuous mode [ 29.788195][ T3315] veth0_vlan: entered promiscuous mode [ 29.801922][ T3315] veth1_vlan: entered promiscuous mode [ 29.820911][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 29.851617][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 29.862171][ T3313] veth0_vlan: entered promiscuous mode [ 29.870624][ T3315] veth0_macvtap: entered promiscuous mode [ 29.878012][ T3318] veth0_vlan: entered promiscuous mode [ 29.889587][ T3318] veth1_vlan: entered promiscuous mode [ 29.895881][ T3315] veth1_macvtap: entered promiscuous mode [ 29.914643][ T3340] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.925175][ T3340] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.936006][ T3311] veth0_vlan: entered promiscuous mode [ 29.944596][ T3340] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.953513][ T3340] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 29.962607][ T3313] veth1_vlan: entered promiscuous mode [ 29.972172][ T3311] veth1_vlan: entered promiscuous mode [ 29.987873][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.006402][ T3311] veth0_macvtap: entered promiscuous mode [ 30.016799][ T3307] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 30.019115][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.039290][ T3318] veth0_macvtap: entered promiscuous mode [ 30.049974][ T3311] veth1_macvtap: entered promiscuous mode [ 30.060000][ T3318] veth1_macvtap: entered promiscuous mode [ 30.067446][ T3313] veth0_macvtap: entered promiscuous mode [ 30.084024][ T31] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.094161][ T31] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.103584][ T31] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.118433][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.126636][ T31] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.147164][ T3313] veth1_macvtap: entered promiscuous mode [ 30.159228][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.171956][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.187925][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.196104][ T31] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.211965][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.219182][ T31] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.229097][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.263152][ T31] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.291587][ T31] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.353743][ T31] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.388414][ T31] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.446782][ T31] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.462314][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 30.462336][ T29] audit: type=1400 audit(1770263630.681:111): avc: denied { relabelfrom } for pid=3490 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 30.491186][ T3500] sch_tbf: burst 32855 is lower than device lo mtu (65550) ! [ 30.511353][ T29] audit: type=1400 audit(1770263630.681:112): avc: denied { relabelto } for pid=3490 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 30.535432][ T31] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.545105][ T31] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.596500][ T31] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.605307][ T31] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.614338][ T31] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.646501][ T3504] syzkaller0: entered promiscuous mode [ 30.651168][ T29] audit: type=1400 audit(1770263630.861:113): avc: denied { create } for pid=3506 comm="syz.4.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 30.652108][ T3504] syzkaller0: entered allmulticast mode [ 30.672575][ T3507] netlink: 'syz.4.11': attribute type 10 has an invalid length. [ 30.702981][ T3507] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 30.727238][ T3507] 8021q: adding VLAN 0 to HW filter on device bond1 [ 30.728521][ T29] audit: type=1400 audit(1770263630.941:114): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 30.758005][ T29] audit: type=1400 audit(1770263630.941:115): avc: denied { open } for pid=3311 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 30.782153][ T29] audit: type=1400 audit(1770263630.941:116): avc: denied { ioctl } for pid=3311 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=103 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 30.804579][ T3507] bond_slave_0: entered promiscuous mode [ 30.813283][ T3507] bond_slave_1: entered promiscuous mode [ 30.818956][ T3507] syz_tun: entered promiscuous mode [ 30.833753][ T3507] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 30.842198][ T3507] bond1: (slave macvlan2): unknown ethtool speed (30000) for port 1 (set it to 0) [ 30.851514][ T3507] bond1: (slave macvlan2): speed changed to 0 on port 1 [ 30.860473][ T3507] bond1: (slave macvlan2): Enslaving as a backup interface with an up link [ 30.885532][ T3512] syzkaller0: entered promiscuous mode [ 30.891027][ T3512] syzkaller0: entered allmulticast mode [ 30.897273][ T29] audit: type=1400 audit(1770263631.101:117): avc: denied { ioctl } for pid=3510 comm="syz.3.12" path="socket:[4019]" dev="sockfs" ino=4019 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 30.958115][ T29] audit: type=1400 audit(1770263631.141:118): avc: denied { write } for pid=3510 comm="syz.3.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 30.996073][ T3521] syzkaller0: entered promiscuous mode [ 31.001651][ T3521] syzkaller0: entered allmulticast mode [ 31.018420][ T3521] 0: reclassify loop, rule prio 0, protocol 700 [ 31.039010][ T29] audit: type=1400 audit(1770263631.251:119): avc: denied { prog_run } for pid=3526 comm="syz.3.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 31.057802][ T29] audit: type=1400 audit(1770263631.251:120): avc: denied { write } for pid=3526 comm="syz.3.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.076933][ T3527] netlink: 'syz.3.16': attribute type 12 has an invalid length. [ 31.138172][ T3533] netlink: 14 bytes leftover after parsing attributes in process `syz.2.19'. [ 31.175842][ C1] hrtimer: interrupt took 67321 ns [ 31.225862][ T3533] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 31.244113][ T3533] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 31.273365][ T3533] bond0 (unregistering): Released all slaves [ 31.297494][ T3537] erspan0: entered promiscuous mode [ 31.385679][ T3553] syzkaller0: entered promiscuous mode [ 31.391362][ T3553] syzkaller0: entered allmulticast mode [ 31.464373][ T3533] syz.2.19 (3533) used greatest stack depth: 10440 bytes left [ 31.493342][ T3559] netlink: 'syz.2.27': attribute type 10 has an invalid length. [ 31.534839][ T3563] netlink: 'syz.4.29': attribute type 13 has an invalid length. [ 31.540405][ T3561] netlink: 28 bytes leftover after parsing attributes in process `syz.2.28'. [ 31.542514][ T3563] netlink: 4 bytes leftover after parsing attributes in process `syz.4.29'. [ 31.560046][ T3561] netlink: 28 bytes leftover after parsing attributes in process `syz.2.28'. [ 31.573767][ T3563] netlink: 'syz.4.29': attribute type 13 has an invalid length. [ 31.581490][ T3563] netlink: 4 bytes leftover after parsing attributes in process `syz.4.29'. [ 31.592386][ T3340] netdevsim netdevsim4 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 31.602034][ T3563] Zero length message leads to an empty skb [ 31.608094][ T3340] netdevsim netdevsim4 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 31.617554][ T3340] netdevsim netdevsim4 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 31.626927][ T3340] netdevsim netdevsim4 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 31.788499][ T3576] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 31.837941][ T3583] netlink: 'syz.0.39': attribute type 10 has an invalid length. [ 31.844616][ T3581] netlink: 14 bytes leftover after parsing attributes in process `syz.4.38'. [ 31.848816][ T3583] 8021q: adding VLAN 0 to HW filter on device team0 [ 31.862974][ T3583] bond0: (slave team0): Enslaving as an active interface with an up link [ 31.872708][ T3581] bond_slave_0: left promiscuous mode [ 31.878271][ T3581] bond_slave_1: left promiscuous mode [ 31.885202][ T3581] syz_tun: left promiscuous mode [ 31.935408][ T3581] bond1: (slave macvlan2): Removing an active aggregator [ 31.945066][ T3581] bond1: (slave macvlan2): Releasing backup interface [ 31.964404][ T3581] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 31.979395][ T3581] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 31.996587][ T3581] bond0 (unregistering): (slave syz_tun): Releasing backup interface [ 32.009521][ T3581] bond0 (unregistering): Released all slaves [ 32.020766][ T3586] netlink: 'syz.0.40': attribute type 12 has an invalid length. [ 32.106161][ T3588] netlink: 28 bytes leftover after parsing attributes in process `syz.0.41'. [ 32.114987][ T3588] netlink: 28 bytes leftover after parsing attributes in process `syz.0.41'. [ 32.196144][ T3590] netlink: 'syz.1.42': attribute type 13 has an invalid length. [ 32.203822][ T3590] netlink: 4 bytes leftover after parsing attributes in process `syz.1.42'. [ 32.216603][ T3340] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 32.216622][ T3590] netlink: 'syz.1.42': attribute type 13 has an invalid length. [ 32.216637][ T3590] netlink: 4 bytes leftover after parsing attributes in process `syz.1.42'. [ 32.226079][ T3340] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 32.250735][ T1692] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 32.260150][ T1692] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 32.406037][ T3604] loop0: detected capacity change from 0 to 1024 [ 32.422535][ T3604] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-001000000000 r/w without journal. Quota mode: none. [ 32.499229][ T3307] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-001000000000. [ 32.628831][ T3616] syzkaller0: entered promiscuous mode [ 32.634374][ T3616] syzkaller0: entered allmulticast mode [ 32.643332][ T3618] netlink: 'syz.3.50': attribute type 10 has an invalid length. [ 32.653641][ T3618] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.662158][ T3618] bond0: (slave team0): Enslaving as an active interface with an up link [ 32.760534][ T3623] syzkaller0: entered promiscuous mode [ 32.766167][ T3623] syzkaller0: entered allmulticast mode [ 32.775120][ T3623] 0: reclassify loop, rule prio 0, protocol 700 [ 32.841451][ T3627] loop3: detected capacity change from 0 to 2048 [ 32.872913][ T3627] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 32.885139][ T3627] ext4 filesystem being mounted at /8/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 33.280935][ T12] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 33.303469][ T12] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 33.318827][ T3642] syz.2.55 (3642) used greatest stack depth: 10040 bytes left [ 33.387850][ T3644] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 33.406384][ T3644] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 33.420281][ T3644] bond0 (unregistering): Released all slaves [ 33.430391][ T12] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 33.441175][ T12] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 33.526747][ T3651] loop4: detected capacity change from 0 to 512 [ 33.540700][ T3651] EXT4-fs: Ignoring removed mblk_io_submit option [ 33.578611][ T3651] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 33.588666][ T3651] EXT4-fs error (device loop4): ext4_clear_blocks:876: inode #13: comm syz.4.63: attempt to clear invalid blocks 2 len 1 [ 33.601630][ T3651] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1306: group 0, block bitmap and bg descriptor inconsistent: 218 vs 220 free clusters [ 33.616212][ T3651] EXT4-fs error (device loop4): ext4_free_branches:1023: inode #13: comm syz.4.63: invalid indirect mapped block 1819239214 (level 0) [ 33.638658][ T3651] EXT4-fs error (device loop4): ext4_free_branches:1023: inode #13: comm syz.4.63: invalid indirect mapped block 1819239214 (level 1) [ 33.757038][ T3651] EXT4-fs (loop4): 1 truncate cleaned up [ 33.780222][ T3661] syzkaller0: entered promiscuous mode [ 33.785820][ T3661] syzkaller0: entered allmulticast mode [ 33.899429][ T3311] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 33.919535][ T3651] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 34.132423][ T3669] loop1: detected capacity change from 0 to 512 [ 34.198962][ T3669] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 34.209892][ T3669] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (24509!=33349) [ 34.228090][ T3677] loop2: detected capacity change from 0 to 256 [ 34.235054][ T3677] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 34.269889][ T3677] FAT-fs (loop2): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 34.310251][ T3669] EXT4-fs (loop1): failed to initialize system zone (-117) [ 34.333775][ T3669] EXT4-fs (loop1): mount failed [ 34.387503][ T3318] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.540573][ T3685] syzkaller0: entered promiscuous mode [ 34.546369][ T3685] syzkaller0: entered allmulticast mode [ 34.742857][ T3695] capability: warning: `syz.2.78' uses 32-bit capabilities (legacy support in use) [ 34.851192][ T3700] sch_tbf: burst 32855 is lower than device lo mtu (65550) ! [ 34.936345][ T3707] loop2: detected capacity change from 0 to 512 [ 34.944761][ T3706] loop4: detected capacity change from 0 to 1024 [ 34.966774][ T3707] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 34.979956][ T3707] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 35.001563][ T3706] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-001000000000 r/w without journal. Quota mode: none. [ 35.023038][ T3707] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz.2.82: bad orphan inode 131083 [ 35.051863][ T3707] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.081872][ T3707] EXT4-fs error (device loop2): ext4_readdir:264: inode #2: block 13: comm syz.2.82: path /23/file1: bad entry in directory: '.' directory cannot be the last in data block - offset=0, inode=2, rec_len=1024, size=1024 fake=1 [ 35.146607][ T3318] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-001000000000. [ 35.272890][ T3313] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.293161][ T3716] capability: warning: `syz.1.85' uses deprecated v2 capabilities in a way that may be insecure [ 35.306271][ T3716] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3716 comm=syz.1.85 [ 35.377869][ T3720] loop1: detected capacity change from 0 to 128 [ 35.416914][ T3720] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=16, mo=a842c018, mo2=0002] [ 35.461985][ T3720] System zones: 1-3, 19-19, 35-36 [ 35.479487][ T3720] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 35.531572][ T29] kauditd_printk_skb: 189 callbacks suppressed [ 35.531621][ T29] audit: type=1400 audit(1770263891.733:310): avc: denied { write } for pid=3723 comm="syz.2.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 35.557963][ T29] audit: type=1400 audit(1770263891.733:311): avc: denied { nlmsg_write } for pid=3723 comm="syz.2.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 35.589084][ T3720] ext4 filesystem being mounted at /10/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 35.669588][ T29] audit: type=1400 audit(1770263891.873:312): avc: denied { getopt } for pid=3719 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 35.688901][ T29] audit: type=1400 audit(1770263891.873:313): avc: denied { create } for pid=3719 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 35.708153][ T29] audit: type=1400 audit(1770263891.873:314): avc: denied { ioctl } for pid=3719 comm="syz.1.88" path="socket:[5424]" dev="sockfs" ino=5424 ioctlcmd=0x48e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 35.742929][ T3730] loop4: detected capacity change from 0 to 128 [ 35.749658][ T3315] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 35.787576][ T3727] syz.4.84: attempt to access beyond end of device [ 35.787576][ T3727] loop4: rw=2049, sector=145, nr_sectors = 89 limit=128 [ 35.802238][ T3727] syz.4.84: attempt to access beyond end of device [ 35.802238][ T3727] loop4: rw=0, sector=97, nr_sectors = 32 limit=128 [ 35.829241][ T3727] syz.4.84: attempt to access beyond end of device [ 35.829241][ T3727] loop4: rw=0, sector=145, nr_sectors = 88 limit=128 [ 35.846451][ T3734] loop1: detected capacity change from 0 to 512 [ 35.895010][ T3734] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 35.937264][ T3729] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 35.945546][ T3729] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 35.978007][ T29] audit: type=1400 audit(1770263892.193:315): avc: denied { create } for pid=3742 comm="syz.1.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 36.036691][ T29] audit: type=1400 audit(1770263892.253:316): avc: denied { create } for pid=3745 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 36.056194][ T29] audit: type=1400 audit(1770263892.253:317): avc: denied { mounton } for pid=3745 comm="syz.0.105" path="/24/file0" dev="proc" ino=4026532503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=dir permissive=1 [ 36.083145][ T3743] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.106742][ T3746] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 36.122239][ T3747] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-001000000000 r/w without journal. Quota mode: none. [ 36.135051][ T3743] ext4 filesystem being mounted at /12/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 36.142059][ T3746] block device autoloading is deprecated and will be removed. [ 36.163605][ T3743] lo: entered allmulticast mode [ 36.168661][ T29] audit: type=1400 audit(1770263892.383:318): avc: denied { read } for pid=3742 comm="syz.1.93" path="/12/bus/bus" dev="loop1" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 36.168714][ T3743] lo: left allmulticast mode [ 36.195788][ T29] audit: type=1400 audit(1770263892.383:319): avc: denied { create } for pid=3752 comm="syz.3.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 36.255798][ T3313] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-001000000000. [ 36.412701][ T3767] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 36.512582][ T3767] EXT4-fs error (device loop3): ext4_orphan_get:1417: comm syz.3.103: bad orphan inode 131083 [ 36.533399][ T3767] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 36.589530][ T3767] EXT4-fs error (device loop3): ext4_readdir:264: inode #2: block 13: comm syz.3.103: path /16/file1: bad entry in directory: '.' directory cannot be the last in data block - offset=0, inode=2, rec_len=1024, size=1024 fake=1 [ 36.763703][ T3311] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.885043][ T3774] syzkaller0: entered promiscuous mode [ 36.890530][ T3774] syzkaller0: entered allmulticast mode [ 36.914521][ T3779] binfmt_misc: register: failed to install interpreter file ./file0 [ 37.162265][ T3782] syz_tun: entered allmulticast mode [ 37.315759][ T3786] GUP no longer grows the stack in syz.3.109 (3786): 200000004000-200000005000 (200000001000) [ 37.326311][ T3786] CPU: 0 UID: 0 PID: 3786 Comm: syz.3.109 Not tainted syzkaller #0 PREEMPT(voluntary) [ 37.326341][ T3786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 37.326365][ T3786] Call Trace: [ 37.326376][ T3786] [ 37.326385][ T3786] __dump_stack+0x1d/0x30 [ 37.326413][ T3786] dump_stack_lvl+0x95/0xd0 [ 37.326438][ T3786] dump_stack+0x15/0x1b [ 37.326461][ T3786] __get_user_pages+0x195b/0x1ea0 [ 37.326543][ T3786] ? perf_trace_run_bpf_submit+0xac/0x110 [ 37.326593][ T3786] ? perf_trace_mmap_lock_acquire_returned+0x225/0x270 [ 37.326698][ T3786] __gup_longterm_locked+0x8d7/0xe30 [ 37.326722][ T3786] ? __rcu_read_unlock+0x33/0x70 [ 37.326767][ T3786] ? try_get_folio+0x369/0x3b0 [ 37.326793][ T3786] ? try_grab_folio_fast+0xdc/0x370 [ 37.326864][ T3786] gup_fast_fallback+0x1f3/0x13c0 [ 37.326892][ T3786] get_user_pages_fast+0x5f/0x90 [ 37.326995][ T3786] __iov_iter_get_pages_alloc+0x24e/0x6f0 [ 37.327023][ T3786] ? __rcu_read_unlock+0x4e/0x70 [ 37.327055][ T3786] iov_iter_get_pages2+0x5e/0xa0 [ 37.327133][ T3786] __se_sys_vmsplice+0x538/0xf90 [ 37.327171][ T3786] __x64_sys_vmsplice+0x55/0x70 [ 37.327194][ T3786] x64_sys_call+0x2344/0x3000 [ 37.327223][ T3786] do_syscall_64+0xc0/0x2a0 [ 37.327315][ T3786] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.327340][ T3786] RIP: 0033:0x7fc46fa7aeb9 [ 37.327365][ T3786] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 37.327389][ T3786] RSP: 002b:00007fc46e4d7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 37.327484][ T3786] RAX: ffffffffffffffda RBX: 00007fc46fcf5fa0 RCX: 00007fc46fa7aeb9 [ 37.327498][ T3786] RDX: 0000000000000001 RSI: 0000200000000140 RDI: 000000000000000d [ 37.327513][ T3786] RBP: 00007fc46fae8c1f R08: 0000000000000000 R09: 0000000000000000 [ 37.327528][ T3786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 37.327542][ T3786] R13: 00007fc46fcf6038 R14: 00007fc46fcf5fa0 R15: 00007ffeab477988 [ 37.327594][ T3786] [ 37.957008][ T3792] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 37.979382][ T3792] validate_nla: 2 callbacks suppressed [ 37.979396][ T3792] netlink: 'syz.2.112': attribute type 14 has an invalid length. [ 37.986928][ T3797] set_capacity_and_notify: 6 callbacks suppressed [ 37.986943][ T3797] loop3: detected capacity change from 0 to 1024 [ 38.154583][ T3803] loop2: detected capacity change from 0 to 256 [ 38.162088][ T3803] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 38.189409][ T3799] loop0: detected capacity change from 0 to 512 [ 38.205158][ T3797] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-001000000000 r/w without journal. Quota mode: none. [ 38.269124][ T3803] FAT-fs (loop2): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 38.282281][ T3799] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a856c028, mo2=0002] [ 38.310205][ T3799] System zones: 0-2, 18-18, 34-35 [ 38.337438][ T3799] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 38.404649][ T3799] ext4 filesystem being mounted at /27/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 38.563989][ T3311] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-001000000000. [ 38.696836][ T3818] syzkaller0: entered promiscuous mode [ 38.702349][ T3818] syzkaller0: entered allmulticast mode [ 38.830418][ T3829] __nla_validate_parse: 4 callbacks suppressed [ 38.830431][ T3829] netlink: 28 bytes leftover after parsing attributes in process `syz.4.117'. [ 38.845567][ T3829] netlink: 32 bytes leftover after parsing attributes in process `syz.4.117'. [ 38.854457][ T3829] netlink: 28 bytes leftover after parsing attributes in process `syz.4.117'. [ 38.865151][ T3829] netlink: 32 bytes leftover after parsing attributes in process `syz.4.117'. [ 39.289718][ T3840] netlink: 12 bytes leftover after parsing attributes in process `syz.3.132'. [ 39.298655][ T3840] netlink: 1500 bytes leftover after parsing attributes in process `syz.3.132'. [ 39.400655][ T3843] netlink: 'syz.4.123': attribute type 11 has an invalid length. [ 39.409008][ T3844] netlink: 12 bytes leftover after parsing attributes in process `syz.3.132'. [ 39.467128][ T3840] netlink: 12 bytes leftover after parsing attributes in process `syz.3.132'. [ 39.520338][ T3848] ======================================================= [ 39.520338][ T3848] WARNING: The mand mount option has been deprecated and [ 39.520338][ T3848] and is ignored by this kernel. Remove the mand [ 39.520338][ T3848] option from the mount to silence this warning. [ 39.520338][ T3848] ======================================================= [ 39.563080][ T3851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3851 comm=syz.3.125 [ 39.575574][ T3852] loop4: detected capacity change from 0 to 1024 [ 39.576354][ T3851] netlink: 516 bytes leftover after parsing attributes in process `syz.3.125'. [ 39.582587][ T3852] EXT4-fs: Ignoring removed bh option [ 39.597602][ T3848] option changes via remount are deprecated (pid=3847 comm=syz.2.124) [ 39.611149][ T3852] EXT4-fs: Ignoring removed orlov option [ 39.616821][ T3852] EXT4-fs: Ignoring removed i_version option [ 39.623924][ T3848] sit0: entered allmulticast mode [ 39.634954][ T3848] sit0: entered promiscuous mode [ 39.661507][ T3852] EXT4-fs: Invalid want_extra_isize 3213 [ 39.804790][ T3864] netlink: 8 bytes leftover after parsing attributes in process `syz.3.128'. [ 39.870890][ T3865] loop2: detected capacity change from 0 to 128 [ 40.541995][ T29] kauditd_printk_skb: 485 callbacks suppressed [ 40.542011][ T29] audit: type=1326 audit(1770263896.763:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3856 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f73e50ab78e code=0x7ffc0000 [ 40.588607][ T29] audit: type=1326 audit(1770263896.763:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3856 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f73e50ab78e code=0x7ffc0000 [ 40.611886][ T29] audit: type=1326 audit(1770263896.763:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3856 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f73e50ab78e code=0x7ffc0000 [ 40.635533][ T29] audit: type=1326 audit(1770263896.773:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3856 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f73e50eaeb9 code=0x7ffc0000 [ 40.658797][ T29] audit: type=1326 audit(1770263896.773:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3856 comm="syz.4.126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=231 compat=0 ip=0x7f73e50eaeb9 code=0x7ffc0000 [ 40.701206][ T3875] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(15) [ 40.707901][ T3875] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 40.715530][ T3875] vhci_hcd vhci_hcd.0: Device attached [ 40.731557][ T3875] vhci_hcd vhci_hcd.0: pdev(4) rhport(1) sockfd(17) [ 40.738174][ T3875] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 40.745739][ T3875] vhci_hcd vhci_hcd.0: Device attached [ 40.813663][ T3880] xt_ecn: cannot match TCP bits for non-tcp packets [ 40.836574][ T31] kworker/u8:1: attempt to access beyond end of device [ 40.836574][ T31] loop2: rw=1, sector=145, nr_sectors = 16 limit=128 [ 40.850276][ T3881] vhci_hcd vhci_hcd.0: pdev(4) rhport(2) sockfd(19) [ 40.853275][ T31] kworker/u8:1: attempt to access beyond end of device [ 40.853275][ T31] loop2: rw=1, sector=169, nr_sectors = 8 limit=128 [ 40.856877][ T3881] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 40.877820][ T3881] vhci_hcd vhci_hcd.0: Device attached [ 40.884940][ T3875] vhci_hcd vhci_hcd.0: pdev(4) rhport(3) sockfd(22) [ 40.891543][ T3875] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 40.899117][ T3875] vhci_hcd vhci_hcd.0: Device attached [ 40.916741][ T31] kworker/u8:1: attempt to access beyond end of device [ 40.916741][ T31] loop2: rw=1, sector=185, nr_sectors = 8 limit=128 [ 40.930836][ T31] kworker/u8:1: attempt to access beyond end of device [ 40.930836][ T31] loop2: rw=1, sector=201, nr_sectors = 8 limit=128 [ 40.944571][ T3307] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.961214][ T3398] usb 9-1: new low-speed USB device number 2 using vhci_hcd [ 40.969299][ T3875] vhci_hcd vhci_hcd.0: pdev(4) rhport(4) sockfd(21) [ 40.970185][ T31] kworker/u8:1: attempt to access beyond end of device [ 40.970185][ T31] loop2: rw=1, sector=217, nr_sectors = 8 limit=128 [ 40.975949][ T3875] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 40.976012][ T3875] vhci_hcd vhci_hcd.0: Device attached [ 41.013072][ T31] kworker/u8:1: attempt to access beyond end of device [ 41.013072][ T31] loop2: rw=1, sector=233, nr_sectors = 8 limit=128 [ 41.078467][ T31] kworker/u8:1: attempt to access beyond end of device [ 41.078467][ T31] loop2: rw=1, sector=249, nr_sectors = 8 limit=128 [ 41.080722][ T3890] tipc: Started in network mode [ 41.096723][ T3890] tipc: Node identity 6631b7ddaeed, cluster identity 4711 [ 41.102386][ T31] kworker/u8:1: attempt to access beyond end of device [ 41.102386][ T31] loop2: rw=1, sector=265, nr_sectors = 8 limit=128 [ 41.104034][ T3890] tipc: Enabled bearer , priority 0 [ 41.121344][ T3881] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 41.141748][ T31] kworker/u8:1: attempt to access beyond end of device [ 41.141748][ T31] loop2: rw=1, sector=281, nr_sectors = 8 limit=128 [ 41.144156][ T3875] vhci_hcd vhci_hcd.0: pdev(4) rhport(5) sockfd(25) [ 41.161652][ T3875] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 41.162378][ T3881] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 41.169211][ T3875] vhci_hcd vhci_hcd.0: Device attached [ 41.189692][ T31] kworker/u8:1: attempt to access beyond end of device [ 41.189692][ T31] loop2: rw=1, sector=297, nr_sectors = 8 limit=128 [ 41.191397][ T3892] syzkaller0: entered promiscuous mode [ 41.208503][ T3892] syzkaller0: entered allmulticast mode [ 41.213759][ T3881] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 41.242593][ T29] audit: type=1400 audit(1770263897.463:810): avc: denied { execute } for pid=3874 comm="syz.4.131" path="/24/cpu.stat" dev="tmpfs" ino=144 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 41.290108][ T3886] vhci_hcd: connection closed [ 41.290270][ T3888] vhci_hcd: connection closed [ 41.295464][ T31] vhci_hcd vhci_hcd.4: stop threads [ 41.305346][ T31] vhci_hcd vhci_hcd.4: release socket [ 41.310765][ T31] vhci_hcd vhci_hcd.4: disconnect device [ 41.319573][ T3897] loop2: detected capacity change from 0 to 128 [ 41.327699][ T3878] vhci_hcd: connection closed [ 41.327825][ T3876] vhci_hcd: connection reset by peer [ 41.331316][ T3884] vhci_hcd: connection closed [ 41.337859][ T3890] SET target dimension over the limit! [ 41.337903][ T3882] vhci_hcd: connection closed [ 41.348748][ T3897] msdos: Bad value for 'uid' [ 41.349112][ T29] audit: type=1400 audit(1770263897.563:811): avc: denied { bind } for pid=3889 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 41.353502][ T3897] msdos: Bad value for 'uid' [ 41.358070][ T29] audit: type=1400 audit(1770263897.563:812): avc: denied { write } for pid=3889 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 41.406428][ T31] vhci_hcd vhci_hcd.4: stop threads [ 41.408867][ T3890] tipc: Resetting bearer [ 41.411691][ T31] vhci_hcd vhci_hcd.4: release socket [ 41.422901][ T31] vhci_hcd vhci_hcd.4: disconnect device [ 41.428829][ T3889] tipc: Resetting bearer [ 41.436189][ T31] vhci_hcd vhci_hcd.4: stop threads [ 41.441472][ T31] vhci_hcd vhci_hcd.4: release socket [ 41.446851][ T31] vhci_hcd vhci_hcd.4: disconnect device [ 41.456985][ T3889] tipc: Disabling bearer [ 41.467580][ T29] audit: type=1400 audit(1770263897.683:813): avc: denied { bind } for pid=3900 comm="syz.3.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 41.474686][ T3897] loop2: detected capacity change from 0 to 512 [ 41.494540][ T31] vhci_hcd vhci_hcd.4: stop threads [ 41.499847][ T31] vhci_hcd vhci_hcd.4: release socket [ 41.505332][ T31] vhci_hcd vhci_hcd.4: disconnect device [ 41.507134][ T29] audit: type=1400 audit(1770263897.713:814): avc: denied { ioctl } for pid=3900 comm="syz.3.136" path="socket:[6671]" dev="sockfs" ino=6671 ioctlcmd=0x9365 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 41.536568][ T31] vhci_hcd vhci_hcd.4: stop threads [ 41.541936][ T31] vhci_hcd vhci_hcd.4: release socket [ 41.547555][ T31] vhci_hcd vhci_hcd.4: disconnect device [ 41.668204][ T3897] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 41.673994][ T31] vhci_hcd vhci_hcd.4: stop threads [ 41.683298][ T31] vhci_hcd vhci_hcd.4: release socket [ 41.688689][ T31] vhci_hcd vhci_hcd.4: disconnect device [ 41.690399][ T3897] EXT4-fs (loop2): 1 truncate cleaned up [ 41.761389][ T3905] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 41.770172][ T3905] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 41.779711][ T3905] SET target dimension over the limit! [ 41.857823][ T3897] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 41.942849][ T3897] EXT4-fs error (device loop2): ext4_generic_delete_entry:2666: inode #2: block 13: comm syz.2.133: bad entry in directory: rec_len is smaller than minimal - offset=24, inode=11, rec_len=8, size=1024 fake=0 [ 41.999067][ T3902] loop3: detected capacity change from 0 to 32768 [ 42.127144][ T3897] EXT4-fs (loop2): Remounting filesystem read-only [ 42.133742][ T3897] EXT4-fs warning (device loop2): ext4_rename_delete:3729: inode #2: comm syz.2.133: Deleting old file: nlink 5, error=-117 [ 42.193072][ T3914] netlink: 'syz.4.139': attribute type 1 has an invalid length. [ 42.245176][ T3313] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.517271][ T3942] syz.4.149 uses obsolete (PF_INET,SOCK_PACKET) [ 43.633069][ T3944] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.640366][ T3944] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.712773][ T3946] loop4: detected capacity change from 0 to 512 [ 43.715087][ T3944] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 43.719741][ T3946] msdos: Bad value for 'uid' [ 43.731185][ T3946] msdos: Bad value for 'uid' [ 43.765889][ T3944] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 43.865022][ T1692] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 43.900948][ T1692] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 43.965058][ T1692] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 43.981444][ T1692] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 44.074438][ T3965] netlink: 'syz.3.155': attribute type 21 has an invalid length. [ 44.083229][ T3965] netlink: 132 bytes leftover after parsing attributes in process `syz.3.155'. [ 44.093572][ T3965] netlink: 20 bytes leftover after parsing attributes in process `syz.3.155'. [ 44.124999][ T3968] loop0: detected capacity change from 0 to 512 [ 44.169907][ T3968] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 44.196373][ T3968] EXT4-fs (loop0): 1 truncate cleaned up [ 44.214668][ T3968] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 44.228457][ T3973] netlink: 20 bytes leftover after parsing attributes in process `syz.2.157'. [ 44.260240][ T3968] netlink: 8 bytes leftover after parsing attributes in process `syz.0.156'. [ 44.263653][ T3973] 8021q: adding VLAN 0 to HW filter on device bond0 [ 44.282853][ T3968] C: renamed from team_slave_0 (while UP) [ 44.290330][ T3968] netlink: 'syz.0.156': attribute type 3 has an invalid length. [ 44.298038][ T3968] netlink: 152 bytes leftover after parsing attributes in process `syz.0.156'. [ 44.307043][ T3968] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 44.322021][ T3973] netlink: 8 bytes leftover after parsing attributes in process `syz.2.157'. [ 44.330830][ T3973] netlink: 4 bytes leftover after parsing attributes in process `syz.2.157'. [ 44.365549][ T3307] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.385507][ T3973] bridge0: port 3(syz_tun) entered blocking state [ 44.392014][ T3973] bridge0: port 3(syz_tun) entered disabled state [ 44.404414][ T3982] process 'syz.4.159' launched '/dev/fd/5' with NULL argv: empty string added [ 44.419462][ T3973] syz_tun: entered allmulticast mode [ 44.426721][ T3984] loop0: detected capacity change from 0 to 128 [ 44.426895][ T3973] syz_tun: entered promiscuous mode [ 44.439698][ T3973] bridge0: port 3(syz_tun) entered blocking state [ 44.446161][ T3973] bridge0: port 3(syz_tun) entered forwarding state [ 44.465782][ T3984] netlink: 4 bytes leftover after parsing attributes in process `syz.0.160'. [ 44.558357][ T3985] infiniband syz1: set active [ 44.563141][ T3985] infiniband syz1: added syz_tun [ 44.583910][ T3985] RDS/IB: syz1: added [ 44.588092][ T3985] smc: adding ib device syz1 with port count 1 [ 44.594489][ T3985] smc: ib device syz1 port 1 has no pnetid [ 45.028887][ T3993] loop2: detected capacity change from 0 to 8192 [ 45.274447][ T4001] netlink: 20 bytes leftover after parsing attributes in process `syz.4.167'. [ 45.286225][ T4001] netlink: 8 bytes leftover after parsing attributes in process `syz.4.167'. [ 45.316734][ T4001] bridge0: port 3(syz_tun) entered blocking state [ 45.323245][ T4001] bridge0: port 3(syz_tun) entered disabled state [ 45.334121][ T4001] syz_tun: entered allmulticast mode [ 45.342020][ T4001] syz_tun: entered promiscuous mode [ 45.362030][ T4001] rdma_rxe: rxe_newlink: failed to add syz_tun [ 45.389050][ T3999] loop2: detected capacity change from 0 to 8192 [ 45.552394][ T29] kauditd_printk_skb: 642 callbacks suppressed [ 45.552409][ T29] audit: type=1326 audit(1770263901.773:1457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3998 comm="syz.2.166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=231 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 45.627520][ T4013] loop0: detected capacity change from 0 to 512 [ 45.652806][ T4013] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 45.665686][ T4013] ext4 filesystem being mounted at /40/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 45.712273][ T4013] lo: entered allmulticast mode [ 45.717585][ T4013] lo: left allmulticast mode [ 45.953855][ T29] audit: type=1326 audit(1770263902.173:1458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4020 comm="syz.2.174" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fd34603aeb9 code=0x0 [ 45.991158][ T3398] usb 9-1: enqueue for inactive port 0 [ 45.996735][ T3398] usb 9-1: enqueue for inactive port 0 [ 46.081215][ T3398] vhci_hcd vhci_hcd.4: vhci_device speed not set [ 46.396662][ T4030] loop4: detected capacity change from 0 to 512 [ 46.414131][ T4030] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 46.441970][ T4030] EXT4-fs (loop4): 1 truncate cleaned up [ 46.465784][ T4030] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 46.502131][ T4030] C: renamed from team_slave_0 (while UP) [ 46.534502][ T4030] netlink: 'syz.4.177': attribute type 3 has an invalid length. [ 46.542273][ T4030] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 46.624381][ T3318] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.679779][ T29] audit: type=1326 audit(1770263902.893:1459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.4.179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f73e50eaeb9 code=0x7ffc0000 [ 46.741098][ T29] audit: type=1326 audit(1770263902.933:1460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.4.179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f73e50eaeb9 code=0x7ffc0000 [ 46.757960][ T4035] rdma_rxe: rxe_newlink: failed to add syz_tun [ 46.764552][ T29] audit: type=1326 audit(1770263902.933:1461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.4.179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f73e50eaeb9 code=0x7ffc0000 [ 46.794026][ T29] audit: type=1326 audit(1770263902.933:1462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.4.179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f73e50eaeb9 code=0x7ffc0000 [ 46.817311][ T29] audit: type=1326 audit(1770263902.933:1463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.4.179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=196 compat=0 ip=0x7f73e50eaeb9 code=0x7ffc0000 [ 46.840604][ T29] audit: type=1326 audit(1770263902.933:1464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.4.179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f73e50eaeb9 code=0x7ffc0000 [ 46.863971][ T29] audit: type=1326 audit(1770263902.933:1465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.4.179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f73e50eaeb9 code=0x7ffc0000 [ 46.887324][ T29] audit: type=1326 audit(1770263902.933:1466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.4.179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f73e50eaeb9 code=0x7ffc0000 [ 47.050109][ T4045] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.057416][ T4045] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.122188][ T4045] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 47.143634][ T4045] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 47.201893][ T42] netdevsim netdevsim4 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 47.210788][ T42] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.231139][ T42] netdevsim netdevsim4 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 47.240023][ T42] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.269295][ T42] netdevsim netdevsim4 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 47.278230][ T42] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.307439][ T42] netdevsim netdevsim4 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 47.316368][ T42] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.412760][ T4051] 8021q: adding VLAN 0 to HW filter on device bond1 [ 47.453711][ T4051] 8021q: adding VLAN 0 to HW filter on device bond0 [ 47.481096][ T4051] bond1: (slave bond0): Enslaving as an active interface with an up link [ 47.590816][ T4057] loop4: detected capacity change from 0 to 512 [ 47.618500][ T4056] bridge0: port 3(syz_tun) entered blocking state [ 47.625017][ T4056] bridge0: port 3(syz_tun) entered disabled state [ 47.669389][ T4056] syz_tun: entered promiscuous mode [ 47.675448][ T4057] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 47.741286][ T4057] ext4 filesystem being mounted at /38/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 47.796334][ T4061] bond1: (slave bond0): Releasing backup interface [ 47.833862][ T4057] lo: entered allmulticast mode [ 47.846359][ T4062] lo: left allmulticast mode [ 47.894708][ T4061] rdma_rxe: rxe_newlink: failed to add syz_tun [ 48.017379][ T4064] rdma_rxe: rxe_newlink: failed to add syz_tun [ 48.474426][ T4069] 8021q: adding VLAN 0 to HW filter on device bond0 [ 48.512665][ T4069] bond1: (slave bond0): Enslaving as an active interface with an up link [ 48.524823][ T4070] rdma_rxe: rxe_newlink: failed to add syz_tun [ 48.612265][ T4072] bond1: (slave bond0): Releasing backup interface [ 49.126843][ T4080] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 49.135396][ T4080] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 49.144251][ T4080] Cannot find add_set index 0 as target [ 49.694847][ T4090] __nla_validate_parse: 27 callbacks suppressed [ 49.694863][ T4090] netlink: 20 bytes leftover after parsing attributes in process `syz.2.200'. [ 49.778869][ T4093] loop3: detected capacity change from 0 to 164 [ 49.801688][ T4090] netlink: 8 bytes leftover after parsing attributes in process `syz.2.200'. [ 49.810465][ T4090] netlink: 4 bytes leftover after parsing attributes in process `syz.2.200'. [ 49.850909][ T4093] Unsupported NM flag settings (240) [ 49.987068][ T4097] netlink: 20 bytes leftover after parsing attributes in process `syz.2.202'. [ 50.023950][ T4093] netlink: 48 bytes leftover after parsing attributes in process `syz.3.201'. [ 50.037732][ T4097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.051997][ T4098] netlink: 8 bytes leftover after parsing attributes in process `syz.2.202'. [ 50.060780][ T4098] netlink: 4 bytes leftover after parsing attributes in process `syz.2.202'. [ 50.135842][ T4097] syz1: rxe_newlink: already configured on syz_tun [ 50.193738][ T4100] loop2: detected capacity change from 0 to 512 [ 50.211727][ T4100] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 50.235328][ T4100] EXT4-fs (loop2): 1 truncate cleaned up [ 50.258874][ T4100] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 50.274737][ T4100] netlink: 8 bytes leftover after parsing attributes in process `syz.2.203'. [ 50.283608][ T4100] C: renamed from team_slave_0 (while UP) [ 50.291034][ T4100] netlink: 'syz.2.203': attribute type 3 has an invalid length. [ 50.298816][ T4100] netlink: 152 bytes leftover after parsing attributes in process `syz.2.203'. [ 50.307808][ T4100] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 50.392045][ T3313] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 50.426800][ T4104] netlink: 20 bytes leftover after parsing attributes in process `syz.2.204'. [ 50.475009][ T4104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.516958][ T4104] syz1: rxe_newlink: already configured on syz_tun [ 50.569727][ T29] kauditd_printk_skb: 604 callbacks suppressed [ 50.569741][ T29] audit: type=1326 audit(1770263906.783:2071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.2.205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 50.599234][ T29] audit: type=1326 audit(1770263906.783:2072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.2.205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 50.622559][ T29] audit: type=1326 audit(1770263906.783:2073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.2.205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 50.645867][ T29] audit: type=1326 audit(1770263906.783:2074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.2.205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 50.669235][ T29] audit: type=1326 audit(1770263906.783:2075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.2.205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 50.692818][ T29] audit: type=1326 audit(1770263906.783:2076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.2.205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 50.716161][ T29] audit: type=1326 audit(1770263906.783:2077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.2.205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 50.739465][ T29] audit: type=1326 audit(1770263906.783:2078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.2.205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 50.762765][ T29] audit: type=1326 audit(1770263906.783:2079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.2.205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 50.786079][ T29] audit: type=1326 audit(1770263906.783:2080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.2.205" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 51.019102][ T4112] loop2: detected capacity change from 0 to 8192 [ 51.529667][ T4132] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.550737][ T4132] syz1: rxe_newlink: already configured on syz_tun [ 51.633228][ T3315] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.684032][ T4139] loop2: detected capacity change from 0 to 512 [ 51.692046][ T4139] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 51.754687][ T4116] chnl_net:caif_netlink_parms(): no params data found [ 51.762082][ T4139] EXT4-fs (loop2): 1 truncate cleaned up [ 51.778176][ T4139] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 51.808839][ T4139] netlink: 'syz.2.214': attribute type 3 has an invalid length. [ 51.816589][ T4139] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 51.928520][ T4116] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.935631][ T4116] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.961889][ T3313] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 52.007435][ T4116] bridge_slave_0: entered allmulticast mode [ 52.025271][ T4116] bridge_slave_0: entered promiscuous mode [ 52.051989][ T4146] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.062979][ T4116] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.070082][ T4116] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.111221][ T4116] bridge_slave_1: entered allmulticast mode [ 52.121301][ T4116] bridge_slave_1: entered promiscuous mode [ 52.139331][ T4147] syz1: rxe_newlink: already configured on syz_tun [ 52.175366][ T4149] loop3: detected capacity change from 0 to 164 [ 52.195957][ T4116] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.200482][ T4149] Unsupported NM flag settings (240) [ 52.233266][ T4116] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.249579][ T4151] syz1: rxe_newlink: already configured on syz_tun [ 52.278926][ T4116] team0: Port device team_slave_0 added [ 52.303016][ T4116] team0: Port device team_slave_1 added [ 52.310503][ T4153] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.339896][ T4116] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 52.345090][ T4153] syz1: rxe_newlink: already configured on syz_tun [ 52.346887][ T4116] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 52.379274][ T4116] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 52.408043][ T4116] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 52.415066][ T4116] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 52.441045][ T4116] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 52.518848][ T4156] 8021q: adding VLAN 0 to HW filter on device bond1 [ 52.619196][ T4158] syz1: rxe_newlink: already configured on syz_tun [ 52.661720][ T4116] hsr_slave_0: entered promiscuous mode [ 52.683505][ T4116] hsr_slave_1: entered promiscuous mode [ 52.701737][ T4116] debugfs: 'hsr0' already exists in 'hsr' [ 52.707483][ T4116] Cannot create hsr debugfs directory [ 52.764995][ T4160] syz1: rxe_newlink: already configured on syz_tun [ 52.828902][ T4163] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.890848][ T4163] syz1: rxe_newlink: already configured on syz_tun [ 52.941748][ T4165] syz1: rxe_newlink: already configured on syz_tun [ 52.966815][ T4116] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 52.984080][ T4116] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 52.993034][ T4116] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 53.001686][ T4116] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 53.064891][ T4175] loop2: detected capacity change from 0 to 164 [ 53.075209][ T4116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.088535][ T4175] Unsupported NM flag settings (240) [ 53.125340][ T4116] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.151984][ T1692] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.159213][ T1692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.223233][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.230317][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.314481][ T4116] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 53.421758][ T4116] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.653634][ T4116] veth0_vlan: entered promiscuous mode [ 53.661736][ T4116] veth1_vlan: entered promiscuous mode [ 53.684339][ T4116] veth0_macvtap: entered promiscuous mode [ 53.694474][ T4116] veth1_macvtap: entered promiscuous mode [ 53.714336][ T4116] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 53.728579][ T4116] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 53.742444][ T1692] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.762592][ T1692] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.776530][ T1692] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.788881][ T1692] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 53.877163][ T4197] loop5: detected capacity change from 0 to 164 [ 53.918705][ T4197] Unsupported NM flag settings (240) [ 55.757799][ T4203] loop3: detected capacity change from 0 to 164 [ 55.775168][ T4203] Unsupported NM flag settings (240) [ 55.866333][ T4204] __nla_validate_parse: 32 callbacks suppressed [ 55.866373][ T4204] netlink: 48 bytes leftover after parsing attributes in process `syz.3.227'. [ 57.120877][ T4210] loop2: detected capacity change from 0 to 164 [ 57.141318][ T4210] Unsupported NM flag settings (240) [ 57.213475][ T4211] netlink: 48 bytes leftover after parsing attributes in process `syz.2.229'. [ 60.269270][ T29] kauditd_printk_skb: 826 callbacks suppressed [ 60.269319][ T29] audit: type=1326 audit(1770263916.483:2907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.3.230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc46fa7aeb9 code=0x7ffc0000 [ 60.273765][ T4214] netlink: 20 bytes leftover after parsing attributes in process `syz.3.230'. [ 60.277947][ T29] audit: type=1326 audit(1770263916.483:2908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.3.230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc46fa7aeb9 code=0x7ffc0000 [ 60.330998][ T29] audit: type=1326 audit(1770263916.483:2909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.3.230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc46fa7aeb9 code=0x7ffc0000 [ 60.354303][ T29] audit: type=1326 audit(1770263916.483:2910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.3.230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc46fa7aeb9 code=0x7ffc0000 [ 60.377721][ T29] audit: type=1326 audit(1770263916.483:2911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.3.230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=196 compat=0 ip=0x7fc46fa7aeb9 code=0x7ffc0000 [ 60.401086][ T29] audit: type=1326 audit(1770263916.483:2912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.3.230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc46fa7aeb9 code=0x7ffc0000 [ 60.405627][ T4214] netlink: 8 bytes leftover after parsing attributes in process `syz.3.230'. [ 60.424380][ T29] audit: type=1326 audit(1770263916.483:2913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.3.230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fc46fa7aeb9 code=0x7ffc0000 [ 60.433152][ T4214] netlink: 4 bytes leftover after parsing attributes in process `syz.3.230'. [ 60.456320][ T29] audit: type=1326 audit(1770263916.483:2914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.3.230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc46fa7aeb9 code=0x7ffc0000 [ 60.456343][ T29] audit: type=1326 audit(1770263916.483:2915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.3.230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc46fa7aeb9 code=0x7ffc0000 [ 60.456363][ T29] audit: type=1326 audit(1770263916.483:2916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.3.230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc46fa7aeb9 code=0x7ffc0000 [ 60.950093][ T4214] rdma_rxe: rxe_newlink: failed to add syz_tun [ 61.047643][ T4218] loop3: detected capacity change from 0 to 164 [ 61.071775][ T4218] Unsupported NM flag settings (240) [ 61.242954][ T3307] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 62.623009][ T4230] netlink: 36 bytes leftover after parsing attributes in process `syz.5.233'. [ 62.635817][ T4230] bridge0: port 3(syz_tun) entered blocking state [ 62.642481][ T4230] bridge0: port 3(syz_tun) entered disabled state [ 62.649464][ T4230] syz_tun: entered allmulticast mode [ 62.657823][ T4230] syz_tun: entered promiscuous mode [ 62.663492][ T4230] bridge0: port 3(syz_tun) entered blocking state [ 62.669973][ T4230] bridge0: port 3(syz_tun) entered forwarding state [ 63.003010][ T4230] rdma_rxe: rxe_newlink: failed to add syz_tun [ 63.061445][ T4233] loop5: detected capacity change from 0 to 164 [ 63.073894][ T4233] Unsupported NM flag settings (240) [ 63.236039][ T3318] syz_tun (unregistering): left allmulticast mode [ 63.242650][ T3318] syz_tun (unregistering): left promiscuous mode [ 63.248987][ T3318] bridge0: port 3(syz_tun) entered disabled state [ 63.317229][ T3318] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 63.894485][ T4220] chnl_net:caif_netlink_parms(): no params data found [ 63.965750][ T4220] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.972839][ T4220] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.980755][ T4220] bridge_slave_0: entered allmulticast mode [ 63.989263][ T4220] bridge_slave_0: entered promiscuous mode [ 64.036357][ T4220] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.043488][ T4220] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.063798][ T4220] bridge_slave_1: entered allmulticast mode [ 64.070412][ T4220] bridge_slave_1: entered promiscuous mode [ 64.105490][ T4220] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.130663][ T31] bridge_slave_1: left allmulticast mode [ 64.136403][ T31] bridge_slave_1: left promiscuous mode [ 64.142204][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.163023][ T31] bridge_slave_0: left allmulticast mode [ 64.168666][ T31] bridge_slave_0: left promiscuous mode [ 64.174445][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.233655][ T31] bond1 (unregistering): Released all slaves [ 64.244172][ T4220] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.280411][ T4220] team0: Port device team_slave_0 added [ 64.307421][ T4220] team0: Port device team_slave_1 added [ 64.324498][ T4220] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 64.331600][ T4220] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 64.357601][ T4220] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 64.395223][ T4255] loop3: detected capacity change from 0 to 164 [ 64.451735][ T4255] Unsupported NM flag settings (240) [ 64.627703][ T4220] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 64.634795][ T4220] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 64.660825][ T4220] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 64.694305][ T31] hsr_slave_0: left promiscuous mode [ 64.699974][ T31] hsr_slave_1: left promiscuous mode [ 64.706025][ T31] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 64.723834][ T4269] loop2: detected capacity change from 0 to 164 [ 64.731741][ T31] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 64.755996][ T4269] Unsupported NM flag settings (240) [ 64.826726][ T31] team0 (unregistering): Port device team_slave_1 removed [ 64.836625][ T31] team0 (unregistering): Port device C removed [ 64.853335][ T4270] netlink: 48 bytes leftover after parsing attributes in process `syz.2.237'. [ 64.884970][ T4220] hsr_slave_0: entered promiscuous mode [ 64.890983][ T4220] hsr_slave_1: entered promiscuous mode [ 64.896942][ T4220] debugfs: 'hsr0' already exists in 'hsr' [ 64.902698][ T4220] Cannot create hsr debugfs directory [ 65.352709][ T4235] chnl_net:caif_netlink_parms(): no params data found [ 65.366517][ T4220] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 65.388620][ T4220] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 65.408496][ T4220] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 65.444838][ T4220] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 65.498505][ T4235] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.505678][ T4235] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.513391][ T4235] bridge_slave_0: entered allmulticast mode [ 65.519905][ T4235] bridge_slave_0: entered promiscuous mode [ 65.537398][ T4235] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.544670][ T4235] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.552328][ T4235] bridge_slave_1: entered allmulticast mode [ 65.559037][ T4235] bridge_slave_1: entered promiscuous mode [ 65.579189][ T4220] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.591937][ T4235] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.602422][ T4220] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.611988][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.619029][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.636612][ T4235] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.647890][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.655054][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.700697][ T4235] team0: Port device team_slave_0 added [ 65.709589][ T4235] team0: Port device team_slave_1 added [ 65.746655][ T4235] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 65.753785][ T4235] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 65.779790][ T4235] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 65.792139][ T4235] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 65.799118][ T4235] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 65.825119][ T4235] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 65.887307][ T4235] hsr_slave_0: entered promiscuous mode [ 65.902533][ T4235] hsr_slave_1: entered promiscuous mode [ 65.911859][ T4235] debugfs: 'hsr0' already exists in 'hsr' [ 65.915817][ T4317] loop5: detected capacity change from 0 to 164 [ 65.917600][ T4235] Cannot create hsr debugfs directory [ 65.959879][ T4317] Unsupported NM flag settings (240) [ 65.981515][ T4220] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.140114][ T4334] netlink: 48 bytes leftover after parsing attributes in process `syz.5.238'. [ 66.162124][ T4235] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 66.201679][ T4235] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 66.245076][ T4235] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 66.263539][ T4235] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 66.403221][ T4220] veth0_vlan: entered promiscuous mode [ 66.477947][ T4220] veth1_vlan: entered promiscuous mode [ 66.500935][ T4235] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.514916][ T4235] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.647449][ T4220] veth0_macvtap: entered promiscuous mode [ 66.661358][ T4220] veth1_macvtap: entered promiscuous mode [ 66.673083][ T3332] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.680144][ T3332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.699222][ T3332] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.706333][ T3332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.814560][ T4220] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 66.825098][ T4220] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 67.079269][ T3340] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.088454][ T3340] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.106279][ T4235] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 67.116678][ T4235] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 67.189016][ T3340] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.202753][ T3340] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.386448][ T4235] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.395160][ T4373] loop6: detected capacity change from 0 to 164 [ 67.430050][ T4373] Unsupported NM flag settings (240) [ 67.577599][ T4380] netlink: 48 bytes leftover after parsing attributes in process `syz.6.239'. [ 67.719091][ T4385] loop3: detected capacity change from 0 to 164 [ 67.737836][ T4385] Unsupported NM flag settings (240) [ 68.027840][ T4387] netlink: 48 bytes leftover after parsing attributes in process `syz.3.240'. [ 68.499901][ T4235] veth0_vlan: entered promiscuous mode [ 68.515684][ T4235] veth1_vlan: entered promiscuous mode [ 68.533306][ T4235] veth0_macvtap: entered promiscuous mode [ 68.540584][ T4235] veth1_macvtap: entered promiscuous mode [ 68.566010][ T4235] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.617461][ T4235] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.763388][ T52] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.837100][ T52] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.894791][ T52] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.023408][ T3332] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.051015][ T4396] loop7: detected capacity change from 0 to 164 [ 69.077917][ T4396] Unsupported NM flag settings (240) [ 69.181208][ T4397] netlink: 48 bytes leftover after parsing attributes in process `syz.7.235'. [ 69.479987][ T4399] loop5: detected capacity change from 0 to 164 [ 71.201384][ T4410] loop3: detected capacity change from 0 to 164 [ 71.216148][ T4410] Unsupported NM flag settings (240) [ 71.460890][ T4414] loop6: detected capacity change from 0 to 164 [ 72.312649][ T4422] loop7: detected capacity change from 0 to 164 [ 72.726924][ T4426] loop2: detected capacity change from 0 to 164 [ 74.323089][ T4432] loop6: detected capacity change from 0 to 128 [ 74.339692][ T4432] netlink: 4 bytes leftover after parsing attributes in process `syz.6.247'. [ 74.547084][ T4435] loop6: detected capacity change from 0 to 164 [ 74.560869][ T4435] Unsupported NM flag settings (240) [ 74.634888][ T4436] netlink: 48 bytes leftover after parsing attributes in process `syz.6.248'. [ 74.769024][ T4438] loop3: detected capacity change from 0 to 164 [ 75.550079][ T4442] loop7: detected capacity change from 0 to 164 [ 75.563386][ T4442] Unsupported NM flag settings (240) [ 75.692653][ T4443] netlink: 48 bytes leftover after parsing attributes in process `syz.7.250'. [ 76.974419][ T29] kauditd_printk_skb: 107 callbacks suppressed [ 76.974432][ T29] audit: type=1326 audit(1770263933.193:3024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4458 comm="syz.5.251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 77.010665][ T4459] netlink: 8 bytes leftover after parsing attributes in process `syz.5.251'. [ 77.019520][ T4459] netlink: 4 bytes leftover after parsing attributes in process `syz.5.251'. [ 77.028610][ T29] audit: type=1326 audit(1770263933.223:3025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4458 comm="syz.5.251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 77.052031][ T29] audit: type=1326 audit(1770263933.223:3026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4458 comm="syz.5.251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 77.075463][ T29] audit: type=1326 audit(1770263933.223:3027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4458 comm="syz.5.251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 77.098774][ T29] audit: type=1326 audit(1770263933.223:3028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4458 comm="syz.5.251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=196 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 77.122381][ T29] audit: type=1326 audit(1770263933.223:3029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4458 comm="syz.5.251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 77.145837][ T29] audit: type=1326 audit(1770263933.223:3030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4458 comm="syz.5.251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 77.169241][ T29] audit: type=1326 audit(1770263933.223:3031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4458 comm="syz.5.251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 77.192656][ T29] audit: type=1326 audit(1770263933.223:3032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4458 comm="syz.5.251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 77.216003][ T29] audit: type=1326 audit(1770263933.223:3033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4458 comm="syz.5.251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 78.027365][ T4505] loop6: detected capacity change from 0 to 164 [ 79.445397][ T4509] loop7: detected capacity change from 0 to 8192 [ 79.500620][ T4459] rdma_rxe: rxe_newlink: failed to add syz_tun [ 79.578876][ T4511] loop5: detected capacity change from 0 to 164 [ 79.593634][ T4513] loop7: detected capacity change from 0 to 164 [ 79.606761][ T4513] Unsupported NM flag settings (240) [ 81.307944][ T4520] loop3: detected capacity change from 0 to 164 [ 81.336231][ T4520] Unsupported NM flag settings (240) [ 81.340235][ T4522] syzkaller0: entered promiscuous mode [ 81.347122][ T4522] syzkaller0: entered allmulticast mode [ 81.406615][ T4524] netlink: 48 bytes leftover after parsing attributes in process `syz.3.257'. [ 81.462266][ T4526] loop6: detected capacity change from 0 to 164 [ 81.477477][ T4526] Unsupported NM flag settings (240) [ 82.835362][ T4531] loop7: detected capacity change from 0 to 164 [ 82.888401][ T4533] loop5: detected capacity change from 0 to 164 [ 82.904137][ T4533] Unsupported NM flag settings (240) [ 83.042832][ T4534] netlink: 48 bytes leftover after parsing attributes in process `syz.5.261'. [ 84.386546][ T4541] loop6: detected capacity change from 0 to 164 [ 84.437966][ T4541] Unsupported NM flag settings (240) [ 84.625566][ T4543] loop2: detected capacity change from 0 to 164 [ 84.689868][ T4543] Unsupported NM flag settings (240) [ 84.794818][ T4546] netlink: 48 bytes leftover after parsing attributes in process `syz.2.264'. [ 84.941460][ T4547] netlink: 48 bytes leftover after parsing attributes in process `syz.6.263'. [ 85.057479][ T4549] loop3: detected capacity change from 0 to 1024 [ 85.080274][ T4549] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-001000000000 r/w without journal. Quota mode: none. [ 85.155386][ T29] kauditd_printk_skb: 174 callbacks suppressed [ 85.155401][ T29] audit: type=1400 audit(1770263941.373:3208): avc: denied { add_name } for pid=4548 comm="syz.3.265" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 85.804402][ T4554] syz_tun (unregistering): left allmulticast mode [ 85.811036][ T4554] syz_tun (unregistering): left promiscuous mode [ 85.817450][ T4554] bridge0: port 3(syz_tun) entered disabled state [ 85.893625][ T4554] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-001000000000. [ 86.327237][ T4565] loop7: detected capacity change from 0 to 164 [ 86.380571][ T4565] Unsupported NM flag settings (240) [ 86.481311][ T4569] netlink: 48 bytes leftover after parsing attributes in process `syz.7.269'. [ 86.658845][ T4572] loop2: detected capacity change from 0 to 164 [ 86.726579][ T4572] Unsupported NM flag settings (240) [ 86.875093][ T4574] loop5: detected capacity change from 0 to 164 [ 86.886379][ T4575] netlink: 48 bytes leftover after parsing attributes in process `syz.2.270'. [ 86.905323][ T4574] Unsupported NM flag settings (240) [ 87.665993][ T4557] chnl_net:caif_netlink_parms(): no params data found [ 87.712150][ T4557] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.719349][ T4557] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.726802][ T4557] bridge_slave_0: entered allmulticast mode [ 87.735092][ T4557] bridge_slave_0: entered promiscuous mode [ 87.743198][ T4557] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.750319][ T4557] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.757801][ T4557] bridge_slave_1: entered allmulticast mode [ 87.766380][ T4557] bridge_slave_1: entered promiscuous mode [ 87.789239][ T4557] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.800393][ T4557] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.825208][ T4557] team0: Port device team_slave_0 added [ 87.833382][ T4557] team0: Port device team_slave_1 added [ 87.854580][ T4557] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 87.861632][ T4557] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 87.887599][ T4557] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 87.899211][ T4557] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 87.906268][ T4557] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 87.932197][ T4557] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 87.970324][ T4557] hsr_slave_0: entered promiscuous mode [ 87.977057][ T4557] hsr_slave_1: entered promiscuous mode [ 87.985150][ T4557] debugfs: 'hsr0' already exists in 'hsr' [ 87.990903][ T4557] Cannot create hsr debugfs directory [ 88.095433][ T4557] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 88.106418][ T4557] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 88.116036][ T4557] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 88.188366][ T4557] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 88.334986][ T4557] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.342074][ T4557] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.349378][ T4557] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.356437][ T4557] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.603525][ T4557] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.627304][ T1692] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.636766][ T1692] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.664256][ T4557] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.674207][ T1692] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.681291][ T1692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.701272][ T4557] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 88.711694][ T4557] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 88.724502][ T1692] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.731627][ T1692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.798779][ T4557] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 89.007115][ T4557] veth0_vlan: entered promiscuous mode [ 89.018649][ T4557] veth1_vlan: entered promiscuous mode [ 89.080860][ T4557] veth0_macvtap: entered promiscuous mode [ 89.125166][ T4557] veth1_macvtap: entered promiscuous mode [ 89.183511][ T4557] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 89.194566][ T4557] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 89.263115][ T4375] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.285526][ T4375] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.325134][ T4607] loop5: detected capacity change from 0 to 164 [ 89.355481][ T4607] Unsupported NM flag settings (240) [ 89.649287][ T4375] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.669365][ T4375] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.704870][ T4611] loop8: detected capacity change from 0 to 164 [ 89.787551][ T4611] Unsupported NM flag settings (240) [ 90.006013][ T4612] netlink: 48 bytes leftover after parsing attributes in process `syz.8.268'. [ 91.453215][ T31] bridge_slave_1: left allmulticast mode [ 91.458882][ T31] bridge_slave_1: left promiscuous mode [ 91.464656][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.535677][ T31] bridge_slave_0: left allmulticast mode [ 91.541395][ T31] bridge_slave_0: left promiscuous mode [ 91.547090][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.666662][ T31] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 91.677438][ T31] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 91.687009][ T31] bond0 (unregistering): (slave team0): Releasing backup interface [ 91.696006][ T31] bond0 (unregistering): Released all slaves [ 91.704849][ T31] bond1 (unregistering): Released all slaves [ 92.202164][ T4642] loop6: detected capacity change from 0 to 164 [ 94.465860][ T29] audit: type=1326 audit(1770263950.673:3209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 94.489369][ T29] audit: type=1326 audit(1770263950.673:3210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 94.512844][ T29] audit: type=1326 audit(1770263950.683:3211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 94.536290][ T29] audit: type=1326 audit(1770263950.683:3212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 94.559804][ T29] audit: type=1326 audit(1770263950.683:3213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 94.564622][ T4677] netlink: 36 bytes leftover after parsing attributes in process `syz.2.274'. [ 94.583262][ T29] audit: type=1326 audit(1770263950.683:3214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=196 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 94.615314][ T29] audit: type=1326 audit(1770263950.683:3215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 94.639066][ T29] audit: type=1326 audit(1770263950.683:3216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 94.650091][ T4677] netlink: 8 bytes leftover after parsing attributes in process `syz.2.274'. [ 94.671154][ T4677] netlink: 4 bytes leftover after parsing attributes in process `syz.2.274'. [ 94.671985][ T29] audit: type=1326 audit(1770263950.683:3217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 94.699559][ T4677] rxe_newlink: 1 callbacks suppressed [ 94.699574][ T4677] syz1: rxe_newlink: already configured on syz_tun [ 94.703200][ T29] audit: type=1326 audit(1770263950.683:3218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4676 comm="syz.2.274" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd34603aeb9 code=0x7ffc0000 [ 94.768136][ T4681] netlink: 20 bytes leftover after parsing attributes in process `syz.2.276'. [ 94.775839][ T4679] netlink: 20 bytes leftover after parsing attributes in process `syz.7.275'. [ 94.777501][ T4681] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.800838][ T4679] netlink: 8 bytes leftover after parsing attributes in process `syz.7.275'. [ 94.809690][ T4679] netlink: 4 bytes leftover after parsing attributes in process `syz.7.275'. [ 94.811512][ T4681] netlink: 8 bytes leftover after parsing attributes in process `syz.2.276'. [ 94.827338][ T4681] netlink: 4 bytes leftover after parsing attributes in process `syz.2.276'. [ 94.849616][ T4679] bridge0: port 3(syz_tun) entered blocking state [ 94.856116][ T4679] bridge0: port 3(syz_tun) entered disabled state [ 94.865876][ T4679] syz_tun: entered allmulticast mode [ 94.873332][ T4679] syz_tun: entered promiscuous mode [ 94.878915][ T4679] bridge0: port 3(syz_tun) entered blocking state [ 94.885487][ T4679] bridge0: port 3(syz_tun) entered forwarding state [ 94.893539][ T4681] syz1: rxe_newlink: already configured on syz_tun [ 94.968113][ T4684] rdma_rxe: rxe_newlink: failed to add syz_tun [ 95.015724][ T4688] loop7: detected capacity change from 0 to 164 [ 95.053917][ T4690] loop2: detected capacity change from 0 to 164 [ 95.082389][ T4690] Unsupported NM flag settings (240) [ 95.090370][ T4688] Unsupported NM flag settings (240) [ 95.200045][ T4692] netlink: 48 bytes leftover after parsing attributes in process `syz.7.278'. [ 95.703465][ T31] hsr_slave_0: left promiscuous mode [ 95.721609][ T31] hsr_slave_1: left promiscuous mode [ 95.729783][ T31] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 95.742036][ T31] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 95.933296][ T31] team0 (unregistering): Port device team_slave_1 removed [ 95.970886][ T31] team0 (unregistering): Port device team_slave_0 removed [ 97.467684][ T4696] loop5: detected capacity change from 0 to 164 [ 97.509907][ T4696] Unsupported NM flag settings (240) [ 97.618280][ T4699] syzkaller0: entered promiscuous mode [ 97.623810][ T4699] syzkaller0: entered allmulticast mode [ 98.247953][ T4707] loop7: detected capacity change from 0 to 164 [ 98.280401][ T4707] Unsupported NM flag settings (240) [ 100.619792][ T4715] loop5: detected capacity change from 0 to 164 [ 101.226376][ T4720] loop6: detected capacity change from 0 to 164 [ 101.226435][ T4718] loop2: detected capacity change from 0 to 164 [ 101.352266][ T4718] Unsupported NM flag settings (240) [ 101.440394][ T4722] __nla_validate_parse: 3 callbacks suppressed [ 101.440472][ T4722] netlink: 48 bytes leftover after parsing attributes in process `syz.2.285'. [ 101.752074][ T4724] loop8: detected capacity change from 0 to 164 [ 101.774746][ T4724] Unsupported NM flag settings (240) [ 101.870840][ T4725] netlink: 48 bytes leftover after parsing attributes in process `syz.8.287'. [ 102.242171][ T4728] loop7: detected capacity change from 0 to 164 [ 102.258687][ T4728] Unsupported NM flag settings (240) [ 102.338934][ T4729] netlink: 48 bytes leftover after parsing attributes in process `syz.7.288'. [ 103.585855][ T29] kauditd_printk_skb: 171 callbacks suppressed [ 103.585871][ T29] audit: type=1326 audit(1770263959.803:3390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4733 comm="syz.5.289" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 103.592026][ T4734] netlink: 36 bytes leftover after parsing attributes in process `syz.5.289'. [ 103.593853][ T29] audit: type=1326 audit(1770263959.803:3391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4733 comm="syz.5.289" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 103.625629][ T4734] netlink: 8 bytes leftover after parsing attributes in process `syz.5.289'. [ 103.647493][ T29] audit: type=1326 audit(1770263959.803:3392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4733 comm="syz.5.289" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 103.656258][ T4734] netlink: 4 bytes leftover after parsing attributes in process `syz.5.289'. [ 103.679455][ T29] audit: type=1326 audit(1770263959.803:3393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4733 comm="syz.5.289" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 103.679481][ T29] audit: type=1326 audit(1770263959.803:3394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4733 comm="syz.5.289" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 103.679502][ T29] audit: type=1326 audit(1770263959.803:3395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4733 comm="syz.5.289" exe="/root/syz-executor" sig=0 arch=c000003e syscall=196 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 103.758288][ T29] audit: type=1326 audit(1770263959.803:3396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4733 comm="syz.5.289" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 103.781645][ T29] audit: type=1326 audit(1770263959.803:3397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4733 comm="syz.5.289" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 103.804867][ T29] audit: type=1326 audit(1770263959.803:3398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4733 comm="syz.5.289" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 103.828214][ T29] audit: type=1326 audit(1770263959.803:3399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4733 comm="syz.5.289" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f85aa61aeb9 code=0x7ffc0000 [ 104.033331][ T4737] loop6: detected capacity change from 0 to 164 [ 104.079884][ T4737] Unsupported NM flag settings (240) [ 104.441031][ T4745] loop2: detected capacity change from 0 to 164 [ 104.455885][ T4745] Unsupported NM flag settings (240) [ 104.570677][ T4746] netlink: 48 bytes leftover after parsing attributes in process `syz.2.292'. [ 105.216157][ T4777] loop8: detected capacity change from 0 to 164 [ 105.870247][ T4806] loop7: detected capacity change from 0 to 164 [ 105.900161][ T4806] Unsupported NM flag settings (240) [ 105.994758][ T4810] netlink: 48 bytes leftover after parsing attributes in process `syz.7.294'. [ 106.591713][ T4734] rdma_rxe: rxe_newlink: failed to add syz_tun [ 106.656727][ T4813] loop5: detected capacity change from 0 to 164 [ 107.093754][ T4816] loop6: detected capacity change from 0 to 164 [ 107.166498][ T3750] ================================================================== [ 107.174608][ T3750] BUG: KCSAN: data-race in __d_drop / fast_dput [ 107.180867][ T3750] [ 107.183186][ T3750] write to 0xffff88811b040b50 of 8 bytes by task 2999 on cpu 1: [ 107.190813][ T3750] __d_drop+0x14d/0x240 [ 107.194973][ T3750] __dentry_kill+0x122/0x460 [ 107.199566][ T3750] finish_dput+0x2b/0x200 [ 107.203981][ T3750] dput+0x52/0x60 [ 107.207612][ T3750] lookup_one_qstr_excl+0x15a/0x250 [ 107.212812][ T3750] do_unlinkat+0x149/0x4b0 [ 107.217231][ T3750] __x64_sys_unlink+0x2e/0x40 [ 107.221904][ T3750] x64_sys_call+0x2f48/0x3000 [ 107.226588][ T3750] do_syscall_64+0xc0/0x2a0 [ 107.231100][ T3750] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 107.236997][ T3750] [ 107.239313][ T3750] read to 0xffff88811b040b50 of 8 bytes by task 3750 on cpu 0: [ 107.246849][ T3750] fast_dput+0x5f/0x2c0 [ 107.251017][ T3750] dput+0x24/0x60 [ 107.255005][ T3750] do_unlinkat+0x217/0x4b0 [ 107.259424][ T3750] __x64_sys_unlink+0x2e/0x40 [ 107.264101][ T3750] x64_sys_call+0x2f48/0x3000 [ 107.268780][ T3750] do_syscall_64+0xc0/0x2a0 [ 107.273292][ T3750] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 107.279184][ T3750] [ 107.281498][ T3750] value changed: 0xffff8882377458b0 -> 0x0000000000000000 [ 107.288592][ T3750] [ 107.290904][ T3750] Reported by Kernel Concurrency Sanitizer on: [ 107.297063][ T3750] CPU: 0 UID: 0 PID: 3750 Comm: udevd Not tainted syzkaller #0 PREEMPT(voluntary) [ 107.306344][ T3750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 107.316461][ T3750] ================================================================== [ 107.868365][ T4745] bridge0: port 3(syz_tun) entered disabled state [ 107.883632][ T4745] syz_tun (unregistering): left allmulticast mode [ 107.890137][ T4745] syz_tun (unregistering): left promiscuous mode [ 107.896632][ T4745] bridge0: port 3(syz_tun) entered disabled state [ 107.904585][ T3385] syz1: Port: 1 Link DOWN [ 109.171984][ T4806] bridge0: port 3(syz_tun) entered disabled state [ 109.180132][ T4806] syz_tun (unregistering): left allmulticast mode [ 109.186674][ T4806] syz_tun (unregistering): left promiscuous mode [ 109.193031][ T4806] bridge0: port 3(syz_tun) entered disabled state [ 109.800749][ T4813] bridge0: port 3(syz_tun) entered disabled state [ 109.812224][ T4813] syz_tun (unregistering): left allmulticast mode [ 109.818633][ T4813] syz_tun (unregistering): left promiscuous mode [ 109.825137][ T4813] bridge0: port 3(syz_tun) entered disabled state [ 109.848703][ T4375] smc: removing ib device syz1 [ 110.405061][ T3332] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 110.464067][ T3332] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 110.525239][ T3332] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 110.584640][ T3332] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 110.681255][ T3332] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 110.771542][ T3332] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 110.834863][ T3332] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 110.884586][ T3332] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 110.963156][ T3332] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 111.004147][ T3332] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 111.046183][ T3332] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 111.094669][ T3332] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 111.172710][ T3332] bridge_slave_1: left allmulticast mode [ 111.178373][ T3332] bridge_slave_1: left promiscuous mode [ 111.184314][ T3332] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.192739][ T3332] bridge_slave_0: left allmulticast mode [ 111.198384][ T3332] bridge_slave_0: left promiscuous mode [ 111.204083][ T3332] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.214156][ T3332] bridge_slave_1: left allmulticast mode [ 111.219791][ T3332] bridge_slave_1: left promiscuous mode [ 111.225554][ T3332] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.234131][ T3332] bridge_slave_0: left allmulticast mode [ 111.239778][ T3332] bridge_slave_0: left promiscuous mode [ 111.245516][ T3332] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.253741][ T3332] bridge_slave_1: left allmulticast mode [ 111.259377][ T3332] bridge_slave_1: left promiscuous mode [ 111.265138][ T3332] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.272974][ T3332] bridge_slave_0: left allmulticast mode [ 111.278602][ T3332] bridge_slave_0: left promiscuous mode [ 111.284232][ T3332] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.403030][ T3332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 111.412906][ T3332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 111.422207][ T3332] bond0 (unregistering): Released all slaves [ 111.493591][ T3332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 111.503721][ T3332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 111.514808][ T3332] bond0 (unregistering): Released all slaves [ 111.573233][ T3332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 111.583094][ T3332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 111.592677][ T3332] bond0 (unregistering): Released all slaves [ 111.678637][ T3332] hsr_slave_0: left promiscuous mode [ 111.685167][ T3332] hsr_slave_1: left promiscuous mode [ 111.690912][ T3332] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 111.698428][ T3332] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 111.706860][ T3332] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 111.714291][ T3332] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 111.725509][ T3332] hsr_slave_0: left promiscuous mode [ 111.731524][ T3332] hsr_slave_1: left promiscuous mode [ 111.737112][ T3332] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 111.744572][ T3332] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 111.752820][ T3332] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 111.760270][ T3332] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 111.769209][ T3332] hsr_slave_0: left promiscuous mode [ 111.774987][ T3332] hsr_slave_1: left promiscuous mode [ 111.780487][ T3332] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 111.787996][ T3332] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 111.795448][ T3332] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 111.802850][ T3332] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 111.817900][ T3332] veth1_macvtap: left promiscuous mode [ 111.823398][ T3332] veth0_macvtap: left promiscuous mode [ 111.829008][ T3332] veth1_vlan: left promiscuous mode [ 111.834261][ T3332] veth0_vlan: left promiscuous mode [ 111.840017][ T3332] veth1_macvtap: left promiscuous mode [ 111.845569][ T3332] veth0_macvtap: left promiscuous mode [ 111.851283][ T3332] veth1_vlan: left promiscuous mode [ 111.856556][ T3332] veth0_vlan: left promiscuous mode [ 111.862316][ T3332] veth1_macvtap: left promiscuous mode [ 111.867788][ T3332] veth0_macvtap: left promiscuous mode [ 111.873329][ T3332] veth1_vlan: left promiscuous mode [ 111.878531][ T3332] veth0_vlan: left promiscuous mode [ 111.997270][ T3332] team0 (unregistering): Port device team_slave_1 removed [ 112.006339][ T3332] team0 (unregistering): Port device team_slave_0 removed [ 112.056770][ T3332] team0 (unregistering): Port device team_slave_1 removed [ 112.066366][ T3332] team0 (unregistering): Port device team_slave_0 removed [ 112.119143][ T3332] team0 (unregistering): Port device team_slave_1 removed [ 112.128759][ T3332] team0 (unregistering): Port device team_slave_0 removed [ 112.754986][ T3332] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 112.824081][ T3332] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 112.883793][ T3332] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 112.943844][ T3332] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 113.026099][ T3332] bridge_slave_1: left allmulticast mode [ 113.031832][ T3332] bridge_slave_1: left promiscuous mode [ 113.037458][ T3332] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.050082][ T3332] bridge_slave_0: left allmulticast mode [ 113.055909][ T3332] bridge_slave_0: left promiscuous mode [ 113.061584][ T3332] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.133773][ T3332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 113.143933][ T3332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 113.153770][ T3332] bond0 (unregistering): Released all slaves [ 113.186638][ T3332] hsr_slave_0: left promiscuous mode [ 113.192655][ T3332] hsr_slave_1: left promiscuous mode [ 113.198263][ T3332] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 113.205671][ T3332] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 113.214235][ T3332] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 113.221635][ T3332] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 113.232520][ T3332] veth1_macvtap: left promiscuous mode [ 113.238041][ T3332] veth0_macvtap: left promiscuous mode [ 113.244267][ T3332] veth1_vlan: left promiscuous mode [ 113.249494][ T3332] veth0_vlan: left promiscuous mode [ 113.310993][ T3332] team0 (unregistering): Port device team_slave_1 removed [ 113.320359][ T3332] team0 (unregistering): Port device team_slave_0 removed