last executing test programs: 8.22023059s ago: executing program 4 (id=53): openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000c54000/0x4000)=nil, &(0x7f0000a9e000/0x4000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f000060c000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000778000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000f21000/0x1000)=nil, &(0x7f0000aac000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000dc1000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0x13, 0x0, 0x0, 0x5, 0x0, 0x0, 0x41000, 0xc}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002420702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401f, 0x685c0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6f, 0x1, @perf_bp={0x0, 0x3}, 0x10c0e8, 0x0, 0x0, 0x3, 0x6, 0x8001, 0x7fff}, 0x0, 0xff6fbfffffffffff, 0xffffffffffffffff, 0x1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) accept4$x25(r3, 0x0, 0x0, 0x0) setregid(0xee00, 0x0) r4 = syz_open_procfs(0x0, 0x0) fchdir(r4) mount(0x0, 0x0, &(0x7f0000000000)='proc\x00', 0x80, 0x0) r5 = syz_open_procfs(0x0, 0x0) readlinkat(r5, &(0x7f0000000100)='./mnt\x00', &(0x7f0000000440)=""/159, 0x9f) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="16"], 0x50) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) r6 = socket(0x840000000002, 0x3, 0xff) sendmsg$inet(r6, &(0x7f0000000900)={&(0x7f00000006c0)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000bc0)="97450168d2182e08106a0a33e30c61e6b37a0000", 0x14}], 0x1, &(0x7f0000000480)=[@ip_pktinfo={{0x14, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x38}, @rand_addr=0x64010101}}}], 0x20}, 0x400c804) 6.224694054s ago: executing program 4 (id=55): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x800000, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), r2) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}, 0x1, 0x0, 0x0, 0x44081}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000240)={'syzkaller0\x00', @broadcast}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200504, 0x0) close(r4) r5 = socket$unix(0x1, 0x5, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000001}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70b923, 0x7fffc, {0x0, 0x0, 0x0, r7, {0x0, 0xf}, {0x2, 0xb}, {0x9, 0x5}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x8, 0x200}}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0xc0e9}, 0x4000010) ioctl$SIOCSIFHWADDR(r4, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 5.876147385s ago: executing program 4 (id=63): syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x800001, 0x4) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f00000002c0)={[{@test_dummy_encryption_v1}, {@usrjquota}, {@auto_da_alloc}, {@init_itable}, {@nodioread_nolock}, {@journal_checksum}, {@max_batch_time={'max_batch_time', 0x3d, 0x5}}]}, 0x1, 0x587, &(0x7f0000000940)="$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") socket$netlink(0x10, 0x3, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdfc, 0x9}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x4000, &(0x7f0000000240)={[{@noinit_itable}]}, 0x1, 0x512, &(0x7f0000000c40)="$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") syz_io_uring_setup(0x63eb, &(0x7f0000000680)={0x0, 0x1200, 0x8, 0x2, 0x16b}, &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) r7 = syz_io_uring_setup(0x1972, &(0x7f0000000080)={0x0, 0x1000, 0x1000}, &(0x7f0000000140), &(0x7f0000000480), &(0x7f0000000400)) io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_setup(0x5a49, &(0x7f0000000200)={0x0, 0x2000, 0x0, 0x0, 0x357}, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000), 0xc) add_key(&(0x7f00000028c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r8 = socket(0x2, 0x80805, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r8, 0x0, 0x487, &(0x7f0000000000)={{0x84, @private=0xa010101, 0x4f29, 0x3, 'nq\x00', 0x5, 0x4, 0x6c}, {@loopback, 0x4e23, 0x4, 0xcd, 0x1}}, 0x44) sendmsg$sock(r1, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0xfd}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) 5.295759593s ago: executing program 3 (id=67): modify_ldt$write2(0x11, &(0x7f0000000000)={0xb1, 0xffffffffffffffff, 0x4000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1}, 0x10) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x10001, 0xf, 0x4000000000000004, 0xa0, 0xfffffffffffffffb, 0xfffffffffffffffd, 0x5, 0xc59}, 0x0, 0x0, 0x0, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000340)='/sys/power/reserved_size', 0x40042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)=ANY=[@ANYRES64], 0x1eb) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") ioctl$XFS_IOC_FD_TO_HANDLE(r1, 0xc038586a, &(0x7f0000000200)={r1, &(0x7f0000000080)='{)]\x00', 0x4200, &(0x7f0000000100)={@align=0xd20e, {0x6, 0xf77, 0xe, 0x2}}, 0x4, &(0x7f0000000140)={@_ha_fsid}, &(0x7f00000001c0)=0x5665090f}) ptrace$getregset(0x4205, r0, 0x1, &(0x7f00000000c0)={&(0x7f0000000000)=""/120, 0x78}) 4.939114144s ago: executing program 3 (id=69): ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) syz_mount_image$vfat(&(0x7f00000007c0), &(0x7f0000000180)='./file1\x00', 0x200800, &(0x7f0000000100)={[{@shortname_winnt}, {@fat=@gid}, {@shortname_lower}, {@utf8no}, {@fat=@check_strict}]}, 0x11, 0x305, &(0x7f0000000380)="$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") r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x68, 0x6, 0xa, 0x160b, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_RULE_EXPRESSIONS={0x3c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @quota={{0xa}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x4}, @NFTA_QUOTA_FLAGS={0x8}]}}}, {0x10, 0x1, 0x0, 0x1, @nat={{0x8}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x90}, 0x1, 0x0, 0x0, 0x850}, 0x4040080) mknod$loop(&(0x7f0000001b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1000, 0x1) creat(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1e0) renameat2(0xffffffffffffff9c, &(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2) 4.735347971s ago: executing program 3 (id=71): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r0) syz_usb_connect(0x0, 0x62, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000fb5d7d086d04c308166b0102030109025000010000000009041f0000ff0100000a24010400050201020724070500000508240805040004"], 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="170e0000000000000000010000600500070000000000080009000000000014001f000000000000000000000000000000000008000a00000000000600020001000000140020"], 0x5c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000200000000000000000850000002a0000001801000020786c2500000000002020207b1af8ff00"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lsm=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400}, 0x48) pipe(&(0x7f0000000500)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0xa}, 0x4, 0x0, 0x10000, 0x0, 0x3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x200, 0x3}, 0x102802, 0x3, 0x0, 0x0, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe1c, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6000000002060500000000000000000000000000140007800800064020000000080013400000000005000100060000000900020073797a32000000000500040000000000050005000a00000011000300686173683a69702c6d61726b"], 0x60}}, 0x0) setresgid(0x0, 0x0, 0x0) sync() sync() sync() syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x0, &(0x7f0000000640), 0x1, 0x5a8, &(0x7f0000000680)="$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") getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x94f08dca903d518d}, 0xc0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x4156, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc, 0x1}, 0x105e39, 0x0, 0xfffffffe, 0x6, 0x5, 0x2, 0x101, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1e000000000000000700400008"], 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000001340)={0x2, 0x6, @multicast2}, 0x10, 0x0}, 0x8000) 3.843932599s ago: executing program 4 (id=79): prlimit64(0x0, 0xe, &(0x7f0000000180)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x80000021, 0x2, @tid=r0}, &(0x7f0000000300)) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000040)=ANY=[], 0x1, 0x30e, &(0x7f00000001c0)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x52) openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) write(r2, &(0x7f0000000a00)="c7", 0x1) sendfile(r2, r1, 0x0, 0x9c2) sendfile(r2, r1, 0x0, 0x7ffff000) 3.268867877s ago: executing program 3 (id=85): pwrite64(0xffffffffffffffff, &(0x7f0000000140)='2', 0xfdef, 0xfecc) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2c, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40d9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0}, 0x204, 0x0, 0x43a1bd76, 0x6, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200c}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf40000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r2, &(0x7f0000000100)={@val={0x2000}, @void, @eth={@broadcast, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0xfffe, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {0x300, 0x0, 0x28, 0x0, @gue={{0x2, 0x0, 0x0, 0x0, 0x0, @val=0xe0000001}, "ebc7a1e0ff5befe1fdbc66e400d7e83306de422b4a81099b"}}}}}}}, 0x4e) 3.231498978s ago: executing program 1 (id=86): openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x101842, 0x0) (async) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x101842, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000080)=0x2) r1 = socket$netlink(0x10, 0x3, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000180)=@req={0xa, 0x80, 0xf6ba, 0x45}, 0x10) socket$xdp(0x2c, 0x3, 0x0) (async) socket$xdp(0x2c, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c00000010003df600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001400030064766d727009000000000000000000001800128008000100707070000c00028008000100", @ANYRES32=r0], 0x4c}}, 0x0) 3.096817393s ago: executing program 3 (id=88): syz_init_net_socket$llc(0x1a, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x40) ioprio_set$uid(0x3, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000300)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f0000000540)=[{{&(0x7f0000000180)=@caif=@dgm, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)=""/17, 0x11}, {&(0x7f0000000340)=""/144, 0x90}], 0x2, &(0x7f0000000440)=""/96, 0x60}, 0x6}], 0x1, 0x2, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x1}, 0x14) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0xfc, 0x4, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x80, 0x400}, 0x2, 0x0, 0x52, 0x0, 0xfffffffffffffffe, 0x80000011, 0x8, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xf) syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') r3 = semget$private(0x0, 0x20000000102, 0x200) semop(r3, &(0x7f0000000240)=[{0x3, 0x0, 0x1800}, {0x0, 0xe65b}], 0x1f4) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x61, 0x0, 0x0, 0x40, 0x0, 0x5, 0x4008a, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x0, @perf_config_ext={0x8000005, 0x80000004dd5}, 0x0, 0x0, 0x4, 0x2, 0x6f, 0x80000001, 0x1, 0x0, 0x0, 0x0, 0xc0}, r0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) socket$nl_generic(0x10, 0x3, 0x10) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) syz_usb_connect$uac1(0x0, 0xb1, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000280), 0x0, 0x6d82d2b6, r4}, 0x38) openat$procfs(0xffffffffffffff9c, &(0x7f0000001140)='/proc/locks\x00', 0x0, 0x0) r5 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x97036135d9f6921f) 3.035362874s ago: executing program 1 (id=89): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$packet(0x11, 0x3, 0x300) getpid() r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000003140)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="08001a"], 0x18c0}}, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) openat(r4, &(0x7f0000000180)='./file0\x00', 0x208080, 0x50) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x7) r6 = getpid() sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000440)=[{0x4, 0x4}, {0x6, 0xff, 0x0, 0x7fff0000}]}) syslog(0x4, &(0x7f0000000040)=""/38, 0x26) connect$unix(r7, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x400000000000041, 0x0) dup3(r2, r1, 0x80000) recvmmsg(r7, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002300)={0x14, 0x3e, 0x321, 0x0, 0x0, {0xa}}, 0x14}}, 0x4004010) sendmsg$nl_route_sched(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newtaction={0xb0, 0x30, 0x1, 0x70bd29, 0x25dfdbfb, {}, [{0x9c, 0x1, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x2, 0x9, 0x4, 0x8be6, 0x5}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x1}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}, @m_skbedit={0x48, 0x2, 0x0, 0x0, {{0xc}, {0x1c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x2, 0x3, 0x6, 0xffffffff, 0x3}}]}, {0xfffffd12}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4081}, 0x2400c800) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x2a00040, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_user}]}}) 1.987479838s ago: executing program 0 (id=92): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0x1}], 0x1}, 0x4014) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x94173000) close_range(r0, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000005c0)=@newtaction={0x44c, 0x30, 0xffffffffffffffff, 0x0, 0x40002, {}, [{0x438, 0x1, [@m_police={0x434, 0x2, 0x0, 0x0, {{0xb}, {0x408, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x28, 0xfffffff8, 0x3, 0x4, 0xffffffc0, 0x6, 0x5, 0x5, 0x2, 0x117, 0x10000, 0x8001, 0x2, 0x1, 0x7, 0x5, 0x80000000, 0xaa, 0x3ff, 0x4, 0x9, 0x0, 0x51, 0xf, 0x2, 0x1, 0x10000, 0x200, 0x7, 0x2, 0x4, 0x8, 0x101, 0x8, 0x0, 0x3, 0xe, 0x66d, 0x80000000, 0x3, 0x1, 0x8, 0x2, 0x7fff, 0xd, 0x4, 0x1ff, 0xffff, 0x7f, 0xfffffffd, 0x40, 0x7, 0x3, 0x400, 0x6, 0x8, 0x2, 0x1, 0x7, 0x9, 0x594, 0x0, 0x2900, 0x100, 0x4, 0x305c000, 0x7, 0xfffffff7, 0x7, 0x800, 0x5, 0xf24, 0x5, 0x7fffffff, 0x923, 0x101, 0x1155, 0x3, 0x1, 0x0, 0xffffffff, 0xcd2, 0xfffffffa, 0x800, 0x4, 0x81, 0x3, 0x0, 0x3, 0xf, 0x1, 0x1, 0xe, 0x3b2, 0x6, 0x4, 0x1ff, 0x6, 0x5, 0x1000, 0xe6, 0x7fff, 0x1, 0x8c, 0x1, 0x80, 0xfffffffb, 0x5, 0x7f0, 0xfffffff0, 0xffff, 0xfffffff7, 0xcfb6, 0x6, 0x4, 0x1194, 0xae, 0xa, 0x2, 0xe0, 0x0, 0x7f, 0x6, 0x0, 0x2, 0x9a7, 0x7a2, 0x5, 0x83f, 0xa36e58b, 0x100, 0x9, 0x7, 0x8, 0x2, 0x1, 0xfffffffe, 0x1242, 0x579, 0x3, 0x5, 0x7, 0x0, 0x4, 0x8d, 0x3, 0x4, 0x5, 0x8, 0xc, 0x6, 0xffffffff, 0xaebe, 0x9, 0x90a, 0x7, 0x3, 0x2, 0x80000000, 0x9, 0x9, 0x5, 0xfffffff1, 0x3cd, 0xc, 0x4, 0x2, 0x9, 0x6, 0x7, 0x4, 0x7, 0x0, 0x2, 0x1, 0x5, 0x7f, 0xe6ef, 0x9, 0x6, 0x1, 0x7, 0x0, 0x7fffffff, 0x7, 0x0, 0x8, 0x9, 0x5, 0x8, 0x0, 0x6, 0x7, 0x1, 0x401, 0x8762, 0x9, 0x0, 0x4, 0x4, 0xff, 0x3, 0xc, 0x8, 0xf, 0x2, 0x6, 0x80000000, 0x3, 0x7b, 0xfffffffc, 0x2, 0x61, 0x8, 0x100, 0x8c4, 0xc56, 0xe, 0xfffffffe, 0x8, 0x8, 0x6, 0x9, 0x5b0, 0x6, 0xffff, 0x5f3, 0xc5f8, 0x1000, 0x2, 0x9, 0x7, 0x1, 0x1, 0x3, 0x0, 0x2, 0x200, 0x253a, 0xb, 0x9, 0x3, 0x0, 0xf, 0x10001, 0x4, 0x2, 0x1000, 0x7, 0xb96, 0x3, 0xff, 0x8, 0x9, 0xb]}]]}, {0x4}, {0xc}, {0xc, 0x8, {0x3, 0x3}}}}]}]}, 0x44c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ec}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={r3, 0x0, 0x2d, 0x0, @val=@netfilter={0xa, 0x1, 0x353a, 0x1}}, 0x20) syz_emit_ethernet(0x36, &(0x7f0000000880)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "182325", 0x0, 0x2c, 0x0, @remote, @local}}}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r6 = syz_open_dev$usbmon(&(0x7f0000000280), 0xfffffffffffffd98, 0x8200) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x7c, &(0x7f00000000c0)=[{&(0x7f0000000180)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe55a10a000140014002020a600e41b0020900ac00060411000000160012000a0003000248035c3b61c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000000008af26c8b7b55f4d2a6823a45f28fcb1d", 0xd8}], 0x1}, 0x0) mmap$usbmon(&(0x7f0000a12000/0x2000)=nil, 0x2000, 0x4, 0x13, r6, 0xfffffffffffffff8) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') preadv(r8, &(0x7f0000001400)=[{&(0x7f0000000140)=""/116, 0x74}], 0x1, 0xc002a0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f00000000c0)={r4}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000740)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010002000000fcdbdf25310000000c000180080001"], 0x20}}, 0x4000000) 1.802005743s ago: executing program 4 (id=94): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r0, &(0x7f0000000400)="cd", 0x1, 0x8010, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback, 0xfffffffe}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="06"], 0x9) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x6}, 0x8) 1.695464767s ago: executing program 4 (id=95): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r0) syz_usb_connect(0x0, 0x62, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000fb5d7d086d04c308166b0102030109025000010000000009041f0000ff0100000a24010400050201020724070500000508240805040004"], 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="170e0000000000000000010000600500070000000000080009000000000014001f000000000000000000000000000000000008000a00000000000600020001000000140020"], 0x5c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000200000000000000000850000002a0000001801000020786c2500000000002020207b1af8ff00"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lsm=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400}, 0x48) pipe(&(0x7f0000000500)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0xa}, 0x4, 0x0, 0x10000, 0x0, 0x3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x200, 0x3}, 0x102802, 0x3, 0x0, 0x0, 0xfff, 0x8001, 0x7fff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffe1c, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="6000000002060500000000000000000000000000140007800800064020000000080013400000000005000100060000000900020073797a32000000000500040000000000050005000a00000011000300686173683a69702c6d61726b"], 0x60}}, 0x0) setresgid(0x0, 0x0, 0x0) sync() sync() sync() syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x0, &(0x7f0000000640), 0x1, 0x5a8, &(0x7f0000000680)="$eJzs3U1sHFcdAPD/rO18OAl2AxWlSGBRBJGi+iNGZINAJD0hFaM2BS5FDUuysd2svZZ3LdUuh0SotDdUxKXqCVk58CWlUhEtFKkSoohD4cAJgcK9qqlUviQQWjSzs6kbb+yETTyV/ftJTzPzZnfff/Y/M5k3b+INYNcaiYiTEdEXEUcjYiivL+UlLrZL+rrVySszaUmi1XrkrSSSiHh28spM57OSfHog/4B9EXF6NaL01MZ2G8srFyq1WnUxXx5rzi2MNZZX7p+dq0xXp6vz5XJ5vFw+fmLi9m3ro4f3H37u11/4z89f++6Hv/K93zyZxnswX7d+O26XkRjJv5OB2Luuvj+JOH+7GytIut/0RzvXN+Pu6nd+eYdD4iZ9/geXSkXHAABsv/QC4HBEfCy7/h+KvuxqLuLkoa+9PRT/fLzo+AAAAIDetYaG4nPpFAAAANixStkzsElpNH8W4GCUSqOj7Wd4PxCDpVq90Tx6vr40f679rOxwDJTOz9aq4/mzwsMxkKTLE9n8O8vHrluejIi7IuKZof3Z8ujZeu1c0Tc/AAAAYIc7GHH10W+9/MEDN+j/p/48VHSUAAAAQC/S/v+hq4PZn+r6u34+AAAA7Ehp///tb//1t6H/DwAAADtWp///0NRUPDQ11VrNf/9qvj49e2Fm4cSx8dG5pbOjZ+uLC6PT9fp09j/257b+3Fq9vjBxLJaeGGtWG82xxvLKmbn60nzzTPa7XmeqA9uwbcDWHj55tlp0DAAAwPa566Ov/jGJiIuf2Z+V1J58nb467Gx+ABx2r76iAwAK0190AEBh9PGBZIv1+2604uLtjwUAALgzPvkh4/+wWxn/h93L+D/sXsb/YffSxweM/wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwNZarSRaAAAAwI7WWF65UKnVqotmzJgxc22m6DuTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALyXPTt5ZaZTtqvNV36xXS1xI2unImK4nf/VvLTX9Me+bLovBiJi8G9J9K97XxIRfT22/e97IkbisSdfbF1+KS2R74c9fiy34OKliLin2/GfpLtFDOd7wfX5L2V7Rm9+8sM0/6u/W18n/9url/wP9tj2yx9J8//g3evr5H/3uPfhoiOgSL9/pugIKNIf1oqOgCKdfqToCCjSlz5ddAQU6fm3io6AV09FxHi3/l8p7RZe6+Vf3//ry+4Q9ebISNr/e/ro+rqN/b/SGz02wybWTkV8NiJWN9z/K3VeMtyXLx3K7gcMJOdna9XxiHhfmsMY2JsuT2zSxuUzS491q3/wdJr/Kz9d+NMLP+uUtP10+s6rSm/07333+85VmpVet5u2tUsR9/Z3y39y7f5vcoP7v++/yTZmXv/G493qJ3+V5v+V5zfPP3dS6/sRn+h6/CfXXpPOjTXnFsYayyv3z85VpqvT1flyuTxeLh8/MTGWnQ7GOieFLobWDny1W/3XH0jz/98p+S9OevwPbp7/7PzfWF65UKnVqouNW2/jX2++vtqt/vBTaf4f+Ob/c/7fk3w5C3BPXvdEpdlcnIjYk3xxY/2xW495p+p8H53vK83/kfu6//vfuf5rn/9LG+7/D+fTdP3IJm0OHH/h6W71H78vG/+7+mLr8kuO/2Kk+T+3xfGfvOv4v/WZ5/7yjx91a/vHe9P8v/ZmZ/w3LWn7nbHgtvT4/1QWzJG8xvXf1m42QUXHCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6/0vAAD//wqlOeU=") getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x94f08dca903d518d}, 0xc0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x4156, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc, 0x1}, 0x105e39, 0x0, 0xfffffffe, 0x6, 0x5, 0x2, 0x101, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1e000000000000000700400008"], 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000001340)={0x2, 0x6, @multicast2}, 0x10, 0x0}, 0x8000) 1.339220098s ago: executing program 2 (id=97): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20030, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0xa, 0x4, 0x0, 0x0, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r2, 0xfffffffd) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) r3 = accept4(r2, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001000), 0x581, 0x40000000, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f00000002c0)={0x1, 0x1, 0x2, 0xff, 0xa4, 0x0, 0x1, 0x4, 0x5, 0x27, 0x0, 0x0, 0x2, 0x60}, 0xe) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r4) socket$kcm(0x11, 0xa, 0x300) ioctl$TUNGETVNETLE(r4, 0x8954, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = fsopen(&(0x7f0000000240)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(r6, 0x0, 0x0) fchdir(r7) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r7, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) write$binfmt_register(r9, &(0x7f00000009c0)={0x3a, 'syz3', 0x3a, 'M', 0x3a, 0x1, 0x3a, 'usrjquota=', 0x3a, '\x00\x03!\f\xee\x998r~\b\x17\xff\xff\xff\xff\xff\xff\xff\xff\x89\xaeF(\x05\b\x13\x82\x12\xad\x0f^\xdc\xf2\xb5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfee\v\xf6\x11\x14\xb7\xd2\xc1\xea\x99\xc17mIx\x95\xbd\xde\xcb\xb6\xea\xa6\xeeNWZ#\x04\x0f\xf3\xd5\xbd\x88t\xf90\x8d\x8d\xa7\f\x0f\x99\xfc\x1d8\xce1\xac\xe5`\x85\xaf\xc7g%\x01\xb8\x18\xc1 \xb5\x9c\xf0\xcb\xb7\x9c`\xbeuJ\xcd\x10h\xd2\xe7\xf0\xa2:\xd1\x1f\x92\xaf\x1f\xd9\xce)g\t\xaa\xebw\x11\xb0\xf5\x14\xcc\x0e\b\xb9@i\x1dS8v\xca\x7f\x16\x92o\xe7u\xdc\xe3\xdd\x0e\x06=+\xc2Q\x00\x00\x00\x00\x00\x00\x80\x00\x1fML\xff', 0x3a, './file2'}, 0xe5) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x12, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x1, 0x4, 0x0, 0x4}], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x5d, &(0x7f0000000180)=""/93, 0x41100, 0x60, '\x00', r8, @fallback=0x30, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xb, 0x0, 0x4}, 0x10, 0x0, r4, 0x0, &(0x7f0000000440), 0x0, 0x10, 0xffff}, 0x94) r10 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) io_uring_setup(0x6662, &(0x7f00000000c0)={0x0, 0x3290, 0x0, 0x3, 0x1b4, 0x0, r4}) r11 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040), r10) sendmsg$NLBL_CALIPSO_C_REMOVE(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, r11, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8084}, 0x10890) 1.233558621s ago: executing program 1 (id=98): pwrite64(0xffffffffffffffff, &(0x7f0000000140)='2', 0xfdef, 0xfecc) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2c, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40d9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0}, 0x204, 0x0, 0x43a1bd76, 0x6, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200c}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf40000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r2, &(0x7f0000000100)={@val={0x2000}, @void, @eth={@broadcast, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0xfffe, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {0x300, 0x0, 0x28, 0x0, @gue={{0x2, 0x0, 0x0, 0x0, 0x0, @val=0xe0000001}, "ebc7a1e0ff5befe1fdbc66e400d7e83306de422b4a81099b"}}}}}}}, 0x4e) 1.058027887s ago: executing program 0 (id=99): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="150a000000000000611064000049e6ed5dba2a1e9a1860678c0000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x90) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x54}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_lsm={0x6, 0x3, &(0x7f0000000040)=ANY=[@ANYRES64=r0], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05000000040000000c0000000b"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r2}, 0xc) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x41288, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0xa}, 0x110a4, 0x0, 0x0, 0x3, 0xb6, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_DEFRAG_RANGE(r4, 0x40309410, &(0x7f00000003c0)={0x5, 0xe, 0x3, 0xb74, 0x1, [0x8, 0x9, 0x1, 0x6]}) sendmsg$inet(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000007c0)='$', 0x1}], 0x1}, 0x20004081) recvmsg$unix(r3, &(0x7f00000038c0)={0x0, 0x0, 0x0}, 0x1) syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) 973.15507ms ago: executing program 2 (id=100): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7fffffff, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0xa01, 0x0) write$vga_arbiter(r0, &(0x7f0000000040)=ANY=[], 0x9) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x2}}, {{0xa, 0x0, 0xffffffff, @remote}}}, 0x108) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000080)={0x20, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0xffff, 0x0, @mcast1={0xff, 0x7}, 0x10000}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) fstat(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000380)={[{@nodioread_nolock}, {@debug}, {@journal_checksum}], [{@subj_user={'subj_user', 0x3d, '\x00'}}, {@subj_type={'subj_type', 0x3d, 'test_dummy_encryption'}}, {@uid_eq={'uid', 0x3d, r4}}, {@appraise_type}, {@uid_eq={'uid', 0x3d, r4}}]}, 0x0, 0x5fd, &(0x7f00000006c0)="$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") syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000540)='./bus\x00', 0x8800, &(0x7f0000000300)={[{@errors_remount}, {@usrquota}, {@test_dummy_encryption_v1}, {@test_dummy_encryption}]}, 0x1, 0x51a, &(0x7f0000000f00)="$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") timer_create(0x2, 0x0, &(0x7f0000044000)=0x0) timer_settime(r5, 0x1, &(0x7f0000040fe0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000180)='./file1\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYBLOB="6092034e5823f645654f6e8edfc3b8e1a948efb0d4b9a9d4c30f5dacb3c1a7ea2587d59165777f070017c2921e793ec5a1384e143b57bb832f14bb43afdef6cb4ed4960b6c732be46a927cdd8c57f93ee6c15401df91ebcbe4f9989843313ea9f243d4dc3d276b966b898100a620b69b543033b9b7bcd9069b9248fbdff46c4a49f094a61938776ce1a1d0f0c84cb7a84bf0b1e2ce5f38f95e11d5b1977ead80625337f66dc391089ab8573d008a4bd03f6f9f01406db632558ed25be4beecd844ac00e52f95c5dc96a1e4a25c80d56aebf6cb33914d6bc72a40bf2fc94efed2f941cf3e"], 0xf9, 0x1213, &(0x7f0000000600)="$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") timer_gettime(r5, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r6, &(0x7f0000000500)={0xa, 0x4e20, 0xffffffff, @empty, 0x5}, 0x1c) connect$inet6(r6, &(0x7f0000000300)={0xa, 0x4e1a, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x2}, 0x1c) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x1, &(0x7f0000000000), 0x4) socket$kcm(0x2, 0xa, 0x2) timer_settime(r5, 0x1, &(0x7f0000000000)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000040)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 949.55627ms ago: executing program 1 (id=101): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x33, &(0x7f0000000040)=0x80000203, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x1, 0x7, &(0x7f0000000a40)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, 0x0, 0x4c040) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000840) munmap(&(0x7f0000002000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401f, 0x68180, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6f, 0x1, @perf_bp={0x0, 0x1}, 0x10c0e8, 0x0, 0x9, 0x3, 0x6, 0x8001, 0x7fff}, 0x0, 0xff6fbfffffffffff, 0xffffffffffffffff, 0x1) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, 0x0, 0x2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x2007, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8006, 0x6}, 0x0, 0x10001, 0xda, 0x5, 0xa, 0x20002, 0xa, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000030900010073797a310000000054000000030a010400000000000000000100ffff0900030073797a310000000028000480080002400000000008000140000000051400030076657468315f6f6163767461700000000900010073797a310000000064000000050a01020000000000000000010020000c00024000000000000000010900010073797a3100000000040004800b00070066696c746572"], 0x330}}, 0x0) r3 = fsopen(&(0x7f0000001340)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000140), 0x12) timer_create(0x3, 0x0, &(0x7f00000001c0)=0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xf, &(0x7f0000000480)=ANY=[@ANYBLOB="180000200200000000000000fcffffff18110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xcbf2d02ce960ba19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f00000001c0)=r9, 0x4) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x18, 0x30, 0xffff, 0xfffffffe, 0x0, {}, [{0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) timer_settime(r6, 0x1, &(0x7f0000000340)={{0x77359400}, {0x0, 0x989680}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x26040301}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001e00080025bd70000700ec00fc02000000000000000000000000000100000400010000000000000000000000000000000000003302000000073500000800180004000000"], 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x0) timer_gettime(r6, &(0x7f0000000000)) io_setup(0x6, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_async', 0x1a1081, 0x0) io_submit(0x0, 0x0, &(0x7f0000000040)) 677.146819ms ago: executing program 1 (id=102): r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x401) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0xb2) sched_setscheduler(0x0, 0x2, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x3, @perf_config_ext={0x1, 0xfffffffffffffff0}, 0x3830, 0x1, 0xbd6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000480)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x64}, 0x1, 0x0, 0x0, 0x4000854}, 0x40) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x40, 0xd, 0xa, 0x801, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, '\r'}]}]}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000805}, 0x8000) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_matches\x00') r5 = socket(0x1, 0x803, 0x0) r6 = accept4$packet(r5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000380)=0x14, 0x80000) socket$packet(0x11, 0x3, 0x300) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0xfffffffffffffde6) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000740)=@updpolicy={0xc0, 0x19, 0x1, 0x0, 0x10, {{@in=@multicast1=0xe0000002, @in=@rand_addr=0x64010102, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80, 0x6}, {0x0, 0x0, 0x1abe1019, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd}, {}, 0x0, 0x6e6bb8, 0x0, 0x1, 0x0, 0x1}, [@XFRMA_IF_ID={0x8, 0x1f, 0x1}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4008011}, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r10, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000c40)=ANY=[@ANYBLOB="d40000001b001d0328bd7000fcdbdf25ffffffff000000000000000000000000fe8000000000000000000000000000264e2000014e2404000200000087000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000000000000000100010000000000f4ffffffffffffff04000000000000000200000000000000ba410000000091ad07000000000000000000008000000000ffffff7f0000000003000000000000000400000000000000080000000000000003000000b86b6e000000030100000000040000000000000008001f0001"], 0xd4}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000040)={'bridge_slave_1\x00', 0x0}) socket$kcm(0x2, 0x922000000001, 0x106) r13 = socket(0x2b, 0x1, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r13, 0x0, 0x80, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x2000000000c0, 0x2000000000f0, 0x200000000120], 0x0, 0x0, 0x0}, 0x108) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x80, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x100, 0x18, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f00000001c0), 0x2}, 0x808, 0x6e, 0x8900, 0x9, 0x1, 0x800, 0x1, 0x0, 0x7f, 0x0, 0xa27}, r1, 0x1, r2, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x400, 0x7ffffffe, 0x3, {0x0, 0x0, 0x600, r12, 0x28, 0x880}, [@IFLA_MASTER={0x8, 0x3, r7}]}, 0x28}, 0x1, 0xd, 0x0, 0x480c5}, 0x0) 676.85365ms ago: executing program 0 (id=103): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x7c}}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x0, 0x400000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000009c0)=@generic={&(0x7f0000000980)='./file0\x00', 0x0, 0x18}, 0x18) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="030000000500000002000c00000000000000000001000000000000006f09e6a2"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{0x1, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000140)={r0}) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0300000004000000040000000100000000000000", @ANYRES32=r2, @ANYRES32, @ANYRES16=r3], 0x50) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x80300, 0x0) readv(r5, &(0x7f0000001300)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) ppoll(0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) r6 = socket(0x28, 0x1, 0x0) getsockname$packet(r6, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0x44, 0x30, 0x9, 0x0, 0x1, {}, [{0x30, 0x1, [@m_bpf={0x2c, 0x1, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x44}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport}, 0x94) listen(0xffffffffffffffff, 0x0) getsockopt$inet6_mptcp_buf(0xffffffffffffffff, 0x11c, 0x4, &(0x7f0000000000)=""/152, &(0x7f00000000c0)=0x98) sendmsg$nl_route_sched(r0, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000025c0)=@delchain={0x30, 0x2e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0xe, 0x3}, {0xfff2, 0xffff}, {0xc, 0xd}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000085}, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1da012, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, @perf_config_ext={0x7, 0x9}, 0x200, 0x1fb, 0x0, 0x5, 0x80008, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) unshare(0x2e000200) 487.760135ms ago: executing program 0 (id=104): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f0000000180)='./file1\x00', 0x1000802, &(0x7f0000000a00)=ANY=[@ANYBLOB="6e6f6e756d7461696c3d302c6e6f6e756d7461696c003130dbbb3121258e322c262b537f5d0000006e695f7804590000000000003d312c696f63686172538c6c90392bc69373686f72746e616d65653ff959f53d6d697865642c636f6465706167653d3821332c696f6368617273650000000031323831e54f1bb0a3d72c007e3db5a829498e2a721ae5804ff8ccb41e27af3a3a924308cb010100003ceeeac934b3165b4a0ea182cdd0666ab32f2d041a99ac9fc865ba946f1bb7759d02742dfcc68937ff86d7a54d6de8823119c767d45d6047209f4436383ee21373a9c3f450cb6d7c37b59a34407d4a0e6a382108ddd52580281f1d8ad71c4ceafb49960f1429b090d1429f519f9c2b0cb88ffa6fc04fa61c275bf560b9eeeb2d0c8b3ddeb56783f9908c21cf9b2ba0b76b9b60c991bb17c7d0accad1cdaf3259b7dc405d72e2bc3abe0cf37bda3dbfc05e2e55f8aa272b5ea736019c3c0a9b34115a445e0c5da1bd7352ec9529f5caa71f1ae71b36b500c79fffb487ed081232b5d93d3162c7f71f4d572ed87cf12b9ce4e527266a0c15dac9171edda86b148d17a48d4d90470e79620eeab5acf6f78f807298315e2b80fe1874098d75ab47837a96699e2a7db456f2a4368bece813135ed970951c7471ac16703820a799421cb24f327b3669c159abfa125ee992a5f49ab45bec637c38bcbdae4da3a05f96b2162c47d0b1277e1b1bcc981cce8f6f7f3dd8d06352eb387997b498a732d8442115755ff14d508891abd401b3cafcba75a6901fbe08002674d8663b8c40e9cf13fa4c4a092cb8004a1d2a6fe18cd5d702493d52a7110b17e64b9fa22fb3ace98b9ca35cb98c65f0902dd430373f6ae43c4a60c423b6f65b5ecc2093698072abc857ab2d36a261a7fc5776d39c3d5d5fad291c88ff9726d5ee32c6bcac1799ade9459eb39b56d985d29b988c72c9ad7e82b589f454a58d7cd5ace9436cf69acc217737c863d8938cc95767a0c9b14cb79f5b450c894a3e95d26e14259fdb65aa49761847cc1c13f18742072e80cbed0d5622618817583d0365f807882e539ff07c9205d3ee72efb8dd6853a02f49abd1b38d4571666a4d7d98c4f34f082eea5a5ac7b9e9fd030791df5d98a03ed76cdbb3241f96f22b6dd0da2bd8105c3408eeb8543ebc5de0849c1f31bd94033655fd11430fd18e55f5361750c7a2a7"], 0x4, 0x272, &(0x7f0000001f40)="$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") syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000000)={[{@barrier_val={'barrier', 0x3d, 0xff}}, {@resuid}, {@jqfmt_vfsv1}, {@errors_remount}, {@nobh}, {@grpquota, 0x2e}], [], 0x2e}, 0x1, 0x472, &(0x7f0000000580)="$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") mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x40001, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r1, 0x84, 0x81, &(0x7f0000000280)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x401, @loopback}], 0x1c) sendto$inet6(r1, &(0x7f0000000180)="b8", 0x1, 0x2404c8d5, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000002c0), &(0x7f0000000040)=0x8) setsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f0000000000)=0x1, 0x4) prctl$PR_SET_ENDIAN(0x14, 0x0) set_mempolicy(0x8000, &(0x7f0000000040)=0x7, 0x9) recvmmsg(r0, &(0x7f0000002340)=[{{0x0, 0x5, 0x0, 0x0, 0x0, 0x40000}, 0x4}], 0xf905db2d12e721d0, 0x10100, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r2, 0x4b72, &(0x7f0000000080)={0xfffffffa, 0x7d, 0x1, 0x3, 0xe, "0060000000000000000001030040000000f600"}) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e23, 0x41200003, @empty, 0x4000b}, 0x1c) 487.480965ms ago: executing program 2 (id=105): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r1) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x8, 0xfc2bd, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x100}, 0x204, 0x0, 0x43a1bd78, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0xffffffffffffc46f}, 0x0, 0x4000000000, 0xffffffffffffffff, 0xb) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) mount$9p_fd(0x0, &(0x7f0000000300)='.\x00', &(0x7f0000000140), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='trans=fd,rfdno']) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r2, 0x1, 0x70bd25, 0x25dfdbfd, {{}, {0x0, 0x4102}}}, 0x1c}, 0x1, 0x0, 0x0, 0x84}, 0x400c004) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r2, 0x300, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40804) sendto$inet6(r0, &(0x7f0000000400)="cd", 0x1, 0x8010, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @loopback, 0xfffffffe}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="06"], 0x9) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000340)='ns/time_for_children\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x6}, 0x8) 327.05987ms ago: executing program 0 (id=106): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000180)=0x0, &(0x7f0000000200)=0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}]}, &(0x7f0000000080)='GPL\x00', 0x5f, 0x8c, &(0x7f00000000c0)=""/140, 0x41100, 0x1, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0x6, 0x5, 0x7ff}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7f}, 0x94) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x482, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x83, "00000000000000000000ffff00"}) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCGICOUNT(r3, 0x545d, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r0, r4, 0x26, 0x0, @void}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000013c0)={r5, 0x0, 0x0}, 0x10) 294.776221ms ago: executing program 2 (id=107): socket(0x10, 0x803, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x1b0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@loopback={0x0, 0x7ffffffff000}, 0x800, 0x0, 0x3, 0xb, 0x800, 0x108}, 0x20) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wg2\x00'}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000100)=0x8001, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e22, @local}]}, &(0x7f00000001c0)=0x10) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@empty, @in=@multicast2}}, {{@in6}, 0x0, @in=@private}}, &(0x7f0000000240)=0xfffffffffffffe60) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x8014) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001400090003000000ffdbdf140f"], 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004000) 240.834353ms ago: executing program 0 (id=108): prlimit64(0x0, 0xe, &(0x7f0000000180)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000140)=0xc) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x80000021, 0x2, @tid=r0}, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000040)=ANY=[], 0x1, 0x30e, &(0x7f00000001c0)="$eJzs3E1rE10UwPGTNEnTlHayeHhEQXrRjW6GNu7FIC2IAUttxBcQp81EQ8akZEIlIrZduXEhfggXpcvuCtov0I07V27cdSO4sAtxJDOTl7aJrWnSWPv/QZlD7j0z9+Y24dyBzPbdN0/zWVvPGmUJRpUERER2ROISlJqAfwy6cUSaLcvl4W+fzt++d/9mMpWanFFqKjl7JaGUGh17/+zFkN9tY1C24g+3vya+bP2/dXb75+yTnK1ytioUy8pQc8XPZWPOMlUmZ+d1paYt07BNlSvYZslrd5ZELFNlreLCQkUZhcxIbKFk2rYyChWVNyuqXFTlUkUZj41cQem6rkZigoOkV2dmjGSHyfNdHgx6pFRKGgMiMrSvJb3alwEBAIC+8uv/erUfrJb0ndT/oZb1/9qFzfLwnfVRv/7fiFTrf5Gm+v9R41ymygTr9X9URBr1f9HbH3S7/t9fEZ1sr3cvjjhOPYy06n+k+h8nRLX+j/mfX9fKg7VxN6D+BwAAAAAAAAAAAAAAAAAAAADgJNhxHM1xHM07DvivOtqgiETdX5B47X0eJnpk9/o3/lj/06Hx4I7QqIj1ajG9mPaOfodNEbHElHHR5If7/+CrxpFl5XZSVXH5YC35+UuLae+7JJmVnJs/IZrE9+Y7ztSN1OSE8uzOD0usOT8hmvzXOj+xNz9cPUbk0sWmfF00+TgvRbEk4/8yrpb/ckKp67dSe64/5PYDAAAAAOBfoKu6+v59sLld39/u7Y+9dm9/HZLW9we8/fV4y/19SM6F+jVrAAAAAABOF7vyPG9YllnqUbAiIj2+RJugNsPDZtUekNumT0AC7Zq6ENQu3ll6dWxdG0/4UO9YsKOhjkX+cFFaBrXbRu36yHQnZ3Y0kaO+h2fevvv++z7enTGRw5zw6nr0gJl2GkQOmmn42L6AAAAAABybRtFfe+VafwcEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMApdByP4uv3HAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIC/xa8AAAD//46ZAFE=") r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x52) openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) write(r2, &(0x7f0000000a00)="c7", 0x1) sendfile(r2, r1, 0x0, 0x9c2) sendfile(r2, r1, 0x0, 0x7ffff000) 214.017284ms ago: executing program 2 (id=109): r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000180)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000008c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000880)={&(0x7f0000000680)={0x1c8, 0x2, 0x2, 0x201, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x6}, [@generic="28d2247be0bdfe17052ec2fcb99995ef2167c1e20f552b4ee60a6d4094dadfdf0d83a959334743cdc33eead36da68177480e4767c4b36a31a5a48b7b8fe65bfbeb013e2ed3930a0d83238e41d771dfdcf36b7db3ae684e1e28dbae195576d70097e3e2327cb9f09aa1d07ea0991c5a286d1eca906f923fbebf986edf304ff642c7f9a6cd73e8", @typed={0x8, 0xfc, 0x0, 0x0, @u32=0xd}, @nested={0xc2, 0x42, 0x0, 0x1, [@nested={0x4, 0x6b}, @generic="fecbc721f0bdc58c9bc1db2bbc8a010dc9dc0feea83defdd0501fd42dd5b7920d9f2a5affa2f2fc249518cae62a3a29cd4cd0ab307e6b56196a55817bc0e592e22df1012c79cfcfa77b81620f585a0d1ac6ce4e0afb5288569d8bbaf135ca54dfa774e8042ac6c7368b80efc58a61757ce713b1b41440e5cfd50043e84f88634ec9200bb420206481bc990175b28f30238b629e1d3068b354b400451e02fb0cecbd65faca5a3c1669505e9a2b8f9963e5e03e64fc9f3b257d1f7"]}, @typed={0x60, 0x8d, 0x0, 0x0, @binary="138ea20b287e9073b48665aa0eb4561c19b754590ad7e3e3f78167b8837ec5cdcc820742f5669a81e0533bc75c28642b76945a2454e24905e072fb38daa7a1277a48b5dc8fca076334c74feace2139ebf7ab9814355000d0b3e5acef"}]}, 0x1c8}}, 0x80) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c0000001000850600000000ff6122314a000800", @ANYRES32=r3, @ANYBLOB="f5ff0f00252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x40000) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x50, 0x10, 0x503, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3806}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_LOCAL={0x14, 0x6, @private1}]}}}, @IFLA_PHYS_SWITCH_ID={0x7, 0x24, 's/E'}]}, 0x50}, 0x1, 0x0, 0x0, 0x20040080}, 0x24000010) 168.119175ms ago: executing program 1 (id=110): r0 = socket$l2tp6(0xa, 0x2, 0x73) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) bind$l2tp6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x20) ioctl$BTRFS_IOC_SUBVOL_SYNC_WAIT(r0, 0x40109441, &(0x7f00000000c0)={0x3, 0x3, 0x1000}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vxcan1\x00'}) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000380)=0x10001, 0x4) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000480)={[{@fat=@dos1xfloppy}, {@shortname_lower}, {@rodir}, {@utf8}, {@shortname_winnt}, {@uni_xlateno}, {@numtail}, {@fat=@dmask={'dmask', 0x3d, 0x4}}, {@fat=@tz_utc}, {@uni_xlate}, {@uni_xlateno}, {@shortname_winnt}]}, 0x0, 0x284, &(0x7f0000000700)="$eJzs3E9rE10Ux/Ffk/5NaZPFwwMK4kE3uhna+AqCtCAGKrURdSFM7URDxqRkYiUitju3vguhuHQnqG+gG3fuxU0RBDddiJEmmSatgbbaONF8PxDmZs6czL2TmXBmIHf75vMHxXwQU0tM2tCOlNLeKg21YxrSqDpt6OLk1w9nrt+6fTWTze7G5jNLl9JmNn32zaMnL8+9q07eeDX9ekxbqTvbX9Ift/7fOrX9fSn89HLVXFsul6vusu/ZSiEoOmbXfM8NPCuUAq+yL573y6urNXNLK1OJ1YoXBOaWalb0alYtW7VSM/eeWyiZ4zg2ldCgiR87I7e5uOhmetIZRGGi28pKJePGuwZzm3+iUwAAoL+06n8n71YVG7ffrP/nFs2OVv/fLwRWCKx0WP0fE/V/71D/D4Ld+j/Run73o/4HAAAAAAAAAAAAAAAAAAAAAOBvsFOvJ+v1ejJchq8xSeOSwvdR9xO9wfc/2Dr+uDcu+c/Wcmu55rIZz+RVkC9PMyPSt8b50NJsz1/Jzs1YQ0pv/fVW/vpaLq6xMD+U6p4/28y3/fkjSnTuP62k/uuen+6aP6oL5zvyHSX1/q7K8rXSOK/b+U9nzS4vZA/kTzS2AwAAAADgX+DYnp/u3xtxx8JpQw7EmyvbzweUPOT5wIH762GdHo5u3AAAAAAADJKg9rjo+r5XoXGcxkKPDt2LfhlgPzRikiLa+2dJ/XEQTrTx6WHzqj/KxlH/MgEAAAA4ae2iP+qeAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwuI46eVi4/a/MPdaxu3g0owQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD6w48AAAD//0zfHpw=") syz_emit_ethernet(0x8e, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa1acd1f78800d86dd608a37f200587300fe2800000000000000000000000000bbfe8000000000000000000000000000aa00000000", @ANYRES8], 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_NEWRULE={0x38, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x60}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 350.76µs ago: executing program 3 (id=111): pwrite64(0xffffffffffffffff, &(0x7f0000000140)='2', 0xfdef, 0xfecc) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2c, 0x1, 0x0, 0x0, 0x0, 0x9, 0xf40d9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0}, 0x204, 0x0, 0x43a1bd76, 0x6, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200c}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf400000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r2, &(0x7f0000000100)={@val={0x2000}, @void, @eth={@broadcast, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0xfffe, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {0x300, 0x0, 0x28, 0x0, @gue={{0x2, 0x0, 0x0, 0x0, 0x0, @val=0xe0000001}, "ebc7a1e0ff5befe1fdbc66e400d7e83306de422b4a81099b"}}}}}}}, 0x4e) 0s ago: executing program 2 (id=112): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000009c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2800000, &(0x7f0000000640), 0x1, 0xbd5, &(0x7f0000000ec0)="$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") munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) write$binfmt_register(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x105042, 0x189) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket(0x400000000010, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB="440000001100a7cc4a372eaf541d002007000000", @ANYRES32=r2, @ANYBLOB="00000000100000001c001a80080003"], 0x44}, 0x1, 0x0, 0x0, 0x50}, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000180)={0x80000020}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001a00010000000000000000001c000000000000000000000014", @ANYRES8=0x0, @ANYRES32=r4], 0x30}}, 0x0) write$binfmt_format(r0, &(0x7f0000000000)='1\x00', 0x2400) kernel console output (not intermixed with test programs): [ 23.443558][ T28] audit: type=1400 audit(1779079407.390:103): avc: denied { search } for pid=3179 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 23.465799][ T28] audit: type=1400 audit(1779079407.390:104): avc: denied { search } for pid=3179 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '10.128.0.145' (ED25519) to the list of known hosts. [ 30.720243][ T28] kauditd_printk_skb: 21 callbacks suppressed [ 30.720262][ T28] audit: type=1400 audit(1779079414.670:126): avc: denied { mounton } for pid=3285 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 30.750455][ T28] audit: type=1400 audit(1779079414.700:127): avc: denied { mount } for pid=3285 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.752821][ T3285] cgroup: Unknown subsys name 'net' [ 30.778665][ T28] audit: type=1400 audit(1779079414.730:128): avc: denied { unmount } for pid=3285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 30.936736][ T3285] cgroup: Unknown subsys name 'cpuset' [ 30.943058][ T3285] cgroup: Unknown subsys name 'rlimit' [ 31.064723][ T28] audit: type=1400 audit(1779079415.010:129): avc: denied { setattr } for pid=3285 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.088216][ T28] audit: type=1400 audit(1779079415.020:130): avc: denied { create } for pid=3285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.113840][ T28] audit: type=1400 audit(1779079415.020:131): avc: denied { write } for pid=3285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.134606][ T28] audit: type=1400 audit(1779079415.020:132): avc: denied { read } for pid=3285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.155182][ T28] audit: type=1400 audit(1779079415.030:133): avc: denied { read } for pid=3021 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 31.175282][ T3289] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 31.177282][ T28] audit: type=1400 audit(1779079415.040:134): avc: denied { mounton } for pid=3285 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 31.210243][ T28] audit: type=1400 audit(1779079415.040:135): avc: denied { mount } for pid=3285 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 31.247165][ T3285] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 32.711700][ T3298] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.718921][ T3298] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.726253][ T3298] bridge_slave_0: entered allmulticast mode [ 32.732741][ T3298] bridge_slave_0: entered promiscuous mode [ 32.742242][ T3300] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.749336][ T3300] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.756487][ T3300] bridge_slave_0: entered allmulticast mode [ 32.763134][ T3300] bridge_slave_0: entered promiscuous mode [ 32.783379][ T3298] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.790588][ T3298] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.797775][ T3298] bridge_slave_1: entered allmulticast mode [ 32.804360][ T3298] bridge_slave_1: entered promiscuous mode [ 32.816041][ T3300] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.823163][ T3300] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.830424][ T3300] bridge_slave_1: entered allmulticast mode [ 32.836861][ T3300] bridge_slave_1: entered promiscuous mode [ 32.886936][ T3298] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.900164][ T3300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.919253][ T3298] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.936382][ T3300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.969342][ T3304] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.976529][ T3304] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.983638][ T3304] bridge_slave_0: entered allmulticast mode [ 32.990224][ T3304] bridge_slave_0: entered promiscuous mode [ 32.997038][ T3297] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.004110][ T3297] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.011399][ T3297] bridge_slave_0: entered allmulticast mode [ 33.018232][ T3297] bridge_slave_0: entered promiscuous mode [ 33.025450][ T3298] team0: Port device team_slave_0 added [ 33.041677][ T3304] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.049002][ T3304] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.056226][ T3304] bridge_slave_1: entered allmulticast mode [ 33.062620][ T3304] bridge_slave_1: entered promiscuous mode [ 33.069216][ T3297] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.076343][ T3297] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.083534][ T3297] bridge_slave_1: entered allmulticast mode [ 33.090280][ T3297] bridge_slave_1: entered promiscuous mode [ 33.097546][ T3298] team0: Port device team_slave_1 added [ 33.103302][ T3303] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.110648][ T3303] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.117849][ T3303] bridge_slave_0: entered allmulticast mode [ 33.124282][ T3303] bridge_slave_0: entered promiscuous mode [ 33.131626][ T3300] team0: Port device team_slave_0 added [ 33.151784][ T3303] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.159087][ T3303] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.166299][ T3303] bridge_slave_1: entered allmulticast mode [ 33.172939][ T3303] bridge_slave_1: entered promiscuous mode [ 33.180335][ T3300] team0: Port device team_slave_1 added [ 33.215368][ T3304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.225926][ T3297] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.235359][ T3298] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.242426][ T3298] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.268546][ T3298] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.284616][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.291747][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.318240][ T3300] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.330159][ T3304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.340505][ T3297] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.354623][ T3298] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.361709][ T3298] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.387741][ T3298] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.399717][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 33.409249][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.416287][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.442492][ T3300] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.466866][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 33.493799][ T3297] team0: Port device team_slave_0 added [ 33.500365][ T3297] team0: Port device team_slave_1 added [ 33.508171][ T3303] team0: Port device team_slave_0 added [ 33.514757][ T3304] team0: Port device team_slave_0 added [ 33.531973][ T3297] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.539174][ T3297] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.565435][ T3297] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.577355][ T3303] team0: Port device team_slave_1 added [ 33.584009][ T3304] team0: Port device team_slave_1 added [ 33.600881][ T3297] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.608041][ T3297] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.634852][ T3297] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.686548][ T3298] hsr_slave_0: entered promiscuous mode [ 33.692617][ T3298] hsr_slave_1: entered promiscuous mode [ 33.701190][ T3300] hsr_slave_0: entered promiscuous mode [ 33.707389][ T3300] hsr_slave_1: entered promiscuous mode [ 33.713353][ T3300] debugfs: 'hsr0' already exists in 'hsr' [ 33.719184][ T3300] Cannot create hsr debugfs directory [ 33.730723][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.737733][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.763768][ T3303] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.774911][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 33.782063][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.808232][ T3304] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 33.819625][ T3304] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.826699][ T3304] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.852717][ T3304] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.868824][ T3303] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 33.875875][ T3303] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 33.901896][ T3303] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 33.926862][ T3297] hsr_slave_0: entered promiscuous mode [ 33.933058][ T3297] hsr_slave_1: entered promiscuous mode [ 33.939230][ T3297] debugfs: 'hsr0' already exists in 'hsr' [ 33.944981][ T3297] Cannot create hsr debugfs directory [ 33.995623][ T3303] hsr_slave_0: entered promiscuous mode [ 34.001865][ T3303] hsr_slave_1: entered promiscuous mode [ 34.008044][ T3303] debugfs: 'hsr0' already exists in 'hsr' [ 34.013824][ T3303] Cannot create hsr debugfs directory [ 34.035015][ T3304] hsr_slave_0: entered promiscuous mode [ 34.041216][ T3304] hsr_slave_1: entered promiscuous mode [ 34.047282][ T3304] debugfs: 'hsr0' already exists in 'hsr' [ 34.053011][ T3304] Cannot create hsr debugfs directory [ 34.246752][ T3300] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 34.255410][ T3300] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 34.263272][ T3300] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 34.272517][ T3300] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 34.282918][ T3300] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 34.291848][ T3300] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 34.302237][ T3300] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 34.310831][ T3300] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 34.330743][ T3298] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 34.339635][ T3298] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 34.352093][ T3298] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 34.361101][ T3298] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 34.369347][ T3298] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 34.378434][ T3298] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 34.392584][ T3298] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 34.401453][ T3298] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 34.418246][ T3297] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 34.426963][ T3297] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 34.434647][ T3297] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 34.443496][ T3297] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 34.451725][ T3297] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 34.460471][ T3297] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 34.468374][ T3297] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 34.477266][ T3297] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 34.522033][ T3303] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 34.530665][ T3303] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 34.540134][ T3303] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 34.549021][ T3303] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 34.556957][ T3303] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 34.565892][ T3303] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 34.573760][ T3303] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 34.582646][ T3303] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 34.620205][ T3304] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 34.629360][ T3304] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 34.637093][ T3304] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 34.645746][ T3304] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 34.653685][ T3304] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 34.662421][ T3304] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 34.677788][ T3304] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 34.686719][ T3304] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 34.715064][ T3300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.740344][ T3300] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.757171][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.764325][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.776052][ T3297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.789601][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.796731][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.817597][ T3298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.827623][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.841056][ T3297] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.854590][ T3303] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.865415][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.872514][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.892743][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.899914][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.909054][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.916386][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.925199][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.932332][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.948410][ T3298] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.965963][ T2192] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.973093][ T2192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.987371][ T3304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.001945][ T2192] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.009091][ T2192] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.055457][ T3304] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.080713][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.087902][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.108671][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.115821][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.232327][ T3300] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.363734][ T3303] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.414839][ T3297] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.432144][ T3298] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.467055][ T3300] veth0_vlan: entered promiscuous mode [ 35.489565][ T3300] veth1_vlan: entered promiscuous mode [ 35.503927][ T3304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.530265][ T3300] veth0_macvtap: entered promiscuous mode [ 35.542928][ T3300] veth1_macvtap: entered promiscuous mode [ 35.576948][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 35.589872][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 35.608359][ T49] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.621123][ T49] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.636364][ T49] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.647080][ T49] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.709404][ T3297] veth0_vlan: entered promiscuous mode [ 35.726646][ T3297] veth1_vlan: entered promiscuous mode [ 35.743540][ T3300] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 35.756712][ T3303] veth0_vlan: entered promiscuous mode [ 35.770466][ T3298] veth0_vlan: entered promiscuous mode [ 35.782140][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 35.782155][ T28] audit: type=1400 audit(1779079419.730:155): avc: denied { read write } for pid=3300 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 35.803427][ T3304] veth0_vlan: entered promiscuous mode [ 35.824640][ T28] audit: type=1400 audit(1779079419.770:156): avc: denied { open } for pid=3300 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 35.851495][ T3298] veth1_vlan: entered promiscuous mode [ 35.858171][ T28] audit: type=1400 audit(1779079419.770:157): avc: denied { ioctl } for pid=3300 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=103 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 35.882787][ T3503] loop3: detected capacity change from 0 to 128 [ 35.891593][ T3503] msdos: Bad value for 'gid' [ 35.901896][ T3503] msdos: Bad value for 'gid' [ 35.903674][ T3303] veth1_vlan: entered promiscuous mode [ 35.929714][ T3298] veth0_macvtap: entered promiscuous mode [ 35.937506][ T28] audit: type=1400 audit(1779079419.890:158): avc: denied { prog_load } for pid=3502 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 35.937522][ T3304] veth1_vlan: entered promiscuous mode [ 35.964072][ T3304] veth0_macvtap: entered promiscuous mode [ 35.972002][ T28] audit: type=1400 audit(1779079419.890:159): avc: denied { bpf } for pid=3502 comm="syz.3.4" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 35.992591][ T28] audit: type=1400 audit(1779079419.910:160): avc: denied { perfmon } for pid=3502 comm="syz.3.4" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 36.014203][ T28] audit: type=1400 audit(1779079419.920:161): avc: denied { prog_run } for pid=3502 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 36.035207][ T28] audit: type=1400 audit(1779079419.950:162): avc: denied { open } for pid=3502 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 36.038202][ T3297] veth0_macvtap: entered promiscuous mode [ 36.055322][ T28] audit: type=1400 audit(1779079419.950:163): avc: denied { kernel } for pid=3502 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 36.081554][ T28] audit: type=1400 audit(1779079420.020:164): avc: denied { write } for pid=3502 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 36.095723][ T3304] veth1_macvtap: entered promiscuous mode [ 36.113870][ T3303] veth0_macvtap: entered promiscuous mode [ 36.128049][ T3298] veth1_macvtap: entered promiscuous mode [ 36.136410][ T3303] veth1_macvtap: entered promiscuous mode [ 36.143667][ T3297] veth1_macvtap: entered promiscuous mode [ 36.163168][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.172542][ T3298] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.184570][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.200842][ T3503] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4'. [ 36.215354][ T3298] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.223678][ T3297] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.233195][ T3303] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.244647][ T3503] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4'. [ 36.259688][ T3304] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.271450][ T3297] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.284631][ T30] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.294434][ T30] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.305386][ T30] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.315091][ T3503] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4'. [ 36.349644][ T30] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.358619][ T30] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.375015][ T30] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.384114][ T30] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.393575][ T30] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.419661][ T30] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.448774][ T30] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.480951][ T30] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.492030][ T30] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.530765][ T3509] netlink: 20 bytes leftover after parsing attributes in process `syz.3.7'. [ 36.532290][ T30] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.575210][ T30] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.599630][ T30] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.611150][ T30] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 36.622245][ T3515] 9p: Bad value for 'rfdno' [ 36.686111][ T3519] loop4: detected capacity change from 0 to 128 [ 36.687383][ T3521] loop1: detected capacity change from 0 to 512 [ 36.709095][ T3519] ======================================================= [ 36.709095][ T3519] WARNING: The mand mount option has been deprecated and [ 36.709095][ T3519] and is ignored by this kernel. Remove the mand [ 36.709095][ T3519] option from the mount to silence this warning. [ 36.709095][ T3519] ======================================================= [ 36.725652][ T3521] EXT4-fs: dax option not supported [ 36.828816][ T3521] loop1: detected capacity change from 0 to 128 [ 36.863887][ T3521] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: writeback. [ 36.886714][ T3521] ext4 filesystem being mounted at /0/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 36.924048][ T3529] loop3: detected capacity change from 0 to 1024 [ 36.950851][ T3525] syz.0.9 (3525) used greatest stack depth: 10752 bytes left [ 36.967565][ T3529] ext3: Unknown parameter 'subj_user' [ 37.046840][ T3529] loop3: detected capacity change from 0 to 512 [ 37.061966][ T3529] EXT4-fs: test_dummy_encryption option not supported [ 37.081457][ T3535] tipc: Started in network mode [ 37.117179][ T3535] tipc: Node identity ac1414aa, cluster identity 4711 [ 37.126746][ T3539] loop0: detected capacity change from 0 to 128 [ 37.165430][ T3535] tipc: Enabled bearer , priority 10 [ 37.250408][ T3542] hub 8-0:1.0: USB hub found [ 37.259078][ T3542] hub 8-0:1.0: 8 ports detected [ 37.279996][ T3529] loop3: detected capacity change from 0 to 8192 [ 37.323471][ T3529] FAT-fs (loop3): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 37.399709][ T3535] tipc: Enabled bearer , priority 0 [ 37.406537][ T3551] syz.3.10 uses obsolete (PF_INET,SOCK_PACKET) [ 37.502432][ T3554] loop2: detected capacity change from 0 to 128 [ 37.918741][ T3297] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 37.943986][ T3562] loop3: detected capacity change from 0 to 128 [ 38.611268][ T3574] EXT4-fs: Ignoring removed bh option [ 38.722834][ T3574] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.324204][ T3378] tipc: Node number set to 2886997162 [ 39.444874][ T3582] EXT4-fs: test_dummy_encryption option not supported [ 40.485685][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.459241][ T28] kauditd_printk_skb: 98 callbacks suppressed [ 41.459274][ T28] audit: type=1400 audit(1779079425.190:263): avc: denied { create } for pid=3581 comm="syz.3.24" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 42.121210][ T3601] Illegal XDP return value 4294967274 on prog (id 8) dev N/A, expect packet loss! [ 42.161700][ T3608] set_capacity_and_notify: 3 callbacks suppressed [ 42.161753][ T3608] loop2: detected capacity change from 0 to 512 [ 42.190752][ T3608] EXT4-fs: Ignoring removed nobh option [ 42.216003][ T3608] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 42.248813][ T3598] loop4: detected capacity change from 0 to 128 [ 42.255407][ T3608] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 42.279083][ T3598] EXT4-fs (loop4): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 42.292611][ T3608] EXT4-fs warning (device loop2): ext4_expand_extra_isize_ea:2860: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 42.308856][ T3598] ext4 filesystem being mounted at /3/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 42.342553][ T3608] EXT4-fs (loop2): 1 truncate cleaned up [ 42.349371][ T3608] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 42.391419][ T28] audit: type=1400 audit(1779079425.190:264): avc: denied { map } for pid=3581 comm="syz.3.24" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 42.415759][ T28] audit: type=1400 audit(1779079425.190:265): avc: denied { read write } for pid=3581 comm="syz.3.24" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 42.481096][ T3298] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.574484][ T28] audit: type=1400 audit(1779079425.920:266): avc: denied { create } for pid=3591 comm="syz.2.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 42.630200][ T3618] netlink: 'syz.2.31': attribute type 1 has an invalid length. [ 42.645504][ T3616] loop0: detected capacity change from 0 to 128 [ 42.651896][ T28] audit: type=1400 audit(1779079426.000:267): avc: denied { ioctl } for pid=3593 comm="syz.1.28" path="socket:[4048]" dev="sockfs" ino=4048 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 42.853972][ T28] audit: type=1400 audit(1779079426.190:268): avc: denied { create } for pid=3597 comm="syz.4.27" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 42.895593][ T28] audit: type=1400 audit(1779079426.190:269): avc: denied { write } for pid=3597 comm="syz.4.27" name="file0" dev="tmpfs" ino=35 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 42.989108][ T3624] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 43.034725][ T28] audit: type=1400 audit(1779079426.190:270): avc: denied { open } for pid=3597 comm="syz.4.27" path="/3/file0" dev="tmpfs" ino=35 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 43.062616][ T3624] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 43.158635][ T28] audit: type=1400 audit(1779079426.320:271): avc: denied { write } for pid=3597 comm="syz.4.27" name="/" dev="loop4" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 43.195875][ T28] audit: type=1400 audit(1779079426.320:272): avc: denied { read } for pid=3597 comm="syz.4.27" path="/3/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file1" dev="loop4" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 43.254612][ T3622] netlink: 20 bytes leftover after parsing attributes in process `syz.1.34'. [ 43.355172][ T3632] loop2: detected capacity change from 0 to 512 [ 43.371922][ T3598] syz.4.27 (3598) used greatest stack depth: 10688 bytes left [ 43.421111][ T3632] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 43.498851][ T3303] EXT4-fs (loop4): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 43.505849][ T3629] netlink: 20 bytes leftover after parsing attributes in process `syz.3.36'. [ 43.601966][ T3638] loop4: detected capacity change from 0 to 128 [ 43.613782][ T3640] loop1: detected capacity change from 0 to 128 [ 43.760771][ T3645] loop3: detected capacity change from 0 to 256 [ 43.774275][ T3645] msdos: Bad value for 'errors' [ 43.953533][ T3649] tipc: Started in network mode [ 43.978880][ T3649] tipc: Node identity daa529600dd5, cluster identity 4711 [ 43.996511][ T3649] tipc: Enabled bearer , priority 0 [ 44.073556][ T3649] tipc: Resetting bearer [ 44.108816][ T3648] tipc: Disabling bearer [ 44.187945][ T3298] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.290695][ T3653] loop2: detected capacity change from 0 to 128 [ 44.300224][ T3654] loop0: detected capacity change from 0 to 128 [ 45.008528][ T3667] loop4: detected capacity change from 0 to 1024 [ 45.016673][ T3667] EXT4-fs: test_dummy_encryption option not supported [ 45.367546][ T3675] EXT4-fs (loop4): 1 orphan inode deleted [ 45.374179][ T3675] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 45.387690][ T3675] ext4 filesystem being mounted at /5/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 45.420053][ T36] EXT4-fs error (device loop4): ext4_release_dquot:7070: comm kworker/u8:2: Failed to release dquot type 1 [ 45.900379][ T3684] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 45.947844][ T3684] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 46.060419][ T1817] kworker/u8:7: attempt to access beyond end of device [ 46.060419][ T1817] loop1: rw=1, sector=145, nr_sectors = 96 limit=128 [ 46.147977][ T1817] kworker/u8:7: attempt to access beyond end of device [ 46.147977][ T1817] loop1: rw=1, sector=249, nr_sectors = 8 limit=128 [ 46.235358][ T1817] kworker/u8:7: attempt to access beyond end of device [ 46.235358][ T1817] loop1: rw=1, sector=265, nr_sectors = 8 limit=128 [ 46.377500][ T1817] kworker/u8:7: attempt to access beyond end of device [ 46.377500][ T1817] loop1: rw=1, sector=281, nr_sectors = 8 limit=128 [ 46.395220][ T1817] kworker/u8:7: attempt to access beyond end of device [ 46.395220][ T1817] loop1: rw=1, sector=297, nr_sectors = 8 limit=128 [ 47.217609][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 47.249213][ T3693] set_capacity_and_notify: 3 callbacks suppressed [ 47.249319][ T3693] loop3: detected capacity change from 0 to 512 [ 47.365069][ T1817] kworker/u8:7: attempt to access beyond end of device [ 47.365069][ T1817] loop1: rw=1, sector=313, nr_sectors = 8 limit=128 [ 47.378587][ T1817] kworker/u8:7: attempt to access beyond end of device [ 47.378587][ T1817] loop1: rw=1, sector=329, nr_sectors = 8 limit=128 [ 47.391948][ T1817] kworker/u8:7: attempt to access beyond end of device [ 47.391948][ T1817] loop1: rw=1, sector=345, nr_sectors = 8 limit=128 [ 47.405319][ T1817] kworker/u8:7: attempt to access beyond end of device [ 47.405319][ T1817] loop1: rw=1, sector=361, nr_sectors = 8 limit=128 [ 48.156030][ T3696] 9p: Bad value for 'rfdno' [ 48.246929][ T1817] kworker/u8:7: attempt to access beyond end of device [ 48.246929][ T1817] loop1: rw=1, sector=377, nr_sectors = 8 limit=128 [ 48.527731][ T28] kauditd_printk_skb: 24 callbacks suppressed [ 48.527750][ T28] audit: type=1400 audit(1779079432.460:296): avc: denied { read write } for pid=3689 comm="syz.0.51" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 48.765368][ T3695] netlink: 4 bytes leftover after parsing attributes in process `syz.0.51'. [ 48.775123][ T3695] netlink: 348 bytes leftover after parsing attributes in process `syz.0.51'. [ 48.784065][ T3695] netlink: 4 bytes leftover after parsing attributes in process `syz.0.51'. [ 48.792911][ T3695] netlink: 348 bytes leftover after parsing attributes in process `syz.0.51'. [ 48.801891][ T3695] netlink: 4 bytes leftover after parsing attributes in process `syz.0.51'. [ 48.891326][ T3693] EXT4-fs warning (device loop3): ext4_multi_mount_protect:394: Unable to create kmmpd thread for loop3. [ 48.966203][ T28] audit: type=1400 audit(1779079432.470:297): avc: denied { open } for pid=3689 comm="syz.0.51" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 49.016722][ T3695] netlink: 4 bytes leftover after parsing attributes in process `syz.0.51'. [ 49.025470][ T3695] netlink: 348 bytes leftover after parsing attributes in process `syz.0.51'. [ 49.026657][ T28] audit: type=1400 audit(1779079432.690:298): avc: denied { write } for pid=3691 comm="syz.2.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 49.034411][ T3695] netlink: 4 bytes leftover after parsing attributes in process `syz.0.51'. [ 49.053869][ T28] audit: type=1400 audit(1779079432.770:299): avc: denied { shutdown } for pid=3689 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 49.062619][ T3695] netlink: 348 bytes leftover after parsing attributes in process `syz.0.51'. [ 49.062756][ T3695] netlink: 4 bytes leftover after parsing attributes in process `syz.0.51'. [ 49.083531][ T28] audit: type=1400 audit(1779079432.780:300): avc: denied { name_connect } for pid=3689 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 49.210350][ T28] audit: type=1400 audit(1779079433.100:301): avc: denied { write } for pid=3706 comm="syz.4.53" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 49.237881][ T28] audit: type=1400 audit(1779079433.190:302): avc: denied { connect } for pid=3705 comm="syz.2.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 49.286238][ T3713] tipc: Started in network mode [ 49.294369][ T3716] Zero length message leads to an empty skb [ 49.300577][ T3713] tipc: Node identity bac774a06c65, cluster identity 4711 [ 49.320748][ T3713] tipc: Enabled bearer , priority 0 [ 49.337427][ T3713] syzkaller0: entered promiscuous mode [ 49.342998][ T3713] syzkaller0: entered allmulticast mode [ 49.369498][ T3713] tipc: Resetting bearer [ 49.402693][ T3726] loop3: detected capacity change from 0 to 512 [ 49.412007][ T3711] tipc: Resetting bearer [ 49.420382][ T3711] tipc: Disabling bearer [ 49.422978][ T3726] ext4: Unknown parameter 'nouser_xattr' [ 49.435626][ T3722] loop2: detected capacity change from 0 to 4096 [ 49.452796][ T3722] EXT4-fs: inline encryption not supported [ 49.464957][ T28] audit: type=1400 audit(1779079433.410:303): avc: denied { write } for pid=3725 comm="syz.3.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 49.492140][ T3722] [EXT4 FS bs=4096, gc=1, bpg=524288, ipg=32, mo=e842c018, mo2=0003] [ 49.500467][ T3722] System zones: 0-5 [ 49.505114][ T28] audit: type=1400 audit(1779079433.410:304): avc: denied { read append } for pid=3725 comm="syz.3.61" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 49.529389][ T28] audit: type=1400 audit(1779079433.410:305): avc: denied { open } for pid=3725 comm="syz.3.61" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 49.554090][ T3722] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 49.581935][ T3732] loop4: detected capacity change from 0 to 1024 [ 49.588713][ T3732] EXT4-fs: test_dummy_encryption option not supported [ 49.668918][ T9] IPVS: starting estimator thread 0... [ 49.679114][ T3736] IPVS: sed: FWM 3 0x00000003 - no destination available [ 49.836501][ T3742] loop4: detected capacity change from 0 to 512 [ 49.886431][ T3737] IPVS: using max 1920 ests per chain, 96000 per kthread [ 49.968666][ T3742] EXT4-fs (loop4): 1 orphan inode deleted [ 49.975555][ T3742] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 49.988849][ T3742] ext4 filesystem being mounted at /8/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 50.141301][ T3748] netlink: 'syz.0.66': attribute type 1 has an invalid length. [ 50.171499][ T3746] loop1: detected capacity change from 0 to 736 [ 50.541584][ T3759] loop3: detected capacity change from 0 to 512 [ 50.624252][ T3761] loop0: detected capacity change from 0 to 1024 [ 50.662888][ T3761] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 50.702609][ T3763] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 50.721477][ T36] EXT4-fs error (device loop4): ext4_release_dquot:7070: comm kworker/u8:2: Failed to release dquot type 1 [ 50.746437][ T3761] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 50.775989][ T3763] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 50.886711][ T3304] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 50.979597][ T3739] syz.2.59 (3739) used greatest stack depth: 9088 bytes left [ 51.035612][ T3770] tmpfs: Cannot disable swap on remount [ 51.084482][ T3298] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.115955][ T3773] loop3: detected capacity change from 0 to 512 [ 51.144053][ T3773] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 51.170365][ T3772] loop1: detected capacity change from 0 to 1024 [ 51.218592][ T3772] EXT4-fs (loop1): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 51.251331][ T3772] JBD2: no valid journal superblock found [ 51.271242][ T3772] EXT4-fs (loop1): Could not load journal inode [ 51.343718][ T3782] ext3: Unknown parameter 'subj_user' [ 51.377222][ T3782] EXT4-fs: test_dummy_encryption option not supported [ 51.523208][ T3782] FAT-fs (loop2): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 51.573070][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.692003][ T3772] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 51.730232][ T3772] EXT4-fs (loop1): orphan cleanup on readonly fs [ 51.765511][ T3772] EXT4-fs error (device loop1): ext4_mb_mark_diskspace_used:4222: comm syz.1.74: Allocating blocks 41-42 which overlap fs metadata [ 51.781761][ T3772] loop1: lost filesystem error report for type 5 error -117 [ 51.783655][ T3772] EXT4-fs error (device loop1): ext4_acquire_dquot:7034: comm syz.1.74: Failed to acquire dquot type 0 [ 51.791716][ C1] EXT4-fs (loop1): error count since last fsck: 1 [ 51.791778][ C1] EXT4-fs (loop1): initial error at time 1779079435: ext4_mb_mark_diskspace_used:4222 [ 51.791881][ C1] EXT4-fs (loop1): last error at time 1779079435: ext4_mb_mark_diskspace_used:4222 [ 51.830403][ T3772] loop1: lost filesystem error report for type 5 error -117 [ 51.833359][ T3772] EXT4-fs error (device loop1): mb_free_blocks:2049: group 0, inode 12: block 14:freeing already freed block (bit 14); block bitmap corrupt. [ 51.858578][ T3772] EXT4-fs error (device loop1): ext4_do_update_inode:5690: inode #12: comm syz.1.74: corrupted inode contents [ 51.871291][ T3772] loop1: lost file I/O error report for ino 12 type 5 pos 0x0 len 0x0 error -117 [ 51.872343][ T3772] EXT4-fs error (device loop1): ext4_dirty_inode:6587: inode #12: comm syz.1.74: mark_inode_dirty error [ 51.895129][ T3772] loop1: lost file I/O error report for ino 12 type 5 pos 0x0 len 0x0 error -117 [ 51.898481][ T3772] EXT4-fs error (device loop1): ext4_do_update_inode:5690: inode #12: comm syz.1.74: corrupted inode contents [ 51.920736][ T3772] loop1: lost file I/O error report for ino 12 type 5 pos 0x0 len 0x0 error -117 [ 51.922182][ T3772] EXT4-fs error (device loop1): __ext4_ext_dirty:207: inode #12: comm syz.1.74: mark_inode_dirty error [ 51.946319][ T3772] loop1: lost file I/O error report for ino 12 type 5 pos 0x0 len 0x0 error -117 [ 51.946883][ T3772] EXT4-fs error (device loop1): ext4_do_update_inode:5690: inode #12: comm syz.1.74: corrupted inode contents [ 51.970207][ T3772] loop1: lost file I/O error report for ino 12 type 5 pos 0x0 len 0x0 error -117 [ 51.971567][ T3772] EXT4-fs error (device loop1) in ext4_orphan_del:303: Corrupt filesystem [ 51.990692][ T3772] loop1: lost filesystem error report for type 5 error -117 [ 51.993411][ T3772] EXT4-fs error (device loop1): ext4_do_update_inode:5690: inode #12: comm syz.1.74: corrupted inode contents [ 52.017860][ T3772] loop1: lost file I/O error report for ino 12 type 5 pos 0x0 len 0x0 error -117 [ 52.026436][ T3772] EXT4-fs error (device loop1): ext4_truncate:4690: inode #12: comm syz.1.74: mark_inode_dirty error [ 52.049494][ T3772] loop1: lost file I/O error report for ino 12 type 5 pos 0x0 len 0x0 error -117 [ 52.051075][ T3772] EXT4-fs error (device loop1) in ext4_process_orphan:345: Corrupt filesystem [ 52.071780][ T3772] loop1: lost filesystem error report for type 5 error -117 [ 52.073635][ T3772] EXT4-fs (loop1): 1 truncate cleaned up [ 52.087368][ T3797] pim6reg0: tun_chr_ioctl cmd 1074025675 [ 52.094079][ T3797] pim6reg0: persist disabled [ 52.099882][ T3772] EXT4-fs (loop1): pa ffff8881078fba10: logic 1, phys. 41, len 23 [ 52.108424][ T3772] EXT4-fs error (device loop1): ext4_mb_release_inode_pa:5459: group 0, free 22, pa_free 23 [ 52.120771][ T3772] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 52.127652][ T3798] syzkaller0: entered promiscuous mode [ 52.140537][ T3798] syzkaller0: entered allmulticast mode [ 52.161868][ T3300] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 52.198755][ T3297] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 53.637147][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 53.637166][ T28] audit: type=1400 audit(1779079437.570:325): avc: denied { read } for pid=3818 comm="syz.0.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 53.700302][ T28] audit: type=1400 audit(1779079437.650:326): avc: denied { write } for pid=3818 comm="syz.0.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 53.738288][ T3826] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 53.766370][ T3826] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 53.791189][ T3828] FAULT_INJECTION: forcing a failure. [ 53.791189][ T3828] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 53.810027][ T28] audit: type=1400 audit(1779079437.760:327): avc: denied { perfmon } for pid=3825 comm="syz.4.95" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 53.853091][ T3828] CPU: 0 UID: 0 PID: 3828 Comm: syz.2.96 Not tainted syzkaller #0 PREEMPT(full) [ 53.853120][ T3828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 53.853185][ T3828] Call Trace: [ 53.853198][ T3828] [ 53.853207][ T3828] __dump_stack+0x1d/0x30 [ 53.853231][ T3828] dump_stack_lvl+0x95/0xd0 [ 53.853258][ T3828] dump_stack+0x15/0x1b [ 53.853284][ T3828] should_fail_ex+0x263/0x280 [ 53.853331][ T3828] should_fail+0xb/0x20 [ 53.853358][ T3828] should_fail_usercopy+0x1a/0x20 [ 53.853403][ T3828] _copy_to_user+0x20/0xa0 [ 53.853499][ T3828] io_query+0x266/0x620 [ 53.853532][ T3828] __se_sys_io_uring_register+0x30c/0x1330 [ 53.853566][ T3828] ? mutex_unlock+0x4e/0x90 [ 53.853591][ T3828] ? fput+0x8f/0xc0 [ 53.853681][ T3828] ? ksys_write+0x194/0x1a0 [ 53.853719][ T3828] __x64_sys_io_uring_register+0x55/0x70 [ 53.853755][ T3828] x64_sys_call+0x2be0/0x3020 [ 53.853849][ T3828] do_syscall_64+0x12c/0x3b0 [ 53.853898][ T3828] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 53.853929][ T3828] RIP: 0033:0x7f2a8540ce59 [ 53.853944][ T3828] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 53.854043][ T3828] RSP: 002b:00007f2a83e67028 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab [ 53.854065][ T3828] RAX: ffffffffffffffda RBX: 00007f2a85685fa0 RCX: 00007f2a8540ce59 [ 53.854082][ T3828] RDX: 0000200000000000 RSI: 0000000000000023 RDI: ffffffffffffffff [ 53.854097][ T3828] RBP: 00007f2a83e67090 R08: 0000000000000000 R09: 0000000000000000 [ 53.854114][ T3828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 53.854130][ T3828] R13: 00007f2a85686038 R14: 00007f2a85685fa0 R15: 00007fff33ab6298 [ 53.854164][ T3828] [ 54.199836][ T3819] netlink: 'syz.0.92': attribute type 1 has an invalid length. [ 54.202136][ T28] audit: type=1400 audit(1779079438.130:328): avc: denied { listen } for pid=3829 comm="syz.2.97" lport=51754 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 54.219834][ T3819] __nla_validate_parse: 22 callbacks suppressed [ 54.219887][ T3819] netlink: 176 bytes leftover after parsing attributes in process `syz.0.92'. [ 54.234577][ T28] audit: type=1400 audit(1779079438.150:329): avc: denied { read write } for pid=3818 comm="syz.0.92" name="usbmon0" dev="devtmpfs" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 54.279626][ T28] audit: type=1400 audit(1779079438.150:330): avc: denied { open } for pid=3818 comm="syz.0.92" path="/dev/usbmon0" dev="devtmpfs" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 54.318396][ T28] audit: type=1400 audit(1779079438.160:331): avc: denied { accept } for pid=3829 comm="syz.2.97" lport=51754 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 54.346292][ T28] audit: type=1400 audit(1779079438.190:332): avc: denied { read } for pid=3829 comm="syz.2.97" lport=51754 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 54.376080][ T28] audit: type=1400 audit(1779079438.260:333): avc: denied { setopt } for pid=3829 comm="syz.2.97" lport=51754 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 54.406530][ T28] audit: type=1400 audit(1779079438.290:334): avc: denied { mount } for pid=3829 comm="syz.2.97" name="/" dev="ramfs" ino=5487 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 54.509792][ T3843] set_capacity_and_notify: 6 callbacks suppressed [ 54.509884][ T3843] loop2: detected capacity change from 0 to 1024 [ 54.528289][ T3845] netlink: 40 bytes leftover after parsing attributes in process `syz.1.101'. [ 54.546723][ T3843] ext3: Unknown parameter 'subj_user' [ 54.573621][ T3843] loop2: detected capacity change from 0 to 512 [ 54.595178][ T3843] EXT4-fs: test_dummy_encryption option not supported [ 54.690098][ T3843] loop2: detected capacity change from 0 to 8192 [ 54.703280][ T3843] FAT-fs (loop2): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 54.922993][ T3853] loop0: detected capacity change from 0 to 256 [ 54.944011][ T3853] FAT-fs (loop0): Directory bread(block 1285) failed [ 54.960786][ T3853] FAT-fs (loop0): Directory bread(block 1286) failed [ 54.977738][ T3853] FAT-fs (loop0): Directory bread(block 1287) failed [ 54.997565][ T3853] FAT-fs (loop0): Directory bread(block 1288) failed [ 55.018551][ T3856] 9p: Bad value for 'rfdno' [ 55.021192][ T3853] FAT-fs (loop0): Directory bread(block 1285) failed [ 55.040154][ T3853] FAT-fs (loop0): Directory bread(block 1286) failed [ 55.042144][ T3826] loop4: detected capacity change from 0 to 512 [ 55.047205][ T3853] FAT-fs (loop0): Directory bread(block 1287) failed [ 55.047234][ T3853] FAT-fs (loop0): Directory bread(block 1288) failed [ 55.056009][ T3849] netlink: 12 bytes leftover after parsing attributes in process `syz.1.102'. [ 55.159357][ T3861] loop0: detected capacity change from 0 to 128 [ 55.260394][ T3867] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pid=3867 comm=syz.2.109 [ 55.274460][ T3867] netlink: 'syz.2.109': attribute type 1 has an invalid length. [ 55.338469][ T3826] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 55.339249][ T3871] loop1: detected capacity change from 0 to 128 [ 55.343385][ T3871] FAT-fs (loop1): bogus number of reserved sectors [ 55.391360][ T3871] FAT-fs (loop1): This doesn't look like a DOS 1.x volume; DOS 2.x BPB is non-zero [ 55.421396][ T3871] FAT-fs (loop1): Can't find a valid FAT filesystem [ 55.470954][ T3861] ================================================================== [ 55.479117][ T3861] BUG: KCSAN: data-race in file_write_and_wait_range / xas_set_mark [ 55.487141][ T3861] [ 55.489485][ T3861] write to 0xffff888107a6ead4 of 4 bytes by task 3865 on cpu 0: [ 55.497137][ T3861] xas_set_mark+0x12b/0x140 [ 55.501674][ T3861] tag_pages_for_writeback+0xe3/0x2e0 [ 55.507073][ T3861] writeback_iter+0x340/0x800 [ 55.511772][ T3861] __mpage_writepages+0x8a/0x1390 [ 55.516828][ T3861] fat_writepages+0x26/0x30 [ 55.521450][ T3861] do_writepages+0x1c6/0x310 [ 55.526070][ T3861] file_write_and_wait_range+0x178/0x2f0 [ 55.531741][ T3861] mmb_fsync_noflush+0x48/0x140 [ 55.536612][ T3861] fat_file_fsync+0x98/0x110 [ 55.541223][ T3861] vfs_fsync_range+0xc5/0xe0 [ 55.545834][ T3861] generic_file_write_iter+0x1ba/0x310 [ 55.551318][ T3861] iter_file_splice_write+0x6c4/0xa80 [ 55.556823][ T3861] direct_splice_actor+0x156/0x2a0 [ 55.562007][ T3861] splice_direct_to_actor+0x311/0x670 [ 55.567430][ T3861] do_splice_direct+0x119/0x1a0 [ 55.572316][ T3861] do_sendfile+0x382/0x650 [ 55.576758][ T3861] __x64_sys_sendfile64+0x105/0x150 [ 55.582003][ T3861] x64_sys_call+0x2dc4/0x3020 [ 55.586739][ T3861] do_syscall_64+0x12c/0x3b0 [ 55.591364][ T3861] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 55.597288][ T3861] [ 55.599629][ T3861] read to 0xffff888107a6ead4 of 4 bytes by task 3861 on cpu 1: [ 55.607189][ T3861] file_write_and_wait_range+0x130/0x2f0 [ 55.612948][ T3861] mmb_fsync_noflush+0x48/0x140 [ 55.617826][ T3861] fat_file_fsync+0x98/0x110 [ 55.622449][ T3861] vfs_fsync_range+0xc5/0xe0 [ 55.627062][ T3861] generic_file_write_iter+0x1ba/0x310 [ 55.632548][ T3861] iter_file_splice_write+0x6c4/0xa80 [ 55.637969][ T3861] direct_splice_actor+0x156/0x2a0 [ 55.643124][ T3861] splice_direct_to_actor+0x311/0x670 [ 55.648531][ T3861] do_splice_direct+0x119/0x1a0 [ 55.653455][ T3861] do_sendfile+0x382/0x650 [ 55.657900][ T3861] __x64_sys_sendfile64+0x105/0x150 [ 55.663139][ T3861] x64_sys_call+0x2dc4/0x3020 [ 55.667872][ T3861] do_syscall_64+0x12c/0x3b0 [ 55.672496][ T3861] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 55.678416][ T3861] [ 55.680753][ T3861] value changed: 0x02000021 -> 0x04000021 [ 55.686479][ T3861] [ 55.688817][ T3861] Reported by Kernel Concurrency Sanitizer on: [ 55.694980][ T3861] CPU: 1 UID: 0 PID: 3861 Comm: syz.0.108 Not tainted syzkaller #0 PREEMPT(full) [ 55.704292][ T3861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 55.714394][ T3861] ================================================================== [ 55.740063][ T3875] loop2: detected capacity change from 0 to 4096 [ 55.766003][ T3875] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 55.834251][ T3298] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 56.359486][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000.